Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EhSODySB7R.exe

Overview

General Information

Sample name:EhSODySB7R.exe
renamed because original name is a hash value
Original sample name:0a73f48ffa71f2ba878056373570aa08.exe
Analysis ID:1384579
MD5:0a73f48ffa71f2ba878056373570aa08
SHA1:4d5195efeda4ce5c14096a22613d32afb9958808
SHA256:f14401a595ad551015bce9e8eeaa8f80f2294f8767b654a5650da0f314de5255
Tags:exe
Infos:

Detection

GhostRat, Nitol, Young Lotus
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GhostRat
Yara detected Nitol
Yara detected Young Lotus
Connects to many ports of the same IP (likely port scanning)
Drops executables to the windows directory (C:\Windows) and starts them
AV process strings found (often used to terminate AV products)
Checks for available system drives (often done to infect USB drives)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to clear windows event logs (to hide its activities)
Contains functionality to communicate with device drivers
Contains functionality to create guard pages, often used to hinder reverse engineering and debugging
Contains functionality to delete services
Contains functionality to dynamically determine API calls
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates COM task schedule object (often to register a task for autostart)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Creates or modifies windows services
Deletes files inside the Windows folder
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after checking a module file name)
Found evasive API chain checking for process token information
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • EhSODySB7R.exe (PID: 1632 cmdline: C:\Users\user\Desktop\EhSODySB7R.exe MD5: 0A73F48FFA71F2BA878056373570AA08)
    • msiexec.exe (PID: 5696 cmdline: msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSI99F2.tmp MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • msiexec.exe (PID: 360 cmdline: C:\Windows\system32\msiexec.exe /V MD5: E5DA170027542E25EDE42FC54C929077)
    • msiexec.exe (PID: 5176 cmdline: C:\Windows\syswow64\MsiExec.exe -Embedding 96302FF1609113E413E3406A4F20EA8E MD5: 9D09DC1EDA745A5F87553048E57620CF)
    • MSIA311.tmp (PID: 1716 cmdline: C:\Windows\Installer\MSIA311.tmp" /EnforcedRunAsAdmin /DontWait /RunAsAdmin "C:\Program Files (x86)\IOPL\gxonecli.exe MD5: 1458A72D86B87E1329CFC549B98D1E4D)
      • gxonecli.exe (PID: 4816 cmdline: "C:\Program Files (x86)\IOPL\gxonecli.exe" MD5: 206A390B01B76BA387EA40C4A72622CC)
  • gxonecli.exe (PID: 6300 cmdline: C:\Program Files (x86)\IOPL\gxonecli.exe MD5: 206A390B01B76BA387EA40C4A72622CC)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
    00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
      00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_NitolYara detected NitolJoe Security
        Process Memory Space: gxonecli.exe PID: 4816JoeSecurity_NitolYara detected NitolJoe Security
          SourceRuleDescriptionAuthorStrings
          6.2.gxonecli.exe.a09e27.1.unpackJoeSecurity_GhostRatYara detected GhostRatJoe Security
            6.2.gxonecli.exe.a09e27.1.unpackJoeSecurity_NitolYara detected NitolJoe Security
              6.2.gxonecli.exe.a09e27.1.unpackJoeSecurity_YoungLotusYara detected Young LotusJoe Security
                6.2.gxonecli.exe.a09e27.1.unpackINDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDPDetects executables embedding registry key / value combination manipulating RDP / Terminal ServicesditekSHen
                • 0xdd080:$r1: SOFTWARE\Policies\Microsoft\Windows\Installer
                • 0xdd0b0:$k1: EnableAdminTSRemote
                • 0xdc908:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
                • 0xdcf64:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
                • 0xdcfcc:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
                • 0xdd114:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
                • 0xdd158:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
                • 0xdd1a0:$r2: SYSTEM\CurrentControlSet\Control\Terminal Server
                • 0xdcfc0:$k2: TSEnabled
                • 0xdd038:$r3: SYSTEM\CurrentControlSet\Services\TermDD
                • 0xdcef8:$r4: SYSTEM\CurrentControlSet\Services\TermService
                • 0xdd000:$r4: SYSTEM\CurrentControlSet\Services\TermService
                • 0xdcdf1:$k3: Start
                • 0xdcdff:$k3: Start
                • 0xdce0d:$k3: Start
                • 0xdce1b:$k3: Start
                • 0xdd064:$k3: Start
                • 0xe21ec:$k3: Start
                • 0xe220c:$k3: Start
                • 0xe223c:$k3: Start
                • 0xdc908:$r5: SYSTEM\CurrentControlSet\Control\Terminal Server
                6.2.gxonecli.exe.a09e27.1.unpackMALWARE_Win_PCRatDetects PCRat / Gh0stditekSHen
                • 0xd9c40:$s1: ClearEventLogA
                • 0xda62c:$s2: NetUserAdd
                • 0xdbb06:$s4: :]%d-%d-%d %d:%d:%d
                • 0xdbb20:$s6: <Enter>
                • 0xdce7c:$s7: \cmd.exe
                • 0xdc714:$a1: 360tray.exe
                • 0xdc6ec:$a2: avp.exe
                • 0xdc6bc:$a3: RavMonD.exe
                • 0xdc6fc:$a4: 360sd.exe
                • 0xdc6a0:$a5: Mcshield.exe
                • 0xdc68c:$a6: egui.exe
                • 0xdc678:$a7: kxetray.exe
                • 0xdc5b4:$a8: knsdtray.exe
                • 0xdc5a0:$a9: TMBMSRV.exe
                • 0xdc65c:$a10: avcenter.exe
                • 0xdc640:$a11: ashDisp.exe
                Click to see the 5 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: C:\Windows\Installer\419d6c.msiAvira: detection malicious, Label: TR/Agent.tqvbm
                Source: C:\Users\user\AppData\Local\Temp\MSI99F2.tmpAvira: detection malicious, Label: TR/Agent.tqvbm
                Source: C:\Program Files (x86)\IOPL\libcurl32.dllReversingLabs: Detection: 62%
                Source: C:\Program Files (x86)\IOPL\libcurl32.dllVirustotal: Detection: 32%Perma Link
                Source: EhSODySB7R.exeReversingLabs: Detection: 31%
                Source: EhSODySB7R.exeVirustotal: Detection: 52%Perma Link
                Source: EhSODySB7R.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Microsoft\??Jump to behavior
                Source: Binary string: e:\po\trunk\modules\gxonecli\Release\gxonecli.pdb source: gxonecli.exe, 00000006.00000000.2005719174.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000002.2024310338.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000000.2023277833.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe.3.dr
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: EhSODySB7R.exe, 419d6c.msi.3.dr, MSIA311.tmp.3.dr, MSI99F2.tmp.0.dr
                Source: Binary string: e:\Develope\msi2exe\release\msi2exestub.pdb source: EhSODySB7R.exe
                Source: Binary string: E:\ag\libcurl32\Release\libcurl32.pdb source: gxonecli.exe, 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmp, gxonecli.exe, 00000007.00000002.2024701887.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmp, libcurl32.dll.3.dr
                Source: Binary string: 4e:\po\trunk\modules\gxonecli\Release\gxonecli.pdb source: gxonecli.exe, 00000006.00000000.2005719174.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000002.2024310338.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000000.2023277833.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe.3.dr
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: EhSODySB7R.exe, MSIA06B.tmp.3.dr, MSIA11A.tmp.3.dr, 419d6c.msi.3.dr, MSI9F22.tmp.3.dr, MSIA0DA.tmp.3.dr, MSIA14A.tmp.3.dr, MSI99F2.tmp.0.dr, MSIA0AA.tmp.3.dr
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: EhSODySB7R.exe, 419d6c.msi.3.dr, MSIA311.tmp.3.dr, MSI99F2.tmp.0.dr
                Source: C:\Windows\System32\msiexec.exeFile opened: z:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: x:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: v:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: t:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: r:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: p:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: n:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: l:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: j:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: h:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: f:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: b:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: y:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: w:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: u:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: s:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: q:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: o:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: m:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: k:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: i:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: g:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: e:Jump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpFile opened: c:Jump to behavior
                Source: C:\Windows\System32\msiexec.exeFile opened: a:Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocServer32Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandler32Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\InprocHandlerJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServer32Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\LocalServerJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\ElevationJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0F87369F-A4E5-4CFC-BD3E-73E6154572DD}Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0f87369f-a4e5-4cfc-bd3e-73e6154572dd}\TreatAsJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006E19F9 FindFirstFileExW,5_2_006E19F9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007806E3 PathAppendW,_memset,GetCurrentDirectoryW,PathAppendW,GetFileAttributesW,lstrcpyW,lstrcpyW,PathAppendW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcpyW,PathAppendW,FindNextFileW,FindClose,6_2_007806E3
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F12B6F SHGetSpecialFolderPathA,_mbscat,FindFirstFileA,_mbscat,strlen,memcpy,strlen,6_2_02F12B6F
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15802 FindFirstFileA,memset,memcpy,memcpy,memcpy,memset,FindClose,CloseHandle,CreateFileA,6_2_02F15802
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15195 memset,lstrlen,FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,6_2_02F15195
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F14FE5 lstrlen,wsprintfA,FindFirstFileA,LocalAlloc,LocalReAlloc,strcmp,strcmp,lstrlen,memcpy,memcpy,memcpy,memcpy,FindNextFileA,LocalFree,FindClose,6_2_02F14FE5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15763 memset,_mbscpy,FindFirstFileA,FindClose,6_2_02F15763
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1557C __EH_prolog,memset,lstrlen,FindFirstFileA,strlen,FindNextFileA,FindClose,6_2_02F1557C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007806E3 PathAppendW,_memset,GetCurrentDirectoryW,PathAppendW,GetFileAttributesW,lstrcpyW,lstrcpyW,PathAppendW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcpyW,PathAppendW,FindNextFileW,FindClose,7_2_007806E3
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1EB68 GetLogicalDriveStringsA,QueryDosDeviceA,lstrlen,_strncoll,lstrcpy,lstrcpy,lstrcat,6_2_02F1EB68
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\COMCTL32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\SysWOW64\KERNELBASE.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097\gdiplus.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\SysWOW64\KERNEL32.DLLJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]6_2_02E27E77
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 4x nop then mov eax, dword ptr [esp+04h]6_2_02F272A0

                Networking

                barindex
                Source: global trafficTCP traffic: 154.39.251.117 ports 0,4,7,8,9,49780
                Source: global trafficTCP traffic: 192.168.2.5:49704 -> 154.39.251.117:49780
                Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: unknownTCP traffic detected without corresponding DNS query: 154.39.251.117
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F13246 select,memset,recv,6_2_02F13246
                Source: gxonecli.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                Source: gxonecli.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: gxonecli.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                Source: gxonecli.exe.3.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                Source: gxonecli.exe.3.drString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                Source: gxonecli.exe.3.drString found in binary or memory: http://ocsp.digicert.com0
                Source: gxonecli.exe.3.drString found in binary or memory: http://ocsp.digicert.com0A
                Source: gxonecli.exe.3.drString found in binary or memory: http://ocsp.digicert.com0C
                Source: gxonecli.exe.3.drString found in binary or memory: http://ocsp.digicert.com0L
                Source: gxonecli.exe.3.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
                Source: gxonecli.exe.3.drString found in binary or memory: http://s.symcd.com06
                Source: gxonecli.exe, 00000006.00000002.3224599658.0000000002A80000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://schemas.microsoft
                Source: gxonecli.exe.3.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                Source: gxonecli.exe.3.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                Source: gxonecli.exe.3.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                Source: gxonecli.exe.3.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: gxonecli.exe.3.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                Source: gxonecli.exe.3.drString found in binary or memory: https://d.symcb.com/cps0%
                Source: gxonecli.exe.3.drString found in binary or memory: https://d.symcb.com/rpa0
                Source: gxonecli.exe.3.drString found in binary or memory: https://d.symcb.com/rpa0.
                Source: gxonecli.exe.3.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007379A0 ShowWindow,OpenClipboard,MessageBoxW,MessageBoxW,6_2_007379A0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_00781593 EmptyClipboard,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,6_2_00781593
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1BFCC OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,GlobalFree,CloseClipboard,6_2_02F1BFCC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F12F68 strlen,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalFix,_mbscpy,GlobalUnWire,SetClipboardData,CloseClipboard,6_2_02F12F68
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_00781593 EmptyClipboard,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,SetClipboardData,GlobalFree,CloseClipboard,7_2_00781593
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F12AF2 OpenClipboard,GetClipboardData,GlobalFix,strlen,GlobalUnWire,CloseClipboard,6_2_02F12AF2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F16BBD memset,Sleep,lstrlen,memset,memset,GetKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,lstrlen,lstrcat,memset,lstrcat,6_2_02F16BBD
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0074777C GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,6_2_0074777C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0074777C GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,7_2_0074777C

                System Summary

                barindex
                Source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                Source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPEMatched rule: Detects PCRat / Gh0st Author: ditekSHen
                Source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding registry key / value combination manipulating RDP / Terminal Services Author: ditekSHen
                Source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPEMatched rule: Detects PCRat / Gh0st Author: ditekSHen
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_00781164: CreateFileA,DeviceIoControl,6_2_00781164
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1D08C OpenSCManagerA,_mbscpy,OpenServiceA,GetLastError,QueryServiceStatus,ControlService,DeleteService,Sleep,6_2_02F1D08C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F190B2 memset,memset,GetCurrentProcess,OpenProcessToken,DuplicateTokenEx,SetTokenInformation,CreateProcessAsUserA,FreeLibrary,6_2_02F190B2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1EAA6 ExitWindowsEx,6_2_02F1EAA6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F180EE ExitWindowsEx,6_2_02F180EE
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F12C67 memcpy,CreateFileA,WriteFile,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit,6_2_02F12C67
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\419d6c.msiJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile deleted: C:\Windows\Installer\MSI9F22.tmpJump to behavior
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00404C680_2_00404C68
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_0040767B0_2_0040767B
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00402F700_2_00402F70
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006AD0005_2_006AD000
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006E42D25_2_006E42D2
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006D74885_2_006D7488
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006DC7465_2_006DC746
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006E5A165_2_006E5A16
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006CAB405_2_006CAB40
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006D0B105_2_006D0B10
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006D2CFF5_2_006D2CFF
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006D4CB05_2_006D4CB0
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006DFD295_2_006DFD29
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006B0E305_2_006B0E30
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006D0E9E5_2_006D0E9E
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006DEF3D5_2_006DEF3D
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007AC0746_2_007AC074
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0075A0FF6_2_0075A0FF
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007483E66_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0078A4F96_2_0078A4F9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007364F06_2_007364F0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007544CD6_2_007544CD
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0077C4CD6_2_0077C4CD
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0077E68C6_2_0077E68C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0077A8656_2_0077A865
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007569DB6_2_007569DB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007AE9C16_2_007AE9C1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_00754C556_2_00754C55
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A4CE26_2_007A4CE2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007B0CBB6_2_007B0CBB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079AD6D6_2_0079AD6D
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_00734D006_2_00734D00
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007AEF056_2_007AEF05
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079AF956_2_0079AF95
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007990BB6_2_007990BB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007991706_2_00799170
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A91706_2_007A9170
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0077D1306_2_0077D130
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A51B76_2_007A51B7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007412A06_2_007412A0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079931E6_2_0079931E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007B14786_2_007B1478
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007AF4496_2_007AF449
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007554A96_2_007554A9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A558B6_2_007A558B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0075361C6_2_0075361C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007557E76_2_007557E7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007398406_2_00739840
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0074D9D16_2_0074D9D1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A59976_2_007A5997
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_00759B7B6_2_00759B7B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0077DB8A6_2_0077DB8A
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A5DB76_2_007A5DB7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0077BEA16_2_0077BEA1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079DF5C6_2_0079DF5C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A9FC16_2_007A9FC1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4DEFDE6_2_6C4DEFDE
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4DEB496_2_6C4DEB49
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4DFB366_2_6C4DFB36
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4DF74E6_2_6C4DF74E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4DF37C6_2_6C4DF37C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A900326_2_02A90032
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A9E0CE6_2_02A9E0CE
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A947A76_2_02A947A7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A957316_2_02A95731
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A9CBD06_2_02A9CBD0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A9FB226_2_02A9FB22
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A9FD876_2_02A9FD87
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E100326_2_02E10032
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E892B76_2_02E892B7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E8A2B76_2_02E8A2B7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E742076_2_02E74207
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E777C76_2_02E777C7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E257D76_2_02E257D7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E2A7076_2_02E2A707
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E745E76_2_02E745E7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E765976_2_02E76597
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E70AA76_2_02E70AA7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E7AAA76_2_02E7AAA7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E24BA76_2_02E24BA7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E878076_2_02E87807
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E88F876_2_02E88F87
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E73F576_2_02E73F57
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E6EC376_2_02E6EC37
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E89C176_2_02E89C17
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F73A106_2_02F73A10
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F76BF06_2_02F76BF0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F883B06_2_02F883B0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F733806_2_02F73380
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F29B306_2_02F29B30
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F6E0606_2_02F6E060
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F890406_2_02F89040
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F759C06_2_02F759C0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F886E06_2_02F886E0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F896E06_2_02F896E0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F6FED06_2_02F6FED0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F79ED06_2_02F79ED0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F736306_2_02F73630
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F23FD06_2_02F23FD0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F86C306_2_02F86C30
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F24C006_2_02F24C00
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_1000E0F76_2_1000E0F7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_1000FDB06_2_1000FDB0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_1000FB4B6_2_1000FB4B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_1000575A6_2_1000575A
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_100047D06_2_100047D0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_1000CBF96_2_1000CBF9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007AC0747_2_007AC074
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0075A0FF7_2_0075A0FF
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007483E67_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0078A4F97_2_0078A4F9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007364F07_2_007364F0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007544CD7_2_007544CD
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0077C4CD7_2_0077C4CD
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0077E68C7_2_0077E68C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0077A8657_2_0077A865
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007569DB7_2_007569DB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007AE9C17_2_007AE9C1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_00754C557_2_00754C55
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A4CE27_2_007A4CE2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007B0CBB7_2_007B0CBB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079AD6D7_2_0079AD6D
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_00734D007_2_00734D00
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007AEF057_2_007AEF05
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079AF957_2_0079AF95
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007990BB7_2_007990BB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007991707_2_00799170
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A91707_2_007A9170
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0077D1307_2_0077D130
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A51B77_2_007A51B7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007412A07_2_007412A0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079931E7_2_0079931E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007B14787_2_007B1478
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007AF4497_2_007AF449
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007554A97_2_007554A9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A558B7_2_007A558B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0075361C7_2_0075361C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007557E77_2_007557E7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007398407_2_00739840
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0074D9D17_2_0074D9D1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A59977_2_007A5997
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_00759B7B7_2_00759B7B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0077DB8A7_2_0077DB8A
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A5DB77_2_007A5DB7
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0077BEA17_2_0077BEA1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079DF5C7_2_0079DF5C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A9FC17_2_007A9FC1
                Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSI9F22.tmp CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                Source: Joe Sandbox ViewDropped File: C:\Windows\Installer\MSIA06B.tmp CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                Source: C:\Windows\Installer\MSIA311.tmpCode function: String function: 006C9623 appears 100 times
                Source: C:\Windows\Installer\MSIA311.tmpCode function: String function: 006C9656 appears 69 times
                Source: C:\Windows\Installer\MSIA311.tmpCode function: String function: 006C99E0 appears 39 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0079E524 appears 84 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 007A8345 appears 108 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0073C7C0 appears 124 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 02F26220 appears 48 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 02A95317 appears 31 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0079C30A appears 114 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 00781DF9 appears 32 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 6C4DA060 appears 43 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0074B1BD appears 52 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 02E26DF7 appears 48 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0078E87E appears 32 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0079B4BC appears 160 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 00747518 appears 88 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 007952BF appears 54 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0079C2A1 appears 372 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0079C2D4 appears 50 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0078E8E1 appears 46 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 00735140 appears 60 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 0079D951 appears 48 times
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: String function: 10005340 appears 31 times
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: String function: 00402F0C appears 34 times
                Source: EhSODySB7R.exe, 00000000.00000000.1978377364.0000000000412000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameviewer.exeF vs EhSODySB7R.exe
                Source: EhSODySB7R.exe, 00000000.00000000.1978377364.0000000000412000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAICustAct.dllF vs EhSODySB7R.exe
                Source: EhSODySB7R.exeBinary or memory string: OriginalFilenameviewer.exeF vs EhSODySB7R.exe
                Source: EhSODySB7R.exeBinary or memory string: OriginalFilenameAICustAct.dllF vs EhSODySB7R.exe
                Source: C:\Users\user\Desktop\EhSODySB7R.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\EhSODySB7R.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: tsappcmp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: srclient.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: spp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: powrprof.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: vssapi.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: vsstrace.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: rstrtmgr.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: pcacli.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\System32\msiexec.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windowmanagementapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: inputhost.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: twinapi.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.ui.immersive.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: logoncli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: msi.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: slc.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpSection loaded: apphelp.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: version.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: libcurl32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: taskschd.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: xmllite.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: samcli.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: msvcp60.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: wtsapi32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: msvfw32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: version.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: libcurl32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeSection loaded: uxtheme.dllJump to behavior
                Source: EhSODySB7R.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                Source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_PCRat author = ditekSHen, description = Detects PCRat / Gh0st
                Source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_RDP author = ditekSHen, description = Detects executables embedding registry key / value combination manipulating RDP / Terminal Services
                Source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_PCRat author = ditekSHen, description = Detects PCRat / Gh0st
                Source: classification engineClassification label: mal100.troj.evad.winEXE@11/30@0/1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A91B27 LoadLibraryA,GetProcAddress,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LoadLibraryA,GetProcAddress,6_2_02A91B27
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1EACE GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,CloseHandle,6_2_02F1EACE
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F12C67 memcpy,CreateFileA,WriteFile,CloseHandle,Sleep,GetVersion,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,exit,6_2_02F12C67
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_10001B50 LoadLibraryA,GetProcAddress,OpenProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,LoadLibraryA,GetProcAddress,6_2_10001B50
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0073EFD0 PathIsDirectoryW,GetLogicalDrives,GetDriveTypeW,PathIsDirectoryW,GetDiskFreeSpaceExW,lstrlenW,lstrlenW,SHSetValueW,6_2_0073EFD0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetModuleFileNameA,GetSystemDirectoryA,strlen,_strncoll,wsprintfA,_mbscat,_mbscat,CopyFileA,memset,_mbscpy,OpenSCManagerA,CreateServiceA,LockServiceDatabase,ChangeServiceConfig2A,UnlockServiceDatabase,GetLastError,OpenServiceA,StartServiceA,StartServiceA,_mbscpy,_mbscat,RegOpenKeyA,lstrlen,RegSetValueExA,6_2_02F196EA
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006A6150 CreateToolhelp32Snapshot,CloseHandle,Process32FirstW,OpenProcess,CloseHandle,Process32NextW,CloseHandle,5_2_006A6150
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006A6E50 CoInitialize,CoCreateInstance,VariantInit,VariantClear,IUnknown_QueryService,CoAllowSetForegroundWindow,SysAllocString,SysAllocString,SysAllocString,SysAllocString,VariantInit,LocalFree,OpenProcess,WaitForSingleObject,GetExitCodeProcess,CloseHandle,LocalFree,VariantClear,VariantClear,VariantClear,VariantClear,VariantClear,SysFreeString,VariantClear,CoUninitialize,_com_issue_error,5_2_006A6E50
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_0040134E __EH_prolog3_catch,_memset,_memset,GetTempPathW,GetTempFileNameW,__CxxThrowException@8,FindResourceW,SizeofResource,LoadResource,LockResource,CreateFileW,ShowWindow,ShowWindow,WriteFile,InvalidateRect,ShowWindow,FindCloseChangeNotification,_swprintf,_memset,CreateProcessW,ExitProcess,0_2_0040134E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F193D6 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,memset,GetModuleFileNameA,CreateMutexA,GetLastError,exit,SetUnhandledExceptionFilter,StartServiceCtrlDispatcherA,WSAStartup,Sleep,ExitProcess,SHGetSpecialFolderPathA,GetFileAttributesA,DefineDosDeviceA,CopyFileA,MoveFileExA,SetFileAttributesA,CreateDirectoryA,sprintf,lstrlen,Sleep,6_2_02F193D6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F193D6 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,memset,GetModuleFileNameA,CreateMutexA,GetLastError,exit,SetUnhandledExceptionFilter,StartServiceCtrlDispatcherA,WSAStartup,Sleep,ExitProcess,SHGetSpecialFolderPathA,GetFileAttributesA,DefineDosDeviceA,CopyFileA,MoveFileExA,SetFileAttributesA,CreateDirectoryA,sprintf,lstrlen,Sleep,6_2_02F193D6
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files\Microsoft\??Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeMutant created: \Sessions\1\BaseNamedObjects\154.39.251.117:49780:SRDSL
                Source: C:\Users\user\Desktop\EhSODySB7R.exeFile created: C:\Users\user\AppData\Local\Temp\MSI99F2.tmpJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCommand line argument: OneClientWnd6_2_007445B0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCommand line argument: .z6_2_007A2E30
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCommand line argument: OneClientWnd7_2_007445B0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCommand line argument: .z7_2_007A2E30
                Source: EhSODySB7R.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Installer\MSIA311.tmpFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\EhSODySB7R.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: EhSODySB7R.exeReversingLabs: Detection: 31%
                Source: EhSODySB7R.exeVirustotal: Detection: 52%
                Source: EhSODySB7R.exeString found in binary or memory: ComboBoxListBoxListViewINSERT INTO `` (`Property`, `Order`, `Value`, `Text`,`Binary_`) VALUES (?,?,?,?,?) TEMPORARY` (`Property`, `Order`, `Value`, `Text`) VALUES (?,?,?,?) TEMPORARYSELECT * FROM `%s` WHERE `Property`='%s' AND `Value`='%s'SELECT * FROM `%s` WHERE `Property`='%s'EditSELECT `Message` FROM `Error` WHERE `Error` = %sSELECT `Text` FROM `UIText` WHERE `Key` = '%s'tmpALLUSERS = 1ALLUSERS = 2MSIINSTALLPERUSER = 1AI_PACKAGE_TYPE = "x64"AI_PACKAGE_TYPE = "Intel64"SELECT * FROM `Control` WHERE `Dialog_` = '%s' AND `Control` = '%s'SELECT `Attributes` FROM `Control` WHERE `Dialog_` = '%s' AND `Control` = '%s'$=3WS_BORDERWS_CAPTIONWS_CHILDWS_CHILDWINDOWWS_CLIPCHILDRENWS_CLIPSIBLINGSWS_DISABLEDWS_DLGFRAMEWS_GROUPWS_HSCROLLWS_ICONICWS_SIZEBOXWS_SYSMENUWS_TABSTOPWS_THICKFRAMEWS_VISIBLEWS_VSCROLLWS_MAXIMIZEBOXWS_MAXIMIZEWS_MINIMIZEBOXWS_MINIMIZEWS_OVERLAPPEDWINDOWWS_OVERLAPPEDWS_POPUPWINDOWWS_POPUPWS_TILEDWINDOWWS_TILEDWS_EX_ACCEPTFILESWS_EX_APPWINDOWWS_EX_CLIENTEDGEWS_EX_CONTEXTHELPWS_EX_CONTROLPARENTWS_EX_DLGMODALFRAMEWS_EX_LEFTWS_EX_LEFTSCROLLBARWS_EX_LTRREADINGWS_EX_MDICHILDWS_EX_NOPARENTNOTIFYWS_EX_OVERLAPPEDWINDOWWS_EX_PALETTEWINDOWWS_EX_RTLREADINGWS_EX_STATICEDGEWS_EX_TOOLWINDOWWS_EX_TOPMOSTWS_EX_TRANSPARENTWS_EX_WINDOWEDGEWS_EX_RIGHTSCROLLBARWS_EX_RIGHTWS_EX_LAYEREDWS_EX_NOACTIVATEWS_EX_NOINHERITLAYOUTWS_EX_LAYOUTRTLWS_EX_COMPOSITEDWS_EXAI_TRIAL_MESSAGE_BODYAI_MSM_TRIAL_MESSAGE_BODYAI_APP_FILEAI_README_FILEAI_APP_ARGSAI_RUN_AS_ADMINMsiLogFileLocation[ProgramFilesFolder][LocalAppDataFolder]Programs\[ProgramFiles64Folder][CommonFilesFolder][LocalAppDataFolder]Programs\Common\[CommonFiles64Folder][WindowsFolder][LocalAppDataFolder][SystemFolder][WindowsVolume][ProgramMenuFolder][DesktopFolder][StartupFolder][TemplateFolder][AdminToolsFolder][AI_UserProgramFiles][WindowsVolume]Program Files (x86)\[AI_ProgramFiles][WindowsVolume]Program Files\MIGRATEFindRelatedProductsMigrateFeatureStatesAI_SETMIXINSTLOCATIONAPPDIRAI_RESTORE_LOCATIONSELECT `ActionProperty` FROM `Upgrade`ActionTarget`Action`='SET_APPDIR' OR `Action`='SET_SHORTCUTDIR'CustomActionSET_APPDIRSET_SHORTCUTDIRSHORTCUTDIRProgramMenuFolderAI_SH_INITEDBrowseDlgCancelDlgDiskCostDlgExitDialogMsiRMFilesInUseOutOfDiskDlgOutOfRbDiskDlgDialog_Control_(`Control_` = 'Next' OR `Control_` = 'Install') AND `Event` = 'EndDialog' AND `Argument` = 'Return'ControlEventAI_INSTALLPERUSER = "0"ALLUSERSVersionMsi >= "5.0"2MSIINSTALLPERUSERAI_NEWINSTProductLanguageAI_INTANCE_LOCATIONAI_UPGRADENoLanguageVersionStringInstallLocationAI_REPLACE_PRODUCTSAI_Replaced_Versions_ListAI_Upgrade_Replace_Question_YesBackUp_AI_Upgrade_Question_YesAI_Upgrade_Question_YesAI_Upgrade_Replace_Question_NoBackUp_AI_Upgrade_Question_NoAI_Upgrade_Question_NoYesDELETE FROM `Shortcut` WHERE `Shortcut`.`Directory_`='%s'DELETE FROM `IniFile` WHERE `IniFile`.`Section`='InternetShortcut' AND`IniFile`.`DirProperty`='%s'SELECT * FROM `%s`ShortcutIniFileAI_DESKTOP_SH0AI_STARTMENU_SHAI_STARTUP_SHAI_SHORTCUTSREGNot InstalledDesktopFolderSta
                Source: unknownProcess created: C:\Users\user\Desktop\EhSODySB7R.exe C:\Users\user\Desktop\EhSODySB7R.exe
                Source: C:\Users\user\Desktop\EhSODySB7R.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSI99F2.tmp
                Source: unknownProcess created: C:\Windows\System32\msiexec.exe C:\Windows\system32\msiexec.exe /V
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 96302FF1609113E413E3406A4F20EA8E
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIA311.tmp C:\Windows\Installer\MSIA311.tmp" /EnforcedRunAsAdmin /DontWait /RunAsAdmin "C:\Program Files (x86)\IOPL\gxonecli.exe
                Source: C:\Windows\Installer\MSIA311.tmpProcess created: C:\Program Files (x86)\IOPL\gxonecli.exe "C:\Program Files (x86)\IOPL\gxonecli.exe"
                Source: unknownProcess created: C:\Program Files (x86)\IOPL\gxonecli.exe C:\Program Files (x86)\IOPL\gxonecli.exe
                Source: C:\Users\user\Desktop\EhSODySB7R.exeProcess created: C:\Windows\SysWOW64\msiexec.exe msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSI99F2.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\SysWOW64\msiexec.exe C:\Windows\syswow64\MsiExec.exe -Embedding 96302FF1609113E413E3406A4F20EA8EJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIA311.tmp C:\Windows\Installer\MSIA311.tmp" /EnforcedRunAsAdmin /DontWait /RunAsAdmin "C:\Program Files (x86)\IOPL\gxonecli.exeJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess created: C:\Program Files (x86)\IOPL\gxonecli.exe "C:\Program Files (x86)\IOPL\gxonecli.exe" Jump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
                Source: C:\Windows\System32\msiexec.exeDirectory created: C:\Program Files\Microsoft\??Jump to behavior
                Source: EhSODySB7R.exeStatic file information: File size 2252800 > 1048576
                Source: EhSODySB7R.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x216000
                Source: EhSODySB7R.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: e:\po\trunk\modules\gxonecli\Release\gxonecli.pdb source: gxonecli.exe, 00000006.00000000.2005719174.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000002.2024310338.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000000.2023277833.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe.3.dr
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdbD source: EhSODySB7R.exe, 419d6c.msi.3.dr, MSIA311.tmp.3.dr, MSI99F2.tmp.0.dr
                Source: Binary string: e:\Develope\msi2exe\release\msi2exestub.pdb source: EhSODySB7R.exe
                Source: Binary string: E:\ag\libcurl32\Release\libcurl32.pdb source: gxonecli.exe, 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmp, gxonecli.exe, 00000007.00000002.2024701887.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmp, libcurl32.dll.3.dr
                Source: Binary string: 4e:\po\trunk\modules\gxonecli\Release\gxonecli.pdb source: gxonecli.exe, 00000006.00000000.2005719174.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000002.2024310338.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe, 00000007.00000000.2023277833.00000000007B9000.00000002.00000001.01000000.00000009.sdmp, gxonecli.exe.3.dr
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\AICustAct.pdb source: EhSODySB7R.exe, MSIA06B.tmp.3.dr, MSIA11A.tmp.3.dr, 419d6c.msi.3.dr, MSI9F22.tmp.3.dr, MSIA0DA.tmp.3.dr, MSIA14A.tmp.3.dr, MSI99F2.tmp.0.dr, MSIA0AA.tmp.3.dr
                Source: Binary string: C:\ReleaseAI\win\Release\custact\x86\viewer.pdb source: EhSODySB7R.exe, 419d6c.msi.3.dr, MSIA311.tmp.3.dr, MSI99F2.tmp.0.dr
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_004065BA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,__invoke_watson,GetProcAddress,GetProcAddress,__invoke_watson,0_2_004065BA
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00402F51 push ecx; ret 0_2_00402F64
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 1_2_051BF574 push esp; ret 1_2_051BF581
                Source: C:\Windows\SysWOW64\msiexec.exeCode function: 1_2_051BF50D push esp; ret 1_2_051BF531
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006C9600 push ecx; ret 5_2_006C9613
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079C379 push ecx; ret 6_2_0079C38C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079E569 push ecx; ret 6_2_0079E57C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4D6D45 push ecx; ret 6_2_6C4D6D58
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4DA0A5 push ecx; ret 6_2_6C4DA0B8
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A9535C push ecx; ret 6_2_02A9536F
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E26E77 push eax; ret 6_2_02E26EA5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E26DF7 push eax; ret 6_2_02E26E15
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F262A0 push eax; ret 6_2_02F262CE
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F26220 push eax; ret 6_2_02F2623E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_10005385 push ecx; ret 6_2_10005398
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079C379 push ecx; ret 7_2_0079C38C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079E569 push ecx; ret 7_2_0079E57C

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\System32\msiexec.exeExecutable created and started: C:\Windows\Installer\MSIA311.tmpJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA311.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA0AA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA0DA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA06B.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\IOPL\gxonecli.exeJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA14A.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Program Files (x86)\IOPL\libcurl32.dllJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9F22.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA11A.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA311.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA0AA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA0DA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA06B.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA14A.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSI9F22.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeFile created: C:\Windows\Installer\MSIA11A.tmpJump to dropped file
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SRDSLJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F193D6 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,memset,GetModuleFileNameA,CreateMutexA,GetLastError,exit,SetUnhandledExceptionFilter,StartServiceCtrlDispatcherA,WSAStartup,Sleep,ExitProcess,SHGetSpecialFolderPathA,GetFileAttributesA,DefineDosDeviceA,CopyFileA,MoveFileExA,SetFileAttributesA,CreateDirectoryA,sprintf,lstrlen,Sleep,6_2_02F193D6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007483E6 __EH_prolog3_GS,IsIconic,ScreenToClient,GetCursorPos,ScreenToClient,GetTickCount,GetTickCount,GetActiveWindow,GetWindow,GetWindowLongW,GetParent,SetFocus,DestroyWindow,_memset,BeginPaint,EndPaint,GetClientRect,IsRectEmpty,_memset,BeginPaint,GetUpdateRect,IsRectEmpty,DeleteDC,DeleteDC,DeleteObject,DeleteObject,_memset,CreateCompatibleDC,CreateCompatibleBitmap,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,CreateCompatibleDC,_memset,SelectObject,SendMessageW,BitBlt,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,CreateCompatibleDC,_memset,SelectObject,_memset,BitBlt,SelectObject,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,GetFocus,GetParent,GetParent,GetTickCount,GetTickCount,GetTickCount,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,GetTickCount,SetFocus,GetTickCount,SendMessageW,TrackMouseEvent,GetTickCount,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SetFocus,GetTickCount,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,_memset,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ScreenToClient,GetTickCount,SendMessageW,SetFocus,GetTickCount,6_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007483E6 __EH_prolog3_GS,IsIconic,ScreenToClient,GetCursorPos,ScreenToClient,GetTickCount,GetTickCount,GetActiveWindow,GetWindow,GetWindowLongW,GetParent,SetFocus,DestroyWindow,_memset,BeginPaint,EndPaint,GetClientRect,IsRectEmpty,_memset,BeginPaint,GetUpdateRect,IsRectEmpty,DeleteDC,DeleteDC,DeleteObject,DeleteObject,_memset,CreateCompatibleDC,CreateCompatibleBitmap,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,CreateCompatibleDC,_memset,SelectObject,SendMessageW,BitBlt,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,CreateCompatibleDC,_memset,SelectObject,_memset,BitBlt,SelectObject,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,GetFocus,GetParent,GetParent,GetTickCount,GetTickCount,GetTickCount,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,GetTickCount,SetFocus,GetTickCount,SendMessageW,TrackMouseEvent,GetTickCount,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SetFocus,GetTickCount,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,_memset,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ScreenToClient,GetTickCount,SendMessageW,SetFocus,GetTickCount,6_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007483E6 __EH_prolog3_GS,IsIconic,ScreenToClient,GetCursorPos,ScreenToClient,GetTickCount,GetTickCount,GetActiveWindow,GetWindow,GetWindowLongW,GetParent,SetFocus,DestroyWindow,_memset,BeginPaint,EndPaint,GetClientRect,IsRectEmpty,_memset,BeginPaint,GetUpdateRect,IsRectEmpty,DeleteDC,DeleteDC,DeleteObject,DeleteObject,_memset,CreateCompatibleDC,CreateCompatibleBitmap,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,CreateCompatibleDC,_memset,SelectObject,SendMessageW,BitBlt,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,CreateCompatibleDC,_memset,SelectObject,_memset,BitBlt,SelectObject,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,GetFocus,GetParent,GetParent,GetTickCount,GetTickCount,GetTickCount,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,GetTickCount,SetFocus,GetTickCount,SendMessageW,TrackMouseEvent,GetTickCount,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SetFocus,GetTickCount,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,_memset,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ScreenToClient,GetTickCount,SendMessageW,SetFocus,GetTickCount,6_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007467AC GetWindowRect,GetParent,GetWindow,MonitorFromWindow,GetMonitorInfoW,IsIconic,GetWindowRect,SetWindowPos,6_2_007467AC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007483E6 __EH_prolog3_GS,IsIconic,ScreenToClient,GetCursorPos,ScreenToClient,GetTickCount,GetTickCount,GetActiveWindow,GetWindow,GetWindowLongW,GetParent,SetFocus,DestroyWindow,_memset,BeginPaint,EndPaint,GetClientRect,IsRectEmpty,_memset,BeginPaint,GetUpdateRect,IsRectEmpty,DeleteDC,DeleteDC,DeleteObject,DeleteObject,_memset,CreateCompatibleDC,CreateCompatibleBitmap,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,CreateCompatibleDC,_memset,SelectObject,SendMessageW,BitBlt,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,CreateCompatibleDC,_memset,SelectObject,_memset,BitBlt,SelectObject,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,GetFocus,GetParent,GetParent,GetTickCount,GetTickCount,GetTickCount,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,GetTickCount,SetFocus,GetTickCount,SendMessageW,TrackMouseEvent,GetTickCount,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SetFocus,GetTickCount,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,_memset,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ScreenToClient,GetTickCount,SendMessageW,SetFocus,GetTickCount,7_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007483E6 __EH_prolog3_GS,IsIconic,ScreenToClient,GetCursorPos,ScreenToClient,GetTickCount,GetTickCount,GetActiveWindow,GetWindow,GetWindowLongW,GetParent,SetFocus,DestroyWindow,_memset,BeginPaint,EndPaint,GetClientRect,IsRectEmpty,_memset,BeginPaint,GetUpdateRect,IsRectEmpty,DeleteDC,DeleteDC,DeleteObject,DeleteObject,_memset,CreateCompatibleDC,CreateCompatibleBitmap,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,CreateCompatibleDC,_memset,SelectObject,SendMessageW,BitBlt,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,CreateCompatibleDC,_memset,SelectObject,_memset,BitBlt,SelectObject,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,GetFocus,GetParent,GetParent,GetTickCount,GetTickCount,GetTickCount,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,GetTickCount,SetFocus,GetTickCount,SendMessageW,TrackMouseEvent,GetTickCount,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SetFocus,GetTickCount,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,_memset,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ScreenToClient,GetTickCount,SendMessageW,SetFocus,GetTickCount,7_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007483E6 __EH_prolog3_GS,IsIconic,ScreenToClient,GetCursorPos,ScreenToClient,GetTickCount,GetTickCount,GetActiveWindow,GetWindow,GetWindowLongW,GetParent,SetFocus,DestroyWindow,_memset,BeginPaint,EndPaint,GetClientRect,IsRectEmpty,_memset,BeginPaint,GetUpdateRect,IsRectEmpty,DeleteDC,DeleteDC,DeleteObject,DeleteObject,_memset,CreateCompatibleDC,CreateCompatibleBitmap,_memset,BeginPaint,SelectObject,SaveDC,IsWindow,IsWindowVisible,IntersectRect,CreateCompatibleDC,_memset,SelectObject,SendMessageW,BitBlt,SelectObject,DeleteObject,DeleteDC,RestoreDC,GetWindowRect,CreateCompatibleDC,_memset,SelectObject,_memset,BitBlt,SelectObject,SelectObject,SelectObject,GetStockObject,SelectObject,Rectangle,SelectObject,SaveDC,RestoreDC,EndPaint,GetFocus,GetParent,GetParent,GetTickCount,GetTickCount,GetTickCount,GetTickCount,ScreenToClient,GetTickCount,SendMessageW,GetTickCount,SetFocus,GetTickCount,SendMessageW,TrackMouseEvent,GetTickCount,SendMessageW,IsRectEmpty,IsIconic,GetTickCount,SetFocus,GetTickCount,GetClientRect,SaveDC,GetWindow,GetWindowRect,MapWindowPoints,SetWindowOrgEx,SendMessageW,GetWindow,RestoreDC,SendMessageW,SendMessageW,GetCursorPos,GetWindowRect,IsIconic,GetActiveWindow,PtInRect,SendMessageW,ScreenToClient,SendMessageW,GetTickCount,_memset,SendMessageW,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ScreenToClient,GetTickCount,SendMessageW,SetFocus,GetTickCount,7_2_007483E6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007467AC GetWindowRect,GetParent,GetWindow,MonitorFromWindow,GetMonitorInfoW,IsIconic,GetWindowRect,SetWindowPos,7_2_007467AC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F181AA OpenEventLogA,ClearEventLogA,CloseEventLog,6_2_02F181AA
                Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA0DA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA0AA.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA06B.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA14A.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSIA11A.tmpJump to dropped file
                Source: C:\Windows\System32\msiexec.exeDropped PE file which has not been started: C:\Windows\Installer\MSI9F22.tmpJump to dropped file
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeEvasive API call chain: GetModuleFileName,DecisionNodes,Sleepgraph_6-115431
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcess
                Source: C:\Windows\Installer\MSIA311.tmpCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_5-35815
                Source: C:\Windows\Installer\MSIA311.tmpAPI coverage: 5.5 %
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeAPI coverage: 3.7 %
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeAPI coverage: 2.2 %
                Source: C:\Windows\SysWOW64\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006E19F9 FindFirstFileExW,5_2_006E19F9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007806E3 PathAppendW,_memset,GetCurrentDirectoryW,PathAppendW,GetFileAttributesW,lstrcpyW,lstrcpyW,PathAppendW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcpyW,PathAppendW,FindNextFileW,FindClose,6_2_007806E3
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F12B6F SHGetSpecialFolderPathA,_mbscat,FindFirstFileA,_mbscat,strlen,memcpy,strlen,6_2_02F12B6F
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15802 FindFirstFileA,memset,memcpy,memcpy,memcpy,memset,FindClose,CloseHandle,CreateFileA,6_2_02F15802
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15195 memset,lstrlen,FindFirstFileA,SetFileAttributesA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,6_2_02F15195
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F14FE5 lstrlen,wsprintfA,FindFirstFileA,LocalAlloc,LocalReAlloc,strcmp,strcmp,lstrlen,memcpy,memcpy,memcpy,memcpy,FindNextFileA,LocalFree,FindClose,6_2_02F14FE5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15763 memset,_mbscpy,FindFirstFileA,FindClose,6_2_02F15763
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1557C __EH_prolog,memset,lstrlen,FindFirstFileA,strlen,FindNextFileA,FindClose,6_2_02F1557C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007806E3 PathAppendW,_memset,GetCurrentDirectoryW,PathAppendW,GetFileAttributesW,lstrcpyW,lstrcpyW,PathAppendW,FindFirstFileW,lstrcmpW,lstrcmpW,lstrcpyW,PathAppendW,FindNextFileW,FindClose,7_2_007806E3
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1EB68 GetLogicalDriveStringsA,QueryDosDeviceA,lstrlen,_strncoll,lstrcpy,lstrcpy,lstrcat,6_2_02F1EB68
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A926F6 VirtualQuery,GetSystemInfo,VirtualAlloc,VirtualProtect,6_2_02A926F6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\COMCTL32.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\SysWOW64\KERNELBASE.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\WinSxS\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.19041.2006_none_d94bc80de1097097\gdiplus.dllJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeFile opened: C:\Windows\SysWOW64\KERNEL32.DLLJump to behavior
                Source: gxonecli.exe, 00000006.00000002.3224356518.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll\\w
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeAPI call chain: ExitProcess graph end nodegraph_6-116276
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeAPI call chain: ExitProcess graph end nodegraph_6-116509
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeAPI call chain: ExitProcess graph end nodegraph_6-116696
                Source: C:\Windows\System32\msiexec.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E10032 GetNativeSystemInfo,VirtualAlloc,VirtualAlloc,LoadLibraryA,LdrGetProcedureAddress,VirtualProtect,6_2_02E10032
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1B915 BlockInput,InterlockedExchange,BlockInput,InterlockedExchange,InterlockedExchange,6_2_02F1B915
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_0040214A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040214A
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A9A91B ___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,6_2_02A9A91B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A926F6 VirtualProtect ?,-00000001,00000104,?,?,?,0000001C6_2_02A926F6
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_004065BA LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,__invoke_watson,GetProcAddress,GetProcAddress,__invoke_watson,0_2_004065BA
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006E17F8 mov eax, dword ptr fs:[00000030h]5_2_006E17F8
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006D984F mov ecx, dword ptr fs:[00000030h]5_2_006D984F
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A90AE4 mov eax, dword ptr fs:[00000030h]6_2_02A90AE4
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02E10AE4 mov eax, dword ptr fs:[00000030h]6_2_02E10AE4
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00401D75 GetStartupInfoW,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,___crtGetCommandLineW,___crtGetEnvironmentStringsW,__wsetargv,__amsg_exit,__wsetenvp,__amsg_exit,__cinit,__amsg_exit,__wwincmdln,0_2_00401D75
                Source: C:\Windows\System32\msiexec.exeProcess created: C:\Windows\Installer\MSIA311.tmp C:\Windows\Installer\MSIA311.tmp" /EnforcedRunAsAdmin /DontWait /RunAsAdmin "C:\Program Files (x86)\IOPL\gxonecli.exeJump to behavior
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_0040214A _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0040214A
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00401A49 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00401A49
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_0040421E SetUnhandledExceptionFilter,0_2_0040421E
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00406B47 _raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00406B47
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006C97CD IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_006C97CD
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006CD7C6 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,5_2_006CD7C6
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006C9963 SetUnhandledExceptionFilter,5_2_006C9963
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006C8FA8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,5_2_006C8FA8
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_007A08DC SetUnhandledExceptionFilter,6_2_007A08DC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079C918 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_0079C918
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079B1F0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0079B1F0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_0079B7CB _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_0079B7CB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4D6CCD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,6_2_6C4D6CCD
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_6C4D99BC _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_6C4D99BC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02A94F47 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_02A94F47
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F193D6 GetInputState,GetCurrentThreadId,PostThreadMessageA,GetMessageA,memset,GetModuleFileNameA,CreateMutexA,GetLastError,exit,SetUnhandledExceptionFilter,StartServiceCtrlDispatcherA,WSAStartup,Sleep,ExitProcess,SHGetSpecialFolderPathA,GetFileAttributesA,DefineDosDeviceA,CopyFileA,MoveFileExA,SetFileAttributesA,CreateDirectoryA,sprintf,lstrlen,Sleep,6_2_02F193D6
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_10004F70 SetUnhandledExceptionFilter,UnhandledExceptionFilter,6_2_10004F70
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_007A08DC SetUnhandledExceptionFilter,7_2_007A08DC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079C918 __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_0079C918
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079B1F0 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0079B1F0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 7_2_0079B7CB _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_0079B7CB
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006A75D0 GetWindowsDirectoryW,GetForegroundWindow,ShellExecuteExW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,GetProcessId,AllowSetForegroundWindow,GetModuleHandleW,GetProcAddress,GetProcessId,Sleep,EnumWindows,SetWindowPos,WaitForSingleObject,GetExitCodeProcess,GetWindowThreadProcessId,GetWindowLongW,5_2_006A75D0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F1BDAA _ftol,_ftol,MapVirtualKeyA,keybd_event,6_2_02F1BDAA
                Source: C:\Windows\Installer\MSIA311.tmpProcess created: C:\Program Files (x86)\IOPL\gxonecli.exe "C:\Program Files (x86)\IOPL\gxonecli.exe" Jump to behavior
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F19E21 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,6_2_02F19E21
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00409EB9 cpuid 0_2_00409EB9
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: GetLocaleInfoA,0_2_00409C70
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoW,5_2_006E50B6
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoW,5_2_006DE12F
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoEx,FormatMessageA,5_2_006B2101
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,5_2_006E5185
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoEx,5_2_006C85CD
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetACP,IsValidCodePage,GetLocaleInfoW,5_2_006E4821
                Source: C:\Windows\Installer\MSIA311.tmpCode function: EnumSystemLocalesW,5_2_006E4AC3
                Source: C:\Windows\Installer\MSIA311.tmpCode function: EnumSystemLocalesW,5_2_006E4B0E
                Source: C:\Windows\Installer\MSIA311.tmpCode function: EnumSystemLocalesW,5_2_006E4BA9
                Source: C:\Windows\Installer\MSIA311.tmpCode function: EnumSystemLocalesW,5_2_006DDBB2
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,5_2_006E4C34
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoW,5_2_006E4E87
                Source: C:\Windows\Installer\MSIA311.tmpCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,5_2_006E4FB0
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,6_2_007A40D2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,6_2_007A6470
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,6_2_007A4598
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,6_2_007A46AF
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,6_2_007A4747
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_007A47BB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,6_2_007A29CA
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,6_2_007A2996
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,6_2_007A498D
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_007A4A4E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,6_2_007A4AF1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_007A4AB5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_007A2B09
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,6_2_007A6BB3
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,6_2_007A6D03
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,6_2_0079D1D2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,6_2_007A3546
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,6_2_007A3BB4
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,6_2_007A3E0C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_6C4DE8B5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itow_s,6_2_6C4DE958
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,6_2_6C4DE91C
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoW,GetLocaleInfoW,__alloca_probe_16,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,6_2_6C4E2A61
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,6_2_6C4E2B3B
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,6_2_6C4DE42D
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,6_2_6C4DE522
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoW,_GetPrimaryLen,_strlen,6_2_6C4DE5C9
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,_free,_free,__invoke_watson,GetLocaleInfoW,GetLocaleInfoW,__calloc_crt,GetLocaleInfoW,_free,GetLocaleInfoW,6_2_6C4E05C4
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,6_2_6C4DC592
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,6_2_6C4E2612
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,6_2_6C4DE624
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,6_2_6C4DE7F5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,_memmove,_memmove,_memmove,InterlockedDecrement,_free,_free,_free,_free,_free,_free,_free,_free,_free,InterlockedDecrement,6_2_6C4D8190
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,_free,_free,_free,InterlockedDecrement,InterlockedDecrement,_free,_free,6_2_6C4DD4DC
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __calloc_crt,__malloc_crt,_free,__malloc_crt,_free,_free,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,_free,_free,6_2_6C4DD1EE
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___getlocaleinfo,__malloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,__calloc_crt,GetCPInfo,___crtGetStringTypeA,___crtLCMapStringA,___crtLCMapStringA,InterlockedDecrement,InterlockedDecrement,7_2_007A40D2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,7_2_007A6470
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,GetLocaleInfoA,GetACP,7_2_007A4598
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,7_2_007A46AF
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,_LcidFromHexString,_GetPrimaryLen,_strlen,7_2_007A4747
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,GetLocaleInfoA,GetLocaleInfoA,_strlen,GetLocaleInfoA,_strlen,_TestDefaultLanguage,7_2_007A47BB
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLastError,GetLocaleInfoW,_malloc,GetLocaleInfoW,WideCharToMultiByte,__freea,GetLocaleInfoA,7_2_007A29CA
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _LocaleUpdate::_LocaleUpdate,GetLocaleInfoW,7_2_007A2996
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_LcidFromHexString,GetLocaleInfoA,_TestDefaultLanguage,7_2_007A498D
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _strlen,_strlen,_GetPrimaryLen,EnumSystemLocalesA,7_2_007A4A4E
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __getptd,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_TranslateName,_GetLcidFromLangCountry,_GetLcidFromLanguage,_strlen,EnumSystemLocalesA,GetUserDefaultLCID,_ProcessCodePage,IsValidCodePage,IsValidLocale,GetLocaleInfoA,_strcpy_s,__invoke_watson,GetLocaleInfoA,GetLocaleInfoA,__itoa_s,7_2_007A4AF1
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _strlen,_GetPrimaryLen,EnumSystemLocalesA,7_2_007A4AB5
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,7_2_007A2B09
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,_LocaleUpdate::_LocaleUpdate,___ascii_strnicmp,__tolower_l,__tolower_l,7_2_007A6BB3
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: GetLocaleInfoA,7_2_007A6D03
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___crtGetLocaleInfoA,GetLastError,___crtGetLocaleInfoA,__calloc_crt,___crtGetLocaleInfoA,__calloc_crt,__invoke_watson,___crtGetLocaleInfoW,7_2_0079D1D2
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: ___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,7_2_007A3546
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_num,InterlockedDecrement,InterlockedDecrement,InterlockedDecrement,7_2_007A3BB4
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: __calloc_crt,__malloc_crt,__malloc_crt,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___getlocaleinfo,___free_lconv_mon,InterlockedDecrement,InterlockedDecrement,7_2_007A3E0C
                Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\msiexec.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00404A38 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00404A38
                Source: C:\Program Files (x86)\IOPL\gxonecli.exeCode function: 6_2_02F15A81 memset,memset,strncpy,GetUserNameA,_strcmpi,Sleep,memset,sprintf,memset,sprintf,memset,sprintf,memset,lstrcpy,CloseHandle,6_2_02F15A81
                Source: C:\Windows\Installer\MSIA311.tmpCode function: 5_2_006DE59F GetTimeZoneInformation,5_2_006DE59F
                Source: C:\Users\user\Desktop\EhSODySB7R.exeCode function: 0_2_00401D75 GetStartupInfoW,GetProcessHeap,GetProcessHeap,HeapAlloc,_fast_error_exit,GetVersionExA,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,_fast_error_exit,_fast_error_exit,__RTC_Initialize,__amsg_exit,___crtGetCommandLineW,___crtGetEnvironmentStringsW,__wsetargv,__amsg_exit,__wsetenvp,__amsg_exit,__cinit,__amsg_exit,__wwincmdln,0_2_00401D75
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: bdagent.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Msmpeng.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: ayagent.aye
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: avguard.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: avcenter.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: kxetray.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: avp.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: rtvscan.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: 360tray.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: ashDisp.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: AYAgent.aye
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: QUHLPSVC.EXE
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: RavMonD.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Avgui.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: Mcshield.exe
                Source: gxonecli.exe, 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, gxonecli.exe, 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: K7TSecurity.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: gxonecli.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPE

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: gxonecli.exe PID: 4816, type: MEMORYSTR
                Source: Yara matchFile source: 6.2.gxonecli.exe.a09e27.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.gxonecli.exe.2e10bd7.3.unpack, type: UNPACKEDPE
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure1
                Valid Accounts
                3
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                3
                Disable or Modify Tools
                21
                Input Capture
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomains1
                Replication Through Removable Media
                3
                Command and Scripting Interpreter
                1
                Valid Accounts
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                LSASS Memory11
                Peripheral Device Discovery
                Remote Desktop Protocol21
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts1
                Scheduled Task/Job
                23
                Windows Service
                1
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager1
                Account Discovery
                SMB/Windows Admin Shares3
                Clipboard Data
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts12
                Service Execution
                1
                Scheduled Task/Job
                11
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS4
                File and Directory Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script23
                Windows Service
                1
                File Deletion
                LSA Secrets36
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts11
                Process Injection
                122
                Masquerading
                Cached Domain Credentials141
                Security Software Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items1
                Scheduled Task/Job
                1
                Valid Accounts
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
                Access Token Manipulation
                Proc Filesystem1
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt11
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
                Indicator Removal
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 1384579 Sample: EhSODySB7R.exe Startdate: 01/02/2024 Architecture: WINDOWS Score: 100 36 Malicious sample detected (through community Yara rule) 2->36 38 Antivirus detection for dropped file 2->38 40 Multi AV Scanner detection for dropped file 2->40 42 5 other signatures 2->42 7 msiexec.exe 15 39 2->7         started        11 EhSODySB7R.exe 1 2->11         started        13 gxonecli.exe 2->13         started        process3 file4 24 C:\Windows\Installer\MSIA311.tmp, PE32 7->24 dropped 26 C:\Windows\Installer\MSIA14A.tmp, PE32 7->26 dropped 28 C:\Windows\Installer\MSIA11A.tmp, PE32 7->28 dropped 32 7 other malicious files 7->32 dropped 44 Drops executables to the windows directory (C:\Windows) and starts them 7->44 15 MSIA311.tmp 1 7->15         started        17 msiexec.exe 7->17         started        30 C:\Users\user\AppData\Local\...\MSI99F2.tmp, Composite 11->30 dropped 19 msiexec.exe 4 11->19         started        signatures5 process6 process7 21 gxonecli.exe 1 1 15->21         started        dnsIp8 34 154.39.251.117, 49780 COGENT-174US United States 21->34

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                EhSODySB7R.exe32%ReversingLabsWin32.Trojan.Generic
                EhSODySB7R.exe52%VirustotalBrowse
                SourceDetectionScannerLabelLink
                C:\Windows\Installer\419d6c.msi100%AviraTR/Agent.tqvbm
                C:\Users\user\AppData\Local\Temp\MSI99F2.tmp100%AviraTR/Agent.tqvbm
                C:\Program Files (x86)\IOPL\gxonecli.exe3%ReversingLabs
                C:\Program Files (x86)\IOPL\gxonecli.exe3%VirustotalBrowse
                C:\Program Files (x86)\IOPL\libcurl32.dll62%ReversingLabsWin32.Trojan.Generic
                C:\Program Files (x86)\IOPL\libcurl32.dll32%VirustotalBrowse
                C:\Windows\Installer\MSI9F22.tmp0%ReversingLabs
                C:\Windows\Installer\MSI9F22.tmp1%VirustotalBrowse
                C:\Windows\Installer\MSIA06B.tmp0%ReversingLabs
                C:\Windows\Installer\MSIA06B.tmp1%VirustotalBrowse
                C:\Windows\Installer\MSIA0AA.tmp0%ReversingLabs
                C:\Windows\Installer\MSIA0AA.tmp1%VirustotalBrowse
                C:\Windows\Installer\MSIA0DA.tmp0%ReversingLabs
                C:\Windows\Installer\MSIA0DA.tmp1%VirustotalBrowse
                C:\Windows\Installer\MSIA11A.tmp0%ReversingLabs
                C:\Windows\Installer\MSIA11A.tmp1%VirustotalBrowse
                C:\Windows\Installer\MSIA14A.tmp0%ReversingLabs
                C:\Windows\Installer\MSIA14A.tmp1%VirustotalBrowse
                C:\Windows\Installer\MSIA311.tmp0%ReversingLabs
                C:\Windows\Installer\MSIA311.tmp0%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://schemas.microsoft0%URL Reputationsafe
                http://schemas.microsoft0%URL Reputationsafe
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.microsoftgxonecli.exe, 00000006.00000002.3224599658.0000000002A80000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                154.39.251.117
                unknownUnited States
                174COGENT-174UStrue
                Joe Sandbox version:39.0.0 Ruby
                Analysis ID:1384579
                Start date and time:2024-02-01 09:13:08 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 18s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:10
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:EhSODySB7R.exe
                renamed because original name is a hash value
                Original Sample Name:0a73f48ffa71f2ba878056373570aa08.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@11/30@0/1
                EGA Information:
                • Successful, ratio: 80%
                HCA Information:
                • Successful, ratio: 99%
                • Number of executed functions: 51
                • Number of non-executed functions: 335
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target msiexec.exe, PID 5696 because there are no executed function
                • Report size exceeded maximum capacity and may have missing disassembly code.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                09:13:57Task SchedulerRun new task: asphost path: C:\Program Files (x86)\IOPL\gxonecli.exe
                09:14:38API Interceptor4x Sleep call for process: gxonecli.exe modified
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                COGENT-174USqmF3fz3Zn4.exeGet hashmaliciousGuLoaderBrowse
                • 38.6.193.13
                NEW_ORDER_LIST.exeGet hashmaliciousFormBookBrowse
                • 154.55.172.8
                bmRxqHHniX.exeGet hashmaliciousPureLog StealerBrowse
                • 38.170.242.108
                SecuriteInfo.com.Program.Itva.3.25171.4872.exeGet hashmaliciousUnknownBrowse
                • 149.5.241.43
                SecuriteInfo.com.Program.Itva.3.25171.4872.exeGet hashmaliciousUnknownBrowse
                • 149.5.241.43
                bDGMxPWACb.elfGet hashmaliciousMiraiBrowse
                • 38.37.189.103
                Cu0TlnUNJM.elfGet hashmaliciousMiraiBrowse
                • 204.217.21.237
                ygrD2R1gGn.elfGet hashmaliciousMiraiBrowse
                • 38.72.173.4
                HFx7lxkDe7.elfGet hashmaliciousMiraiBrowse
                • 204.241.248.195
                paraiso.x86.elfGet hashmaliciousMiraiBrowse
                • 38.9.235.17
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                C:\Windows\Installer\MSIA06B.tmpScreenBeam_Conference_Windows.msiGet hashmaliciousUnknownBrowse
                  ScreenBeam_Conference_Windows.msiGet hashmaliciousUnknownBrowse
                    ScreenBeam_Conference_Windows.msiGet hashmaliciousUnknownBrowse
                      App_version 3.1.msiGet hashmaliciousRedLine, SectopRATBrowse
                        promot_s.msiGet hashmaliciousLummaC StealerBrowse
                          njYYgDgfwY.msiGet hashmaliciousUnknownBrowse
                            Psiphon_3.179.msiGet hashmaliciousHTMLPhisherBrowse
                              q39Ns83JoJ.lnkGet hashmaliciousNetSupport RATBrowse
                                Driver.Booster.10.6.0.141.msiGet hashmaliciousUnknownBrowse
                                  C:\Windows\Installer\MSI9F22.tmpScreenBeam_Conference_Windows.msiGet hashmaliciousUnknownBrowse
                                    ScreenBeam_Conference_Windows.msiGet hashmaliciousUnknownBrowse
                                      ScreenBeam_Conference_Windows.msiGet hashmaliciousUnknownBrowse
                                        App_version 3.1.msiGet hashmaliciousRedLine, SectopRATBrowse
                                          promot_s.msiGet hashmaliciousLummaC StealerBrowse
                                            njYYgDgfwY.msiGet hashmaliciousUnknownBrowse
                                              Psiphon_3.179.msiGet hashmaliciousHTMLPhisherBrowse
                                                q39Ns83JoJ.lnkGet hashmaliciousNetSupport RATBrowse
                                                  Driver.Booster.10.6.0.141.msiGet hashmaliciousUnknownBrowse
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:modified
                                                    Size (bytes):1508
                                                    Entropy (8bit):5.726712386792038
                                                    Encrypted:false
                                                    SSDEEP:24:JmBFhFhc4GvjZDLN6ezhFjEhFOarhFJvxhFvhFxtd0o6X/j5V94ADzN9EXf4d7:JmXhFSPvlD4YhFjEhFThFJphFvhFxtd6
                                                    MD5:169E5A828FB4A5117E6F9E003C956263
                                                    SHA1:757B5D260585AE7D89C65FE79D57F391EC9090F1
                                                    SHA-256:C771F0E67D9A3EC3408EC992E4264056F679AC4F9654777728699A80353FA39E
                                                    SHA-512:CBFF7D83E8DDB5C061E38A50D96104F95E09CB01E58D61F4503B1AF25042048E612A559BEB5EF5285F860A74A2FB8BA976D7C6784E992309FAF4F94CDCFC770B
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:...@IXOS.@.....@.IAX.@.....@.....@.....@.....@.....@......&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}...R}...........MSI99F2.tmp.@.....@.....@.....@........&.{B90B9E45-791A-4A8D-8B67-CBEA2772C018}.....@.....@.....@.....@.......@.....@.....@.......@.......R}...............Rollback..ck(W.V.n.d\O:.....RollbackCleanup..ck(W Rd..Y.N.e.N...e.N:. .[.1.].....ProcessComponents..ck(W.f.e.~.N.l.Qh...&.{76B9ACC9-E7DA-4F13-B9E8-560738840445}&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}.@......&.{727A60A0-480F-49E2-BA53-373CEAD7DEB8}&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}.@......&.{AB01729D-65CC-4E42-A533-9B224936F9CC}&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}.@......&.{28865FE5-54AE-48FF-84CC-0EBFC9C835A3}&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}.@......&.{A29DB99C-5B2D-4B00-B18D-AB9ADC0D86B9}&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}.@........CreateFolders..ck(W.R.^.e.N9Y...e.N9Y:. .[.1.].#...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.i.c.r.o.s.o.f.t.\..R}.\..@........InstallFiles..ck(W.Y6R.e.e.N...e.N:. .[.1.]....v
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):776440
                                                    Entropy (8bit):6.625644436100867
                                                    Encrypted:false
                                                    SSDEEP:12288:LNLFGT0If4OUB8S/16jfKiTxLybL5LQFXYYTsyzR5bUmvCgzPGVa4mmhHN1aAeQB:3Cf0B8S/cqLm3UmvCgzPMa4mmhHNY5sP
                                                    MD5:206A390B01B76BA387EA40C4A72622CC
                                                    SHA1:5A9991DA5DF48174E6CD1A9620E21B7E32349E9E
                                                    SHA-256:5A1458D8EDCE0E31B63180B5E94F20ED7AFFB453A6B3EA939091399E80C1FA18
                                                    SHA-512:3BDC7E02E0830844FCD929C41A5E6FB43AC8062D99AD54155EE44BA8545939134DDCFE036E4029AA84BA3E80F5AC9DAC108F9E7F194BE931D5FFE30B063B5EAE
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    • Antivirus: Virustotal, Detection: 3%, Browse
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........0...^F..^F..^F..F..^F..F..^F..0F..^F..F..^F..F|.^F..3F..^F..%F..^F.._F..^F..F..^F..F..^F..F..^FRich..^F........................PE..L......e.................z...,...................@.......................................@..................................1..@.......T....................p..Hy......................................@...............l............................text....y.......z.................. ..`.rdata..h............~..............@..@.data...8p...`...>...D..............@....rsrc...T...........................@..@.reloc......p......................@..B................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):105947
                                                    Entropy (8bit):6.417796243745669
                                                    Encrypted:false
                                                    SSDEEP:1536:bSEU4dhPCYUkygYdag0bBOwznUlaCnZw6x0wLlYEfucv3l8mg8yfD+xpje:lh6rk1eaBn+9Xx0mK01i3
                                                    MD5:03A345801C7C30EA2B59C84050FBC4DA
                                                    SHA1:663FF96ED5971FA4921828569A64E0E948283244
                                                    SHA-256:1B4BF484BE1CCC849CE246EE64C19A69A4C979E552EFEE9CBB87ECF27BCD458F
                                                    SHA-512:19059494843BDBE6721F55F12F0C3605BBD2E02EA4F491CA22DD01ECDAD6D2F671D4491F0B5BA92607E268E0DE0504F766174306179D725CEB8DBC37873F32D6
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:^......?S?t.....7td+.............d....^....5r..u7Z..............?2.z....[............?2.x....?2.b......?2.n......?2.l.......?2.j....?......?..?......?..r...?......?......?..V....?:.z....?*.x....?".d....?2.l....?".j....?".h...p..>..q...p....q....p...>...q....p...>...p...>....q.....q....>....q....p...>..p...>..>...q.....q....>....q....p...>..p...>...q......p...p2."....>".#...q2. .......>*.,....q2.-.....>:.+...q2.(.......p2.........>:.....>...>...>...>:.$.....*..>*.....q2.........p...q.......q....q.......q....>...q.....q2.6.....>".4...p2.5....>2.2...>2.3....q2.0.....>*.>...q2.?.......>*.;....q2.8.....p2.&....>".'...^.......o.=F^....=n;2.~....?2.Z.....?2.P....?2.R...;..;2.^...?....I`..;...?..?.;...;..?...I..Ie...?..?.;..?.;2.......;..I..Ie...?..?.;2."...?.;2.......;..I..Ie..;...?..?.;2.r.....;..?...I..Ie...?..?.;.?.;2.......;..I..Ie;2.6....?..?.;2.V.....;..?...I..Ie;...?..?.;2....
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):116224
                                                    Entropy (8bit):6.329790671133909
                                                    Encrypted:false
                                                    SSDEEP:1536:jBfleO6Yd/gkgv2PcNREDHsdoXvUCbdC6cnyJzu42pnMCBQO+StJz3Uza:jBMYd/gkRDrzRb8429MCBfltJzkz
                                                    MD5:FEA7F6C6782854EE83009239F9875A06
                                                    SHA1:0CCF3BBF1891AC6B3B04E463749EF2A8A3D7B2A1
                                                    SHA-256:A716B98847454CF63775D119AB122421D8E224CD1DA93EE4DDE1894A049DA375
                                                    SHA-512:E774493C87CA1E554380AFFDC1D6FCDBF12E843F76EF9A288167FDA7278B48A355B965DC8B720C3786E0569E8E6AB6326E36A2FD31D647836F00B08532198EE8
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 62%
                                                    • Antivirus: Virustotal, Detection: 32%, Browse
                                                    Reputation:low
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........p..g#..g#..g#..#..g#..#..g#..#..g#...#..g#..f#..g#..#..g#..#..g#..#..g#Rich..g#........................PE..L.....e...........!.....6...........g.......P............................... .......K....@......................... ...........P...............................<....Q..............................x...@............P..H............................text....4.......6.................. ..`.rdata...S...P...T...:..............@..@.data....4..........................@....rsrc...............................@..@.reloc........... ..................@..B........................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1006555
                                                    Entropy (8bit):6.175343964903649
                                                    Encrypted:false
                                                    SSDEEP:12288:8n5aZqiNQJz/o17bt/jJNrCwP4N8pVdG6l5jK3mbIvDG9/ai1:85aZqiNo2NrFS6l5OeZVaO
                                                    MD5:BC01E4FC50AFAC7D48A76FCEBC611021
                                                    SHA1:DB2BE3D2FE2DDD0CE9F71582D5F3DBBCA4F25D1A
                                                    SHA-256:E6232900290EE2A856C2386BAAFD8FB2D92C4DAAFC1F367B02964C7FCBA4F80E
                                                    SHA-512:06B74E2D38F6E51AE030F57F46D187EA87B4C65BFBCAC65F5FDE59EDEAFB64D71A269D839A24F61A211ED253A8EEA9BE7980BE047EDF491C2031C765C4AC6919
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:^......?S?t.....7td.......M...d....^....5r..u7Z..............?2.z....[............?2.x....?2.b......?2.n......?2.l.......?2.j....?......?..?......?..r...?......?......?..V....?:.z....?*.x....?".d....?2.l....?".j....?".h...p..>..q...p....q....p...>...q....p...>...p...>....q.....q....>....q....p...>..p...>..>...q.....q....>....q....p...>..p...>...q......p...p2."....>".#...q2. .......>*.,....q2.-.....>:.+...q2.(.......p2.........>:.....>...>...>...>:.$.....*..>*.....q2.........p...q.......q....q.......q....>...q.....q2.6.....>".4...p2.5....>2.2...>2.3....q2.0.....>*.>...q2.?.......>*.;....q2.8.....p2.&....>".'...^.......o.=F^....=n;2.~....?2.Z.....?2.P....?2.R...;..;2.^...?....I`..;...?..?.;...;..?...I..Ie...?..?.;..?.;2.......;..I..Ie...?..?.;2."...?.;2.......;..I..Ie..;...?..?.;2.r.....;..?...I..Ie...?..?.;.?.;2.......;..I..Ie;2.6....?..?.;2.V.....;..?...I..Ie;...?..?.;2....
                                                    Process:C:\Users\user\Desktop\EhSODySB7R.exe
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {B90B9E45-791A-4A8D-8B67-CBEA2772C018}, Number of Words: 2, Subject: ...., Author: Microsoft, Name of Creating Application: ...., Template: x64;2052, Comments: Installer .... , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Jan 1 15:22:46 2024, Number of Pages: 200
                                                    Category:dropped
                                                    Size (bytes):2179072
                                                    Entropy (8bit):7.256929191663023
                                                    Encrypted:false
                                                    SSDEEP:49152:VsO7+DqJsDEiD3PTFRd5CWpk+q4o5q8g73ivJ+hnGkxl52ZeyN5Z:57+uKTFw+XAYhnV7Ip
                                                    MD5:E65996714921C9E1A272079A520A9BF6
                                                    SHA1:0563F428EA2A433E8E95FA1201978BAFA3319E55
                                                    SHA-256:4627F020D2544FC1D8FF070A5643E038BA94EEC044F1668C9F130428DC82E0E3
                                                    SHA-512:6A6528FA10DB751FC90250A3DE6961A87CF88BF95836EC20157E5B7CBBBD5080AE0B871AF8FF6B569DF5CB71749BBB174C267195BD7C9D3EDBBE2BF45B14800A
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Reputation:low
                                                    Preview:......................>..................."...................................|.......y...............................u...v...w...x...y...z...{...|...}...~..............................................................................................................................................................................................................................................................................................................................................................................................."...4........................................................................................... ...!...,...2...$...%...&...'...(...)...*...+.......-......./...0...1...5...3...:...=...6...7...8...9...7...;...<.......>...?...@...A...B...6...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e.......g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {B90B9E45-791A-4A8D-8B67-CBEA2772C018}, Number of Words: 2, Subject: ...., Author: Microsoft, Name of Creating Application: ...., Template: x64;2052, Comments: Installer .... , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Jan 1 15:22:46 2024, Number of Pages: 200
                                                    Category:dropped
                                                    Size (bytes):2179072
                                                    Entropy (8bit):7.256929191663023
                                                    Encrypted:false
                                                    SSDEEP:49152:VsO7+DqJsDEiD3PTFRd5CWpk+q4o5q8g73ivJ+hnGkxl52ZeyN5Z:57+uKTFw+XAYhnV7Ip
                                                    MD5:E65996714921C9E1A272079A520A9BF6
                                                    SHA1:0563F428EA2A433E8E95FA1201978BAFA3319E55
                                                    SHA-256:4627F020D2544FC1D8FF070A5643E038BA94EEC044F1668C9F130428DC82E0E3
                                                    SHA-512:6A6528FA10DB751FC90250A3DE6961A87CF88BF95836EC20157E5B7CBBBD5080AE0B871AF8FF6B569DF5CB71749BBB174C267195BD7C9D3EDBBE2BF45B14800A
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Reputation:low
                                                    Preview:......................>..................."...................................|.......y...............................u...v...w...x...y...z...{...|...}...~..............................................................................................................................................................................................................................................................................................................................................................................................."...4........................................................................................... ...!...,...2...$...%...&...'...(...)...*...+.......-......./...0...1...5...3...:...=...6...7...8...9...7...;...<.......>...?...@...A...B...6...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e.......g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):602432
                                                    Entropy (8bit):6.4696654484377945
                                                    Encrypted:false
                                                    SSDEEP:6144:waFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOlKmN9ysU5pvs8g73iK:JYL9HXVW0xOA+KlZC4vA55s8g73iK
                                                    MD5:A9941233B9415B479D3B4F3732161EAB
                                                    SHA1:CB2D99AF52B3B1C712943B13E45D85C80C732E57
                                                    SHA-256:CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                                                    SHA-512:CFD6C425587E5E7C57B6F4655E2A48C871313E2BACF63CC0955CCAE1A384610644F26AA76BEE0A2A327CD77C2AE7DEF8EA9CB0C7C7C87FAB1C8196BAC82037F7
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Joe Sandbox View:
                                                    • Filename: ScreenBeam_Conference_Windows.msi, Detection: malicious, Browse
                                                    • Filename: ScreenBeam_Conference_Windows.msi, Detection: malicious, Browse
                                                    • Filename: ScreenBeam_Conference_Windows.msi, Detection: malicious, Browse
                                                    • Filename: App_version 3.1.msi, Detection: malicious, Browse
                                                    • Filename: promot_s.msi, Detection: malicious, Browse
                                                    • Filename: njYYgDgfwY.msi, Detection: malicious, Browse
                                                    • Filename: Psiphon_3.179.msi, Detection: malicious, Browse
                                                    • Filename: q39Ns83JoJ.lnk, Detection: malicious, Browse
                                                    • Filename: Driver.Booster.10.6.0.141.msi, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u.u.u.L.v.u.L.p.4.u.;.q.u.;.v.u.;.p..u.L.q.u.L.s.u.L.t.u.t.!.u..|...u..u.u...u...u..w.u.Rich..u.........PE..L......d.........."!...$.>...........Y.......P...............................0............@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):602432
                                                    Entropy (8bit):6.4696654484377945
                                                    Encrypted:false
                                                    SSDEEP:6144:waFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOlKmN9ysU5pvs8g73iK:JYL9HXVW0xOA+KlZC4vA55s8g73iK
                                                    MD5:A9941233B9415B479D3B4F3732161EAB
                                                    SHA1:CB2D99AF52B3B1C712943B13E45D85C80C732E57
                                                    SHA-256:CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                                                    SHA-512:CFD6C425587E5E7C57B6F4655E2A48C871313E2BACF63CC0955CCAE1A384610644F26AA76BEE0A2A327CD77C2AE7DEF8EA9CB0C7C7C87FAB1C8196BAC82037F7
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Joe Sandbox View:
                                                    • Filename: ScreenBeam_Conference_Windows.msi, Detection: malicious, Browse
                                                    • Filename: ScreenBeam_Conference_Windows.msi, Detection: malicious, Browse
                                                    • Filename: ScreenBeam_Conference_Windows.msi, Detection: malicious, Browse
                                                    • Filename: App_version 3.1.msi, Detection: malicious, Browse
                                                    • Filename: promot_s.msi, Detection: malicious, Browse
                                                    • Filename: njYYgDgfwY.msi, Detection: malicious, Browse
                                                    • Filename: Psiphon_3.179.msi, Detection: malicious, Browse
                                                    • Filename: q39Ns83JoJ.lnk, Detection: malicious, Browse
                                                    • Filename: Driver.Booster.10.6.0.141.msi, Detection: malicious, Browse
                                                    Reputation:moderate, very likely benign file
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u.u.u.L.v.u.L.p.4.u.;.q.u.;.v.u.;.p..u.L.q.u.L.s.u.L.t.u.t.!.u..|...u..u.u...u...u..w.u.Rich..u.........PE..L......d.........."!...$.>...........Y.......P...............................0............@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):602432
                                                    Entropy (8bit):6.4696654484377945
                                                    Encrypted:false
                                                    SSDEEP:6144:waFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOlKmN9ysU5pvs8g73iK:JYL9HXVW0xOA+KlZC4vA55s8g73iK
                                                    MD5:A9941233B9415B479D3B4F3732161EAB
                                                    SHA1:CB2D99AF52B3B1C712943B13E45D85C80C732E57
                                                    SHA-256:CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                                                    SHA-512:CFD6C425587E5E7C57B6F4655E2A48C871313E2BACF63CC0955CCAE1A384610644F26AA76BEE0A2A327CD77C2AE7DEF8EA9CB0C7C7C87FAB1C8196BAC82037F7
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u.u.u.L.v.u.L.p.4.u.;.q.u.;.v.u.;.p..u.L.q.u.L.s.u.L.t.u.t.!.u..|...u..u.u...u...u..w.u.Rich..u.........PE..L......d.........."!...$.>...........Y.......P...............................0............@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):602432
                                                    Entropy (8bit):6.4696654484377945
                                                    Encrypted:false
                                                    SSDEEP:6144:waFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOlKmN9ysU5pvs8g73iK:JYL9HXVW0xOA+KlZC4vA55s8g73iK
                                                    MD5:A9941233B9415B479D3B4F3732161EAB
                                                    SHA1:CB2D99AF52B3B1C712943B13E45D85C80C732E57
                                                    SHA-256:CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                                                    SHA-512:CFD6C425587E5E7C57B6F4655E2A48C871313E2BACF63CC0955CCAE1A384610644F26AA76BEE0A2A327CD77C2AE7DEF8EA9CB0C7C7C87FAB1C8196BAC82037F7
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u.u.u.L.v.u.L.p.4.u.;.q.u.;.v.u.;.p..u.L.q.u.L.s.u.L.t.u.t.!.u..|...u..u.u...u...u..w.u.Rich..u.........PE..L......d.........."!...$.>...........Y.......P...............................0............@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):602432
                                                    Entropy (8bit):6.4696654484377945
                                                    Encrypted:false
                                                    SSDEEP:6144:waFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOlKmN9ysU5pvs8g73iK:JYL9HXVW0xOA+KlZC4vA55s8g73iK
                                                    MD5:A9941233B9415B479D3B4F3732161EAB
                                                    SHA1:CB2D99AF52B3B1C712943B13E45D85C80C732E57
                                                    SHA-256:CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                                                    SHA-512:CFD6C425587E5E7C57B6F4655E2A48C871313E2BACF63CC0955CCAE1A384610644F26AA76BEE0A2A327CD77C2AE7DEF8EA9CB0C7C7C87FAB1C8196BAC82037F7
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u.u.u.L.v.u.L.p.4.u.;.q.u.;.v.u.;.p..u.L.q.u.L.s.u.L.t.u.t.!.u..|...u..u.u...u...u..w.u.Rich..u.........PE..L......d.........."!...$.>...........Y.......P...............................0............@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):602432
                                                    Entropy (8bit):6.4696654484377945
                                                    Encrypted:false
                                                    SSDEEP:6144:waFYTdIO9QmvIeVKVhaxkSBULBA4tKSM3BZC4o4AOlKmN9ysU5pvs8g73iK:JYL9HXVW0xOA+KlZC4vA55s8g73iK
                                                    MD5:A9941233B9415B479D3B4F3732161EAB
                                                    SHA1:CB2D99AF52B3B1C712943B13E45D85C80C732E57
                                                    SHA-256:CE34CC14E8D26119E1BF28A3A8368DA6E10D13851004E2675976C5AD58B122E2
                                                    SHA-512:CFD6C425587E5E7C57B6F4655E2A48C871313E2BACF63CC0955CCAE1A384610644F26AA76BEE0A2A327CD77C2AE7DEF8EA9CB0C7C7C87FAB1C8196BAC82037F7
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............u.u.u.L.v.u.L.p.4.u.;.q.u.;.v.u.;.p..u.L.q.u.L.s.u.L.t.u.t.!.u..|...u..u.u...u...u..w.u.Rich..u.........PE..L......d.........."!...$.>...........Y.......P...............................0............@.........................`X..d....a..,.......................@=.......h.....p...................@...........@............P..h............................text....=.......>.................. ..`.rdata...,...P.......B..............@..@.data...8%...........p..............@....rsrc...............................@..@.reloc...h.......j..................@..B........................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):2074
                                                    Entropy (8bit):5.356624676094373
                                                    Encrypted:false
                                                    SSDEEP:48:JLXhFSPvlDzVbdoXwjKo/lTLNs1v0c0odBA75VVoiitYC4dh:JLXhIVLNTZMg5VVoi7
                                                    MD5:95BF93400340F2E5F1F3C1D478C65DD8
                                                    SHA1:3E26BFC9437416EFBCF549FCDD076061D1C39BF9
                                                    SHA-256:A26E259EA393E5AC1D1A407ECC4533D26082E93E45EB2B9151F38CDF3C44419A
                                                    SHA-512:4AF4747DE8F50E818F1DD8EBC9D2257BD75E6E2F0759F168E9CBD6C2D524C015C98910B8E2CC56239B661DF7913C8C86AF55DDCBE221ECD62AE0B0A9CE9D83D2
                                                    Malicious:false
                                                    Preview:...@IXOS.@.....@.IAX.@.....@.....@.....@.....@.....@......&.{C9747B50-6C7A-41A1-8B0A-F027245A29DE}...R}...........MSI99F2.tmp.@.....@.....@.....@........&.{B90B9E45-791A-4A8D-8B67-CBEA2772C018}.....@.....@.....@.....@.......@.....@.....@.......@.......R}...............Rollback..ck(W.V.n.d\O:.....RollbackCleanup..ck(W Rd..Y.N.e.N...e.N:. .[.1.]....@.......@........ProcessComponents..ck(W.f.e.~.N.l.Qh....@.....@.....@.]....&.{76B9ACC9-E7DA-4F13-B9E8-560738840445}..C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.i.c.r.o.s.o.f.t.\..R}.\..@.......@.....@.....@......&.{727A60A0-480F-49E2-BA53-373CEAD7DEB8}%.0.2.:.\.S.o.f.t.w.a.r.e.\.M.i.c.r.o.s.o.f.t.\..R}.........\.V.e.r.s.i.o.n..@.......@.....@.....@......&.{AB01729D-65CC-4E42-A533-9B224936F9CC}".C:\Program Files (x86)\IOPL\kl.had.@.......@.....@.....@......&.{28865FE5-54AE-48FF-84CC-0EBFC9C835A3}(.C:\Program Files (x86)\IOPL\gxonecli.exe.@.......@.....@.....@......&.{A29DB99C-5B2D-4B00-B18D-AB9ADC0D86B9}).C:\Program Files (x86)\IOPL\libcurl32.dll.@..
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):429568
                                                    Entropy (8bit):6.534588738111638
                                                    Encrypted:false
                                                    SSDEEP:12288:tbiQnSDqYisDEiD3jbTFiuiSiO+kP53nUNlQ:tbvnSDqJsDEiD3PTFTFiS53UNW
                                                    MD5:1458A72D86B87E1329CFC549B98D1E4D
                                                    SHA1:00D73B4E31B7395EE4BCCAB5B456D1D91C407AB9
                                                    SHA-256:E6368DAD109C3710E17A2B6C123BAFF05B424A3653B5C094E7621AF37A8C824B
                                                    SHA-512:4A7A32F1AE336B2377D3EA476481E8FE4BFAAAF12488CF024E7150DD26A4148DED762442F665EA4A69169D458ADF8DC717A73FF4C8BCD6F34E3A6FD4536B1E46
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......:..M~m..~m..~m......sm.......m......mm......im....../m......im.......m......gm..~m...m..j...dm..j.s..m..~m...m..j....m..Rich~m..........PE..L......d.........."....$.........................@.................................sf....@..................................4..........8........................:..@...p...............................@...............l............................text...F........................... ..`.rdata...R.......T..................@..@.data....7...P.......,..............@....rsrc...8............F..............@..@.reloc...:.......<...R..............@..B................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.164051437691326
                                                    Encrypted:false
                                                    SSDEEP:12:JSbX72FjuiAGiLIlHVRpY5h/7777777777777777777777777vDHFCdKovjRspdz:JjQI5ew7JF
                                                    MD5:B72072AD2691DD6AD611813845C8DF79
                                                    SHA1:FCE4201FAA6DA90A6FBF69348E4722AB3EAB57D3
                                                    SHA-256:318B604894594C0B116CB51F8FCB4EECB98D0F890E5FD201FCF3E9845FF0277F
                                                    SHA-512:678FF6FB5434A036038573E340B5701CCE8756E8F77D88776C6E35ED60BF72C26A4CB40BC8719D37FA3DD375885639498459A480E5C9C24388521F9525CEC1A9
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.502516201859326
                                                    Encrypted:false
                                                    SSDEEP:48:48PhOuRc06WXJmjT53AnnHbqdbSkdoAEkrCy6o7daSkdWTk:HhO19jTm25RCDfF
                                                    MD5:C3E81CE819018BA873A5DC571AC12616
                                                    SHA1:11359EA7D31265BE60269BCDAE5F3FDE5A888FC9
                                                    SHA-256:55EB5FCBB7DE48071635582A83105618E2FC80E456710FD635E828B1BE82CB95
                                                    SHA-512:56FC3F65A1AB1A9ADF2E2066B1EE55FAD056C2EE4005B7F4A5995B05A611A2532A6EA5E2AD087D7B5A9820A01F78B8A2DB62EC334E1EC819B60B501834DF16D1
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):364483
                                                    Entropy (8bit):5.365485968553111
                                                    Encrypted:false
                                                    SSDEEP:1536:6qELG7gK+RaOOp3LCCpfmLgYI66xgFF9Sq8K6MAS2OMUHl6Gin327D22A26KgauM:zTtbmkExhMJCIpEt
                                                    MD5:568DED1D8C1AD74F48CC5393265AABF7
                                                    SHA1:0534E7773DF3CAA4B97F4B3EC89BECE356E856AB
                                                    SHA-256:82CED9B131911AF4BF0DC9AD60995E71BBD0D345DB22A28DDBFFC8980766272F
                                                    SHA-512:DF4253B7DD5722C3E83FC4F43447F70A83C24674A73508B13097B8358480E6810BB88ABE2F4062E94519876F461A0D0514DC261413016C21A66A722982090F88
                                                    Malicious:false
                                                    Preview:.To learn about increasing the verbosity of the NGen log files please see http://go.microsoft.com/fwlink/?linkid=210113..12/07/2019 14:54:22.458 [5488]: Command line: D:\wd\compilerTemp\BMT.200yuild.1bk\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe executeQueuedItems /nologo ..12/07/2019 14:54:22.473 [5488]: Executing command from offline queue: install "System.Runtime.WindowsRuntime.UI.Xaml, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=b77a5c561934e089, processorArchitecture=msil" /NoDependencies /queue:1..12/07/2019 14:54:22.490 [5488]: Executing command from offline queue: install "System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil" /NoDependencies /queue:3..12/07/2019 14:54:22.490 [5488]: Exclusion list entry found for System.Web.ApplicationServices, Version=4.0.0.0, Culture=Neutral, PublicKeyToken=31bf3856ad364e35, processorArchitecture=msil; it will not be installed..12/07/2019 14:54:22.490 [
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.502516201859326
                                                    Encrypted:false
                                                    SSDEEP:48:48PhOuRc06WXJmjT53AnnHbqdbSkdoAEkrCy6o7daSkdWTk:HhO19jTm25RCDfF
                                                    MD5:C3E81CE819018BA873A5DC571AC12616
                                                    SHA1:11359EA7D31265BE60269BCDAE5F3FDE5A888FC9
                                                    SHA-256:55EB5FCBB7DE48071635582A83105618E2FC80E456710FD635E828B1BE82CB95
                                                    SHA-512:56FC3F65A1AB1A9ADF2E2066B1EE55FAD056C2EE4005B7F4A5995B05A611A2532A6EA5E2AD087D7B5A9820A01F78B8A2DB62EC334E1EC819B60B501834DF16D1
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):0.07085259504642283
                                                    Encrypted:false
                                                    SSDEEP:6:2/9LG7iVCnLG7iVrKOzPLHKO838tbkKCdKorTjGoVky6lf1:2F0i8n0itFzDHFCdKovjGTd
                                                    MD5:23391C870901A0D0001632106FF1F81F
                                                    SHA1:7A2743C9081D62703B543F5200E014422B8DC564
                                                    SHA-256:B423A2FDE8CAFF845E1A8CB920BF4B628BE45BEDD82BAB1BD56F4DC9CA68C485
                                                    SHA-512:86B64E4ED48157466F616CC1E01B6FD5838C9AAC873E968E48E6ABF1C92CD4F91BFAB8F46F56BECBF52FF8E0A19229FDAB93A7894E2573AF4B365D291F5FF689
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):20480
                                                    Entropy (8bit):1.502516201859326
                                                    Encrypted:false
                                                    SSDEEP:48:48PhOuRc06WXJmjT53AnnHbqdbSkdoAEkrCy6o7daSkdWTk:HhO19jTm25RCDfF
                                                    MD5:C3E81CE819018BA873A5DC571AC12616
                                                    SHA1:11359EA7D31265BE60269BCDAE5F3FDE5A888FC9
                                                    SHA-256:55EB5FCBB7DE48071635582A83105618E2FC80E456710FD635E828B1BE82CB95
                                                    SHA-512:56FC3F65A1AB1A9ADF2E2066B1EE55FAD056C2EE4005B7F4A5995B05A611A2532A6EA5E2AD087D7B5A9820A01F78B8A2DB62EC334E1EC819B60B501834DF16D1
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):1.2078215779087094
                                                    Encrypted:false
                                                    SSDEEP:48:j8mGuWI+CFXJBT5FAnnHbqdbSkdoAEkrCy6o7daSkdWTk:ImGKpTk25RCDfF
                                                    MD5:96D325AD7ED1B88C247FBA36753EBF13
                                                    SHA1:D875B6C5ADCA7E6E59B8D2BC4CDD024EC9F1E3FA
                                                    SHA-256:E7F35766D60BF736E906BC1F9CEF7F6E4016D4E539033E6D8D65010DC08D8E02
                                                    SHA-512:9FF2275597B662BE0411BFFBC1657687B27379ABFFE91CA461601F09516286267197827CF421B1D8986DD1D6EB84DAB25784F22037EBA00469AB9FEFBF32E9EB
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):1.2078215779087094
                                                    Encrypted:false
                                                    SSDEEP:48:j8mGuWI+CFXJBT5FAnnHbqdbSkdoAEkrCy6o7daSkdWTk:ImGKpTk25RCDfF
                                                    MD5:96D325AD7ED1B88C247FBA36753EBF13
                                                    SHA1:D875B6C5ADCA7E6E59B8D2BC4CDD024EC9F1E3FA
                                                    SHA-256:E7F35766D60BF736E906BC1F9CEF7F6E4016D4E539033E6D8D65010DC08D8E02
                                                    SHA-512:9FF2275597B662BE0411BFFBC1657687B27379ABFFE91CA461601F09516286267197827CF421B1D8986DD1D6EB84DAB25784F22037EBA00469AB9FEFBF32E9EB
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):32768
                                                    Entropy (8bit):1.2078215779087094
                                                    Encrypted:false
                                                    SSDEEP:48:j8mGuWI+CFXJBT5FAnnHbqdbSkdoAEkrCy6o7daSkdWTk:ImGKpTk25RCDfF
                                                    MD5:96D325AD7ED1B88C247FBA36753EBF13
                                                    SHA1:D875B6C5ADCA7E6E59B8D2BC4CDD024EC9F1E3FA
                                                    SHA-256:E7F35766D60BF736E906BC1F9CEF7F6E4016D4E539033E6D8D65010DC08D8E02
                                                    SHA-512:9FF2275597B662BE0411BFFBC1657687B27379ABFFE91CA461601F09516286267197827CF421B1D8986DD1D6EB84DAB25784F22037EBA00469AB9FEFBF32E9EB
                                                    Malicious:false
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\System32\msiexec.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):73728
                                                    Entropy (8bit):0.11349506444903357
                                                    Encrypted:false
                                                    SSDEEP:24:7lzLVTx+daipV+dA+dlBipV+doAEV+/jCy6oVQwGO9a+2H5I6:15T4daSkd7dbSkdoAEkrCy6o/anH5H
                                                    MD5:C036E9957B414DA2523AB7FB83A4ED06
                                                    SHA1:CC89B5040CB6E1CF6AC5F3E9D5B2E16C9837A1C5
                                                    SHA-256:F806E87ACFA3E6D18FA00E2BC69D3AE08EF769C6858F6DF0526483247159FBA5
                                                    SHA-512:9770E4F58AE3DB238CAC1F71F4DE81C9F44611D8E7548ED0DA7647DA30031813F12910C6D029CB51F8000D92669326CE15252DB82DB40E0B6CB209ABB6FCA75C
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Entropy (8bit):7.225751156615419
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.53%
                                                    • InstallShield setup (43055/19) 0.43%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:EhSODySB7R.exe
                                                    File size:2'252'800 bytes
                                                    MD5:0a73f48ffa71f2ba878056373570aa08
                                                    SHA1:4d5195efeda4ce5c14096a22613d32afb9958808
                                                    SHA256:f14401a595ad551015bce9e8eeaa8f80f2294f8767b654a5650da0f314de5255
                                                    SHA512:173b99986448480fdfa77880625d43344e0e1034625dfe674d621e669c29881adf76e384a2831902278136f575dcf0e91e22610a7bdbc31721d331dae7d13a87
                                                    SSDEEP:49152:XsO7+DqJsDEiD3PTFRd5CWpk+q4o5q8g73ivJ+hnGkxl52ZeyN5ZY:r7+uKTFw+XAYhnV7IpY
                                                    TLSH:65A5BE22B683C532D12D0276ED19EE5D193DBE73073105EBB7E43EAE48B08C16779A16
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........m..............&~......&m......&n.......^..............&q......&.......&{.....Rich............................PE..L.....kI...
                                                    Icon Hash:2d2e3797b32b2b99
                                                    Entrypoint:0x401f54
                                                    Entrypoint Section:.text
                                                    Digitally signed:false
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                    DLL Characteristics:
                                                    Time Stamp:0x496BFC80 [Tue Jan 13 02:29:20 2009 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:0f7d0ed8477bf9ca9b4b2ce07e02a90e
                                                    Instruction
                                                    call 00007F59C909E5D4h
                                                    jmp 00007F59C909B90Ch
                                                    push ebp
                                                    mov ebp, esp
                                                    push ecx
                                                    push esi
                                                    mov esi, dword ptr [ebp+0Ch]
                                                    push esi
                                                    call 00007F59C909F0D6h
                                                    mov dword ptr [ebp+0Ch], eax
                                                    mov eax, dword ptr [esi+0Ch]
                                                    test al, 82h
                                                    pop ecx
                                                    jne 00007F59C909BB09h
                                                    call 00007F59C909BE1Eh
                                                    mov dword ptr [eax], 00000009h
                                                    or dword ptr [esi+0Ch], 20h
                                                    or eax, FFFFFFFFh
                                                    jmp 00007F59C909BC22h
                                                    test al, 40h
                                                    je 00007F59C909BAFFh
                                                    call 00007F59C909BE03h
                                                    mov dword ptr [eax], 00000022h
                                                    jmp 00007F59C909BAD5h
                                                    push ebx
                                                    xor ebx, ebx
                                                    test al, 01h
                                                    je 00007F59C909BB08h
                                                    test al, 10h
                                                    mov dword ptr [esi+04h], ebx
                                                    je 00007F59C909BB7Bh
                                                    mov ecx, dword ptr [esi+08h]
                                                    and eax, FFFFFFFEh
                                                    mov dword ptr [esi], ecx
                                                    mov dword ptr [esi+0Ch], eax
                                                    mov eax, dword ptr [esi+0Ch]
                                                    and eax, FFFFFFEFh
                                                    or eax, 02h
                                                    test ax, 0000010Ch
                                                    mov dword ptr [esi+0Ch], eax
                                                    mov dword ptr [esi+04h], ebx
                                                    mov dword ptr [ebp-04h], ebx
                                                    jne 00007F59C909BB1Eh
                                                    call 00007F59C909EEC8h
                                                    add eax, 20h
                                                    cmp esi, eax
                                                    je 00007F59C909BAFEh
                                                    call 00007F59C909EEBCh
                                                    add eax, 40h
                                                    cmp esi, eax
                                                    jne 00007F59C909BAFFh
                                                    push dword ptr [ebp+0Ch]
                                                    call 00007F59C909EE4Fh
                                                    test eax, eax
                                                    pop ecx
                                                    jne 00007F59C909BAF9h
                                                    push esi
                                                    call 00007F59C909EE00h
                                                    pop ecx
                                                    test word ptr [esi+0Ch], 0108h
                                                    push edi
                                                    je 00007F59C909BB76h
                                                    mov eax, dword ptr [esi+08h]
                                                    mov edi, dword ptr [esi]
                                                    lea ecx, dword ptr [eax+01h]
                                                    mov dword ptr [esi], ecx
                                                    mov ecx, dword ptr [esi+18h]
                                                    sub edi, eax
                                                    Programming Language:
                                                    • [ASM] VS2005 build 50727
                                                    • [C++] VS2005 build 50727
                                                    • [ C ] VS2005 build 50727
                                                    • [RES] VS2005 build 50727
                                                    • [LNK] VS2005 build 50727
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xe5e80x50.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x120000x215658.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0xc2000x1c.rdata
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xde780x40.rdata
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1b4.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000xa4940xb000faa20d416cf66a0e758d51d62d506053False0.5961692116477273data6.374283196502087IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0xc0000x2f560x3000191e5dfc6ac85f3b137e574ecc199deeFalse0.3616536458333333data5.33958366807718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xf0000x2d3c0x1000605cb8f363da7eb9d3c143ecb2c1f1c2False0.22607421875data2.365699420498644IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x120000x2156580x216000078c737c6d5707c5f21a79c9f78bd178unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    MSI0x121d40x214000Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 936, Revision Number: {B90B9E45-791A-4A8D-8B67-CBEA2772C018}, Number of Words: 2, Subject: ...., Author: Microsoft, Name of Creating Application: ...., Template: x64;2052, Comments: Installer .... , Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Mon Jan 1 15:22:46 2024, Number of Pages: 200EnglishUnited States0.4290170669555664
                                                    RT_ICON0x2261d40x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.4637096774193548
                                                    RT_ICON0x2264bc0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5675675675675675
                                                    RT_ICON0x2265e40x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.3935018050541516
                                                    RT_ICON0x226e8c0x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4486994219653179
                                                    RT_GROUP_ICON0x2273f40x3edataEnglishUnited States0.8225806451612904
                                                    RT_MANIFEST0x2274340x221XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5486238532110091
                                                    DLLImport
                                                    KERNEL32.dllGetTempPathW, GetTempFileNameW, FindResourceW, SizeofResource, LoadResource, LockResource, CreateThread, CreateFileW, DeleteFileW, CreateFileA, GetStringTypeW, GetStringTypeA, LCMapStringW, LCMapStringA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, ExitProcess, CreateProcessW, GetLastError, WriteFile, FlushFileBuffers, CloseHandle, GetProcAddress, GetModuleHandleA, HeapFree, GetVersionExA, HeapAlloc, GetProcessHeap, GetStartupInfoW, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, TlsGetValue, TlsAlloc, TlsSetValue, TlsFree, InterlockedIncrement, SetLastError, GetCurrentThreadId, InterlockedDecrement, GetStdHandle, GetModuleFileNameA, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, LoadLibraryA, InitializeCriticalSection, GetModuleFileNameW, FreeEnvironmentStringsA, MultiByteToWideChar, GetEnvironmentStrings, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetCommandLineW, SetHandleCount, GetFileType, GetStartupInfoA, HeapDestroy, HeapCreate, VirtualFree, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, SetFilePointer, WideCharToMultiByte, GetConsoleCP, GetConsoleMode, GetCPInfo, GetACP, GetOEMCP, IsValidCodePage, Sleep, HeapSize, RtlUnwind, GetLocaleInfoA, VirtualAlloc, HeapReAlloc, SetStdHandle, RaiseException
                                                    USER32.dllDefWindowProcW, PostQuitMessage, EndPaint, BeginPaint, UpdateWindow, ShowWindow, CreateWindowExW, GetSystemMetrics, RegisterClassExW, GetSysColorBrush, LoadCursorW, PostMessageW, DispatchMessageW, TranslateMessage, GetMessageW, MessageBoxW, InvalidateRect
                                                    GDI32.dllTextOutW, SetBkMode, SelectObject, GetStockObject, DeleteObject
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Feb 1, 2024 09:13:56.747600079 CET4970449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:13:57.756623030 CET4970449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:13:59.756589890 CET4970449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:03.756783962 CET4970449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:11.772200108 CET4970449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:17.820127010 CET4971349780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:18.834738970 CET4971349780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:20.834713936 CET4971349780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:24.834780931 CET4971349780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:32.834665060 CET4971349780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:38.945117950 CET4971449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:39.959696054 CET4971449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:41.959726095 CET4971449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:45.959714890 CET4971449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:14:53.959708929 CET4971449780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:00.070002079 CET4971649780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:01.084683895 CET4971649780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:03.084549904 CET4971649780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:07.084580898 CET4971649780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:15.084676981 CET4971649780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:21.194623947 CET4971849780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:22.209537983 CET4971849780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:24.209651947 CET4971849780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:28.209697008 CET4971849780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:36.209542036 CET4971849780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:42.319765091 CET4971949780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:43.334656000 CET4971949780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:45.334425926 CET4971949780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:49.334603071 CET4971949780192.168.2.5154.39.251.117
                                                    Feb 1, 2024 09:15:57.334386110 CET4971949780192.168.2.5154.39.251.117

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:09:13:53
                                                    Start date:01/02/2024
                                                    Path:C:\Users\user\Desktop\EhSODySB7R.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\Desktop\EhSODySB7R.exe
                                                    Imagebase:0x400000
                                                    File size:2'252'800 bytes
                                                    MD5 hash:0A73F48FFA71F2BA878056373570AA08
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:1
                                                    Start time:09:13:53
                                                    Start date:01/02/2024
                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:msiexec.exe /i C:\Users\user\AppData\Local\Temp\MSI99F2.tmp
                                                    Imagebase:0x230000
                                                    File size:59'904 bytes
                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:09:13:53
                                                    Start date:01/02/2024
                                                    Path:C:\Windows\System32\msiexec.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\msiexec.exe /V
                                                    Imagebase:0x7ff78d2a0000
                                                    File size:69'632 bytes
                                                    MD5 hash:E5DA170027542E25EDE42FC54C929077
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:4
                                                    Start time:09:13:54
                                                    Start date:01/02/2024
                                                    Path:C:\Windows\SysWOW64\msiexec.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\syswow64\MsiExec.exe -Embedding 96302FF1609113E413E3406A4F20EA8E
                                                    Imagebase:0x230000
                                                    File size:59'904 bytes
                                                    MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:09:13:55
                                                    Start date:01/02/2024
                                                    Path:C:\Windows\Installer\MSIA311.tmp
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\Installer\MSIA311.tmp" /EnforcedRunAsAdmin /DontWait /RunAsAdmin "C:\Program Files (x86)\IOPL\gxonecli.exe
                                                    Imagebase:0x6a0000
                                                    File size:429'568 bytes
                                                    MD5 hash:1458A72D86B87E1329CFC549B98D1E4D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    • Detection: 0%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:09:13:55
                                                    Start date:01/02/2024
                                                    Path:C:\Program Files (x86)\IOPL\gxonecli.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files (x86)\IOPL\gxonecli.exe"
                                                    Imagebase:0x730000
                                                    File size:776'440 bytes
                                                    MD5 hash:206A390B01B76BA387EA40C4A72622CC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000006.00000002.3225077296.0000000002FEB000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000006.00000002.3224081616.0000000000AD9000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Nitol, Description: Yara detected Nitol, Source: 00000006.00000002.3224774705.0000000002EE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 3%, ReversingLabs
                                                    • Detection: 3%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:7
                                                    Start time:09:13:57
                                                    Start date:01/02/2024
                                                    Path:C:\Program Files (x86)\IOPL\gxonecli.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Program Files (x86)\IOPL\gxonecli.exe
                                                    Imagebase:0x730000
                                                    File size:776'440 bytes
                                                    MD5 hash:206A390B01B76BA387EA40C4A72622CC
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:4.1%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:8.4%
                                                      Total number of Nodes:1888
                                                      Total number of Limit Nodes:25
                                                      execution_graph 7046 402600 7048 40260c __freefls@4 7046->7048 7047 402624 7049 402632 7047->7049 7052 40611b __freefls@4 66 API calls 7047->7052 7048->7047 7050 402700 __freefls@4 7048->7050 7051 40611b __freefls@4 66 API calls 7048->7051 7053 402640 7049->7053 7054 40611b __freefls@4 66 API calls 7049->7054 7051->7047 7052->7049 7055 40264e 7053->7055 7056 40611b __freefls@4 66 API calls 7053->7056 7054->7053 7057 40265c 7055->7057 7059 40611b __freefls@4 66 API calls 7055->7059 7056->7055 7058 40266a 7057->7058 7060 40611b __freefls@4 66 API calls 7057->7060 7061 40267b 7058->7061 7062 40611b __freefls@4 66 API calls 7058->7062 7059->7057 7060->7058 7063 402bf4 __lock 66 API calls 7061->7063 7062->7061 7064 402683 7063->7064 7065 4026a8 7064->7065 7066 40268f InterlockedDecrement 7064->7066 7080 40270c 7065->7080 7066->7065 7068 40269a 7066->7068 7068->7065 7071 40611b __freefls@4 66 API calls 7068->7071 7070 402bf4 __lock 66 API calls 7072 4026bc 7070->7072 7071->7065 7073 405dfd ___removelocaleref 8 API calls 7072->7073 7079 4026ed 7072->7079 7077 4026d1 7073->7077 7076 40611b __freefls@4 66 API calls 7076->7050 7078 405c37 ___freetlocinfo 66 API calls 7077->7078 7077->7079 7078->7079 7083 402718 7079->7083 7086 402b1c LeaveCriticalSection 7080->7086 7082 4026b5 7082->7070 7087 402b1c LeaveCriticalSection 7083->7087 7085 4026fa 7085->7076 7086->7082 7087->7085 7339 4090c0 RtlUnwind 7088 401f01 7091 40319b 7088->7091 7092 402571 _raise 66 API calls 7091->7092 7093 401f12 7092->7093 6264 40a442 6265 401a49 __except_handler4 5 API calls 6264->6265 6266 40a456 6265->6266 6267 40a461 6266->6267 6273 40b221 6266->6273 6270 40a4b0 6282 40a36d 6270->6282 6274 4025e8 _CallSETranslator 66 API calls 6273->6274 6275 40b22c 6274->6275 6276 40b270 6275->6276 6277 40b293 6275->6277 6280 40a499 6275->6280 6276->6280 6286 40a748 6276->6286 6277->6280 6296 40aeb3 6277->6296 6280->6270 6281 40a2b5 RtlUnwind 6280->6281 6281->6270 6283 40a37d 6282->6283 6284 40a38f 6282->6284 6283->6267 6285 4025e8 _CallSETranslator 66 API calls 6284->6285 6285->6283 6287 40a754 __freefls@4 6286->6287 6288 4025e8 _CallSETranslator 66 API calls 6287->6288 6295 40a774 __CallSettingFrame@12 6288->6295 6289 40a7e9 6338 40a80e 6289->6338 6293 40a7ff __freefls@4 6293->6280 6294 403152 FindHandler 66 API calls 6294->6293 6295->6289 6334 403152 6295->6334 6297 40aed0 6296->6297 6298 403152 FindHandler 66 API calls 6297->6298 6300 40aeea 6297->6300 6298->6300 6299 40b1ee 6302 4025e8 _CallSETranslator 66 API calls 6299->6302 6306 4025e8 _CallSETranslator 66 API calls 6300->6306 6312 40afc9 FindHandler type_info::operator== ___TypeMatch 6300->6312 6301 40b1d5 6378 40adc1 6301->6378 6304 40b1f6 6302->6304 6305 40b204 6304->6305 6307 403152 FindHandler 66 API calls 6304->6307 6305->6280 6308 40af31 6306->6308 6307->6305 6308->6305 6310 4025e8 _CallSETranslator 66 API calls 6308->6310 6313 40af43 6310->6313 6312->6299 6312->6301 6314 40a234 __CxxThrowException@8 RaiseException 6312->6314 6316 40a8e7 FindHandler 66 API calls 6312->6316 6318 4025e8 66 API calls _CallSETranslator 6312->6318 6332 40a748 ___FrameUnwindToState 66 API calls 6312->6332 6347 40b35c 6312->6347 6353 40a4df 6312->6353 6359 40ad55 6312->6359 6369 40a2b5 RtlUnwind 6312->6369 6370 40a960 6312->6370 6315 4025e8 _CallSETranslator 66 API calls 6313->6315 6314->6312 6317 40af51 FindHandler 6315->6317 6316->6312 6319 403152 FindHandler 66 API calls 6317->6319 6322 40af6d 6317->6322 6318->6312 6319->6322 6320 40af97 6321 4025e8 _CallSETranslator 66 API calls 6320->6321 6323 40af9c 6321->6323 6322->6320 6325 403152 FindHandler 66 API calls 6322->6325 6323->6312 6326 4025e8 _CallSETranslator 66 API calls 6323->6326 6325->6320 6327 40afae 6326->6327 6328 4025e8 _CallSETranslator 66 API calls 6327->6328 6329 40afb9 6328->6329 6343 40a8e7 6329->6343 6332->6312 6335 40315e __freefls@4 6334->6335 6336 4023cc _raise 66 API calls 6335->6336 6337 403169 6336->6337 6339 4025e8 _CallSETranslator 66 API calls 6338->6339 6340 40a813 6339->6340 6341 40a7f5 6340->6341 6342 4025e8 _CallSETranslator 66 API calls 6340->6342 6341->6293 6341->6294 6342->6341 6344 40a8f1 6343->6344 6346 40a8f6 ___TypeMatch 6343->6346 6345 403152 FindHandler 66 API calls 6344->6345 6345->6346 6346->6312 6348 40b371 _strlen 6347->6348 6349 40b392 6347->6349 6350 40700f _malloc 66 API calls 6348->6350 6349->6312 6351 40b380 6350->6351 6351->6349 6394 40689b 6351->6394 6355 40a4f6 6353->6355 6354 40a52c 6356 40a545 6354->6356 6357 403152 FindHandler 66 API calls 6354->6357 6355->6354 6358 403152 FindHandler 66 API calls 6355->6358 6356->6312 6357->6356 6358->6355 6360 40ad6b 6359->6360 6361 40ad5e 6359->6361 6407 40a2b5 RtlUnwind 6360->6407 6403 40acc4 6361->6403 6364 40ad82 6365 40a748 ___FrameUnwindToState 66 API calls 6364->6365 6366 40ad90 6365->6366 6408 40a9a9 6366->6408 6368 40adb1 CatchIt 6368->6312 6369->6312 6371 40a96c __EH_prolog3_catch 6370->6371 6372 4025e8 _CallSETranslator 66 API calls 6371->6372 6373 40a971 6372->6373 6374 40a97f 6373->6374 6375 403152 FindHandler 66 API calls 6373->6375 6452 40313f 6374->6452 6375->6374 6379 40add6 6378->6379 6389 40aeae 6378->6389 6380 4025e8 _CallSETranslator 66 API calls 6379->6380 6381 40addc 6380->6381 6382 40ae19 6381->6382 6384 4025e8 _CallSETranslator 66 API calls 6381->6384 6383 40ae32 6382->6383 6385 403152 FindHandler 66 API calls 6382->6385 6382->6389 6386 40a4df _GetRangeOfTrysToCheck 66 API calls 6383->6386 6387 40adea 6384->6387 6385->6383 6391 40ae47 6386->6391 6388 4023c3 _raise 66 API calls 6387->6388 6390 40adf5 6388->6390 6389->6299 6390->6382 6392 40a36d _CallSETranslator 66 API calls 6390->6392 6391->6389 6393 40ad55 CatchIt 67 API calls 6391->6393 6392->6382 6393->6391 6395 4068b0 6394->6395 6396 4068a8 6394->6396 6397 4022a5 __msize 66 API calls 6395->6397 6396->6395 6401 4068d7 6396->6401 6398 4068b5 6397->6398 6399 402246 __msize 66 API calls 6398->6399 6400 4068c4 6399->6400 6400->6349 6401->6400 6402 4022a5 __msize 66 API calls 6401->6402 6402->6398 6404 40acd0 __freefls@4 6403->6404 6422 40ab45 6404->6422 6406 40acff ___BuildCatchObject ___AdjustPointer __freefls@4 6406->6360 6407->6364 6409 40a9b5 __freefls@4 6408->6409 6426 40a552 6409->6426 6412 4025e8 _CallSETranslator 66 API calls 6413 40a9e0 6412->6413 6414 4025e8 _CallSETranslator 66 API calls 6413->6414 6415 40a9ee 6414->6415 6416 4025e8 _CallSETranslator 66 API calls 6415->6416 6417 40a9fc 6416->6417 6418 4025e8 _CallSETranslator 66 API calls 6417->6418 6419 40aa07 _CallCatchBlock2 6418->6419 6431 40aacf 6419->6431 6421 40aabb __freefls@4 6421->6368 6423 40ab51 FindHandler __freefls@4 6422->6423 6424 403152 FindHandler 66 API calls 6423->6424 6425 40abbe ___AdjustPointer ___BuildCatchObjectHelper __freefls@4 6423->6425 6424->6425 6425->6406 6427 4025e8 _CallSETranslator 66 API calls 6426->6427 6428 40a562 6427->6428 6429 4025e8 _CallSETranslator 66 API calls 6428->6429 6430 40a570 6429->6430 6430->6412 6440 40a59b 6431->6440 6433 40aadd 6434 4025e8 _CallSETranslator 66 API calls 6433->6434 6435 40aae3 6434->6435 6436 4025e8 _CallSETranslator 66 API calls 6435->6436 6438 40aaf1 6436->6438 6437 40ab34 FindHandler 6437->6421 6438->6437 6449 40a57a 6438->6449 6441 4025e8 _CallSETranslator 66 API calls 6440->6441 6442 40a5a1 6441->6442 6443 40a5bd 6442->6443 6444 40a5ad 6442->6444 6446 4025e8 _CallSETranslator 66 API calls 6443->6446 6445 4025e8 _CallSETranslator 66 API calls 6444->6445 6447 40a5b2 6445->6447 6448 40a5c2 6446->6448 6447->6433 6448->6433 6450 4025e8 _CallSETranslator 66 API calls 6449->6450 6451 40a57f 6450->6451 6451->6437 6453 4025e8 _CallSETranslator 66 API calls 6452->6453 6454 403144 6453->6454 6455 40aa42 6456 4025e8 _CallSETranslator 66 API calls 6455->6456 6457 40aa4a 6456->6457 6458 40a748 ___FrameUnwindToState 66 API calls 6457->6458 6459 40aa9a 6458->6459 6460 40aacf CatchIt 66 API calls 6459->6460 6461 40aabb __freefls@4 6460->6461 7388 406a84 7389 406a96 7388->7389 7391 406aa4 @_EH4_CallFilterFunc@8 7388->7391 7390 401a49 __except_handler4 5 API calls 7389->7390 7390->7391 7094 401805 7095 40181c 7094->7095 7096 402da3 __initp_misc_cfltcvt_tab 66 API calls 7095->7096 7097 40182c __initterm_e 7096->7097 7098 402d49 __cinit 74 API calls 7097->7098 7099 40184d __except_handler4 7097->7099 7098->7099 7100 40a307 7101 40b221 ___InternalCxxFrameHandler 68 API calls 7100->7101 7102 40a32d 7101->7102 7103 40b209 7106 40b3aa 7103->7106 7107 40b3c6 _strlen 7106->7107 7111 40b215 7106->7111 7108 40700f _malloc 66 API calls 7107->7108 7107->7111 7109 40b3d9 7108->7109 7110 40689b _strcpy_s 66 API calls 7109->7110 7109->7111 7110->7111 7340 40a7ca 7343 40a704 7340->7343 7344 40a713 7343->7344 7348 40a71f 7343->7348 7346 4025e8 _CallSETranslator 66 API calls 7344->7346 7350 40a73e 7344->7350 7345 4025e8 _CallSETranslator 66 API calls 7347 40a730 7345->7347 7346->7348 7349 4025e8 _CallSETranslator 66 API calls 7347->7349 7347->7350 7348->7345 7349->7350 6462 40b44e 6463 401a49 __except_handler4 5 API calls 6462->6463 6464 40b462 6463->6464 6465 401a49 __except_handler4 5 API calls 6464->6465 6466 40b46f 6465->6466 7351 4035ce 7352 4035da SetLastError 7351->7352 7353 4035e2 __freefls@4 7351->7353 7352->7353 6467 403851 6468 403859 6467->6468 6469 403873 6468->6469 6471 40382c 6468->6471 6472 403832 6471->6472 6473 403842 6472->6473 6475 405f3d 6472->6475 6473->6468 6476 4060ec 6475->6476 6477 405f5d 6475->6477 6512 406017 6476->6512 6518 4089a0 6476->6518 6478 40554d __flswbuf 66 API calls 6477->6478 6479 405f63 6478->6479 6481 405f90 6479->6481 6483 40554d __flswbuf 66 API calls 6479->6483 6481->6476 6486 40554d __flswbuf 66 API calls 6481->6486 6482 401a49 __except_handler4 5 API calls 6484 406119 6482->6484 6485 405f74 6483->6485 6484->6473 6485->6481 6488 40554d __flswbuf 66 API calls 6485->6488 6487 405fb1 6486->6487 6490 40554d __flswbuf 66 API calls 6487->6490 6506 405fd9 6487->6506 6489 405f80 6488->6489 6491 40554d __flswbuf 66 API calls 6489->6491 6492 405fbd 6490->6492 6491->6481 6496 40554d __flswbuf 66 API calls 6492->6496 6492->6506 6493 405ff0 6498 401f5e __flsbuf 100 API calls 6493->6498 6500 405ff8 6493->6500 6494 40604c 6495 40554d __flswbuf 66 API calls 6494->6495 6497 406052 6495->6497 6499 405fc9 6496->6499 6501 40607a 6497->6501 6503 40554d __flswbuf 66 API calls 6497->6503 6498->6500 6502 40554d __flswbuf 66 API calls 6499->6502 6504 401f5e __flsbuf 100 API calls 6500->6504 6500->6512 6501->6476 6505 40608e 6501->6505 6502->6506 6507 40605e 6503->6507 6504->6512 6515 408c6f 6505->6515 6506->6493 6506->6494 6507->6501 6509 40554d __flswbuf 66 API calls 6507->6509 6510 40606a 6509->6510 6511 40554d __flswbuf 66 API calls 6510->6511 6511->6501 6512->6482 6513 4060a0 6513->6512 6514 401f5e __flsbuf 100 API calls 6513->6514 6514->6513 6539 408b10 6515->6539 6519 40554d __flswbuf 66 API calls 6518->6519 6520 4089ae 6519->6520 6521 4089d2 6520->6521 6522 4089b9 6520->6522 6524 4089d6 6521->6524 6532 4089e3 __flswbuf 6521->6532 6523 4022a5 __msize 66 API calls 6522->6523 6534 4089be 6523->6534 6525 4022a5 __msize 66 API calls 6524->6525 6525->6534 6526 408a46 6527 408a54 6526->6527 6528 408ad7 6526->6528 6530 408a6c 6527->6530 6535 408a89 6527->6535 6529 40522e __locking 100 API calls 6528->6529 6529->6534 6531 40522e __locking 100 API calls 6530->6531 6531->6534 6532->6526 6533 40534e __flswbuf 66 API calls 6532->6533 6532->6534 6536 408a3b 6532->6536 6533->6536 6534->6512 6535->6534 6537 404b4f __lseeki64 70 API calls 6535->6537 6536->6526 6538 40530a __getbuf 66 API calls 6536->6538 6537->6534 6538->6526 6540 408b25 6539->6540 6541 408b63 6540->6541 6542 408b48 6540->6542 6559 408b29 6540->6559 6560 4020be 6541->6560 6543 4022a5 __msize 66 API calls 6542->6543 6545 408b4d 6543->6545 6547 402246 __msize 66 API calls 6545->6547 6547->6559 6548 408b7a 6551 408b84 _memset 6548->6551 6553 408bba _memset 6548->6553 6549 408c0e WideCharToMultiByte 6550 408c40 GetLastError 6549->6550 6549->6551 6550->6551 6550->6553 6552 4022a5 __msize 66 API calls 6551->6552 6551->6559 6554 408b9c 6552->6554 6555 4022a5 __msize 66 API calls 6553->6555 6553->6559 6556 4022a5 __msize 66 API calls 6554->6556 6557 408bc7 6555->6557 6556->6559 6558 402246 __msize 66 API calls 6557->6558 6558->6559 6559->6513 6561 4020cd 6560->6561 6564 40211a 6560->6564 6562 4025e8 _CallSETranslator 66 API calls 6561->6562 6563 4020d2 6562->6563 6567 4020fa 6563->6567 6568 405ec7 6563->6568 6564->6548 6564->6549 6567->6564 6583 405788 6567->6583 6569 405ed3 __freefls@4 6568->6569 6570 4025e8 _CallSETranslator 66 API calls 6569->6570 6571 405ed8 6570->6571 6572 405f06 6571->6572 6573 405eea 6571->6573 6574 402bf4 __lock 66 API calls 6572->6574 6575 4025e8 _CallSETranslator 66 API calls 6573->6575 6576 405f0d 6574->6576 6578 405eef 6575->6578 6599 405e89 6576->6599 6581 405efd __freefls@4 6578->6581 6582 4016e8 __amsg_exit 66 API calls 6578->6582 6581->6567 6582->6581 6584 405794 __freefls@4 6583->6584 6585 4025e8 _CallSETranslator 66 API calls 6584->6585 6586 405799 6585->6586 6587 402bf4 __lock 66 API calls 6586->6587 6595 4057ab 6586->6595 6588 4057c9 6587->6588 6589 405812 6588->6589 6593 4057e0 InterlockedDecrement 6588->6593 6594 4057fa InterlockedIncrement 6588->6594 6767 405823 6589->6767 6590 4016e8 __amsg_exit 66 API calls 6592 4057b9 __freefls@4 6590->6592 6592->6564 6593->6594 6596 4057eb 6593->6596 6594->6589 6595->6590 6595->6592 6596->6594 6597 40611b __freefls@4 66 API calls 6596->6597 6598 4057f9 6597->6598 6598->6594 6600 405ebf 6599->6600 6601 405e8d 6599->6601 6607 405f31 6600->6607 6601->6600 6602 405d77 ___addlocaleref 8 API calls 6601->6602 6603 405ea0 6602->6603 6603->6600 6610 405dfd 6603->6610 6766 402b1c LeaveCriticalSection 6607->6766 6609 405f38 6609->6578 6611 405e85 6610->6611 6612 405e06 InterlockedDecrement 6610->6612 6611->6600 6624 405c37 6611->6624 6613 405e1c InterlockedDecrement 6612->6613 6614 405e1f 6612->6614 6613->6614 6615 405e29 InterlockedDecrement 6614->6615 6616 405e2c 6614->6616 6615->6616 6617 405e36 InterlockedDecrement 6616->6617 6618 405e39 6616->6618 6617->6618 6619 405e43 InterlockedDecrement 6618->6619 6620 405e46 6618->6620 6619->6620 6621 405e5b InterlockedDecrement 6620->6621 6622 405e6b InterlockedDecrement 6620->6622 6623 405e74 InterlockedDecrement 6620->6623 6621->6620 6622->6620 6623->6611 6625 405cb8 6624->6625 6627 405c4b 6624->6627 6626 40611b __freefls@4 66 API calls 6625->6626 6628 405d05 6625->6628 6629 405cd9 6626->6629 6627->6625 6634 405c7f 6627->6634 6637 40611b __freefls@4 66 API calls 6627->6637 6645 405d2c 6628->6645 6678 4086b6 6628->6678 6631 40611b __freefls@4 66 API calls 6629->6631 6633 405cec 6631->6633 6640 40611b __freefls@4 66 API calls 6633->6640 6641 40611b __freefls@4 66 API calls 6634->6641 6653 405ca0 6634->6653 6635 40611b __freefls@4 66 API calls 6642 405cad 6635->6642 6636 405d6b 6643 40611b __freefls@4 66 API calls 6636->6643 6644 405c74 6637->6644 6638 40611b __freefls@4 66 API calls 6638->6645 6639 40611b 66 API calls __freefls@4 6639->6645 6646 405cfa 6640->6646 6647 405c95 6641->6647 6648 40611b __freefls@4 66 API calls 6642->6648 6649 405d71 6643->6649 6654 408886 6644->6654 6645->6636 6645->6639 6651 40611b __freefls@4 66 API calls 6646->6651 6670 408846 6647->6670 6648->6625 6649->6600 6651->6628 6653->6635 6655 40888f 6654->6655 6669 40890c 6654->6669 6656 4088a0 6655->6656 6657 40611b __freefls@4 66 API calls 6655->6657 6658 4088b2 6656->6658 6659 40611b __freefls@4 66 API calls 6656->6659 6657->6656 6660 4088c4 6658->6660 6661 40611b __freefls@4 66 API calls 6658->6661 6659->6658 6662 4088d6 6660->6662 6663 40611b __freefls@4 66 API calls 6660->6663 6661->6660 6664 40611b __freefls@4 66 API calls 6662->6664 6666 4088e8 6662->6666 6663->6662 6664->6666 6665 4088fa 6668 40611b __freefls@4 66 API calls 6665->6668 6665->6669 6666->6665 6667 40611b __freefls@4 66 API calls 6666->6667 6667->6665 6668->6669 6669->6634 6671 408883 6670->6671 6672 40884f 6670->6672 6671->6653 6673 40885f 6672->6673 6674 40611b __freefls@4 66 API calls 6672->6674 6675 408871 6673->6675 6676 40611b __freefls@4 66 API calls 6673->6676 6674->6673 6675->6671 6677 40611b __freefls@4 66 API calls 6675->6677 6676->6675 6677->6671 6679 4086c3 6678->6679 6765 405d25 6678->6765 6680 40611b __freefls@4 66 API calls 6679->6680 6681 4086cb 6680->6681 6682 40611b __freefls@4 66 API calls 6681->6682 6683 4086d3 6682->6683 6684 40611b __freefls@4 66 API calls 6683->6684 6685 4086db 6684->6685 6686 40611b __freefls@4 66 API calls 6685->6686 6687 4086e3 6686->6687 6688 40611b __freefls@4 66 API calls 6687->6688 6689 4086eb 6688->6689 6690 40611b __freefls@4 66 API calls 6689->6690 6691 4086f3 6690->6691 6692 40611b __freefls@4 66 API calls 6691->6692 6693 4086fa 6692->6693 6694 40611b __freefls@4 66 API calls 6693->6694 6695 408702 6694->6695 6696 40611b __freefls@4 66 API calls 6695->6696 6697 40870a 6696->6697 6698 40611b __freefls@4 66 API calls 6697->6698 6699 408712 6698->6699 6700 40611b __freefls@4 66 API calls 6699->6700 6701 40871a 6700->6701 6702 40611b __freefls@4 66 API calls 6701->6702 6703 408722 6702->6703 6704 40611b __freefls@4 66 API calls 6703->6704 6705 40872a 6704->6705 6706 40611b __freefls@4 66 API calls 6705->6706 6707 408732 6706->6707 6708 40611b __freefls@4 66 API calls 6707->6708 6709 40873a 6708->6709 6710 40611b __freefls@4 66 API calls 6709->6710 6711 408742 6710->6711 6712 40611b __freefls@4 66 API calls 6711->6712 6713 40874d 6712->6713 6714 40611b __freefls@4 66 API calls 6713->6714 6715 408755 6714->6715 6716 40611b __freefls@4 66 API calls 6715->6716 6717 40875d 6716->6717 6718 40611b __freefls@4 66 API calls 6717->6718 6719 408765 6718->6719 6720 40611b __freefls@4 66 API calls 6719->6720 6721 40876d 6720->6721 6722 40611b __freefls@4 66 API calls 6721->6722 6723 408775 6722->6723 6724 40611b __freefls@4 66 API calls 6723->6724 6725 40877d 6724->6725 6726 40611b __freefls@4 66 API calls 6725->6726 6727 408785 6726->6727 6728 40611b __freefls@4 66 API calls 6727->6728 6729 40878d 6728->6729 6730 40611b __freefls@4 66 API calls 6729->6730 6731 408795 6730->6731 6732 40611b __freefls@4 66 API calls 6731->6732 6733 40879d 6732->6733 6734 40611b __freefls@4 66 API calls 6733->6734 6735 4087a5 6734->6735 6736 40611b __freefls@4 66 API calls 6735->6736 6737 4087ad 6736->6737 6738 40611b __freefls@4 66 API calls 6737->6738 6739 4087b5 6738->6739 6740 40611b __freefls@4 66 API calls 6739->6740 6741 4087bd 6740->6741 6742 40611b __freefls@4 66 API calls 6741->6742 6743 4087c5 6742->6743 6744 40611b __freefls@4 66 API calls 6743->6744 6745 4087d3 6744->6745 6746 40611b __freefls@4 66 API calls 6745->6746 6747 4087de 6746->6747 6748 40611b __freefls@4 66 API calls 6747->6748 6749 4087e9 6748->6749 6750 40611b __freefls@4 66 API calls 6749->6750 6751 4087f4 6750->6751 6752 40611b __freefls@4 66 API calls 6751->6752 6753 4087ff 6752->6753 6754 40611b __freefls@4 66 API calls 6753->6754 6755 40880a 6754->6755 6756 40611b __freefls@4 66 API calls 6755->6756 6757 408815 6756->6757 6758 40611b __freefls@4 66 API calls 6757->6758 6759 408820 6758->6759 6760 40611b __freefls@4 66 API calls 6759->6760 6761 40882b 6760->6761 6762 40611b __freefls@4 66 API calls 6761->6762 6763 408836 6762->6763 6764 40611b __freefls@4 66 API calls 6763->6764 6764->6765 6765->6638 6766->6609 6770 402b1c LeaveCriticalSection 6767->6770 6769 40582a 6769->6595 6770->6769 7112 401d11 7113 401d1e 7112->7113 7114 402a45 __FF_MSGBANNER 66 API calls 7112->7114 7115 4028a5 _malloc 66 API calls 7113->7115 7114->7113 7116 401d27 7115->7116 7117 401732 _malloc 3 API calls 7116->7117 7118 401d31 7117->7118 7392 40a991 7393 4025e8 _CallSETranslator 66 API calls 7392->7393 7394 40a996 7393->7394 7395 40a234 __CxxThrowException@8 RaiseException 7394->7395 7396 40a9a8 7395->7396 7119 401a12 7122 401a04 7119->7122 7121 401a1a 7125 403622 7122->7125 7124 401a10 7124->7121 7126 40362e __freefls@4 7125->7126 7127 402bf4 __lock 66 API calls 7126->7127 7131 403635 7127->7131 7128 40366e 7135 403689 7128->7135 7130 40367f __freefls@4 7130->7124 7131->7128 7132 403665 7131->7132 7134 40611b __freefls@4 66 API calls 7131->7134 7133 40611b __freefls@4 66 API calls 7132->7133 7133->7128 7134->7132 7138 402b1c LeaveCriticalSection 7135->7138 7137 403690 7137->7130 7138->7137 6771 401f54 6774 404a38 6771->6774 6773 401f59 6773->6773 6775 404a68 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6774->6775 6776 404a5b 6774->6776 6777 404a5f 6775->6777 6776->6775 6776->6777 6777->6773 7354 40a7d4 7357 40a77f __CallSettingFrame@12 7354->7357 7355 40a7e9 7356 40a80e ___FrameUnwindToState 66 API calls 7355->7356 7358 40a7f5 7356->7358 7357->7355 7359 403152 FindHandler 66 API calls 7357->7359 7360 40a7ff __freefls@4 7358->7360 7361 403152 FindHandler 66 API calls 7358->7361 7359->7357 7361->7360 7139 401f15 7140 401f24 7139->7140 7141 401f2a 7139->7141 7145 401989 7140->7145 7144 401f2f __freefls@4 7141->7144 7148 4019a9 7141->7148 7146 401896 _raise 66 API calls 7145->7146 7147 401996 7146->7147 7147->7141 7149 401896 _raise 66 API calls 7148->7149 7150 4019b4 7149->7150 7150->7144 7151 405c1a 7154 405a7f 7151->7154 7153 405c29 7155 405a8b __freefls@4 7154->7155 7156 4025e8 _CallSETranslator 66 API calls 7155->7156 7157 405a94 7156->7157 7158 405788 __setmbcp 68 API calls 7157->7158 7159 405a9e 7158->7159 7185 40582c 7159->7185 7162 4061a9 __malloc_crt 66 API calls 7163 405abf 7162->7163 7164 405bde __freefls@4 7163->7164 7192 4058a6 7163->7192 7164->7153 7167 405beb 7167->7164 7171 405bfe 7167->7171 7173 40611b __freefls@4 66 API calls 7167->7173 7168 405aef InterlockedDecrement 7169 405b10 InterlockedIncrement 7168->7169 7170 405aff 7168->7170 7169->7164 7172 405b26 7169->7172 7170->7169 7175 40611b __freefls@4 66 API calls 7170->7175 7174 4022a5 __msize 66 API calls 7171->7174 7172->7164 7177 402bf4 __lock 66 API calls 7172->7177 7173->7171 7174->7164 7176 405b0f 7175->7176 7176->7169 7179 405b3a InterlockedDecrement 7177->7179 7180 405bb6 7179->7180 7181 405bc9 InterlockedIncrement 7179->7181 7180->7181 7183 40611b __freefls@4 66 API calls 7180->7183 7202 405be0 7181->7202 7184 405bc8 7183->7184 7184->7181 7186 4020be _LocaleUpdate::_LocaleUpdate 76 API calls 7185->7186 7187 40583e 7186->7187 7188 405867 7187->7188 7189 405849 GetOEMCP 7187->7189 7190 40586c GetACP 7188->7190 7191 405859 7188->7191 7189->7191 7190->7191 7191->7162 7191->7164 7193 40582c getSystemCP 78 API calls 7192->7193 7194 4058c4 7193->7194 7195 4058cf setSBCS 7194->7195 7198 405913 IsValidCodePage 7194->7198 7201 405938 _memset __setmbcp 7194->7201 7196 401a49 __except_handler4 5 API calls 7195->7196 7197 405a7d 7196->7197 7197->7167 7197->7168 7198->7195 7199 405925 GetCPInfo 7198->7199 7199->7195 7199->7201 7205 4055fe GetCPInfo 7201->7205 7267 402b1c LeaveCriticalSection 7202->7267 7204 405be7 7204->7164 7210 405635 _memset 7205->7210 7214 4056de 7205->7214 7206 408676 ___crtGetStringTypeA 90 API calls 7207 405699 7206->7207 7215 40847b 7207->7215 7209 401a49 __except_handler4 5 API calls 7212 405780 7209->7212 7210->7206 7212->7201 7213 40847b ___crtLCMapStringA 95 API calls 7213->7214 7214->7209 7216 4020be _LocaleUpdate::_LocaleUpdate 76 API calls 7215->7216 7217 40848c 7216->7217 7220 4080d9 7217->7220 7221 4080f8 LCMapStringW 7220->7221 7224 408113 7220->7224 7222 40811b GetLastError 7221->7222 7221->7224 7222->7224 7223 408310 7226 409c70 ___ansicp 6 API calls 7223->7226 7224->7223 7225 40816d 7224->7225 7227 408186 MultiByteToWideChar 7225->7227 7249 408307 7225->7249 7228 408338 7226->7228 7233 4081b3 7227->7233 7227->7249 7231 408351 7228->7231 7232 40842c LCMapStringA 7228->7232 7228->7249 7229 401a49 __except_handler4 5 API calls 7230 4056b9 7229->7230 7230->7213 7234 409cb7 ___convertcp 73 API calls 7231->7234 7266 408388 7232->7266 7237 40700f _malloc 66 API calls 7233->7237 7245 4081cc __crtLCMapStringA_stat 7233->7245 7238 408363 7234->7238 7235 408204 MultiByteToWideChar 7239 40821d LCMapStringW 7235->7239 7240 4082fe 7235->7240 7236 408453 7247 40611b __freefls@4 66 API calls 7236->7247 7236->7249 7237->7245 7242 40836d LCMapStringA 7238->7242 7238->7249 7239->7240 7244 40823e 7239->7244 7243 406fa5 __freea 66 API calls 7240->7243 7241 40611b __freefls@4 66 API calls 7241->7236 7253 40838f 7242->7253 7242->7266 7243->7249 7246 408246 7244->7246 7251 40826f 7244->7251 7245->7235 7245->7249 7246->7240 7248 408258 LCMapStringW 7246->7248 7247->7249 7248->7240 7249->7229 7250 4082be LCMapStringW 7254 4082d6 WideCharToMultiByte 7250->7254 7255 4082f8 7250->7255 7257 40828a __crtLCMapStringA_stat 7251->7257 7258 40700f _malloc 66 API calls 7251->7258 7252 4083a0 _memset __crtLCMapStringA_stat 7260 4083de LCMapStringA 7252->7260 7252->7266 7253->7252 7256 40700f _malloc 66 API calls 7253->7256 7254->7255 7259 406fa5 __freea 66 API calls 7255->7259 7256->7252 7257->7240 7257->7250 7258->7257 7259->7240 7262 4083fe 7260->7262 7263 4083fa 7260->7263 7264 409cb7 ___convertcp 73 API calls 7262->7264 7265 406fa5 __freea 66 API calls 7263->7265 7264->7263 7265->7266 7266->7236 7266->7241 7267->7204 7268 40421e SetUnhandledExceptionFilter 7362 402cde 7363 4061e9 __calloc_crt 66 API calls 7362->7363 7364 402ce8 7363->7364 7365 402355 __initp_misc_cfltcvt_tab 66 API calls 7364->7365 7366 402cf0 7365->7366 6778 409361 6779 4020be _LocaleUpdate::_LocaleUpdate 76 API calls 6778->6779 6780 409373 6779->6780 6781 406455 __isleadbyte_l 76 API calls 6780->6781 6784 409380 6780->6784 6782 4093a8 6781->6782 6785 408676 6782->6785 6786 4020be _LocaleUpdate::_LocaleUpdate 76 API calls 6785->6786 6787 408687 6786->6787 6790 4084be 6787->6790 6791 4084dd GetStringTypeW 6790->6791 6795 408508 6790->6795 6792 4084fd GetLastError 6791->6792 6794 4084f5 6791->6794 6792->6795 6793 4085ef 6818 409c70 GetLocaleInfoA 6793->6818 6796 408541 MultiByteToWideChar 6794->6796 6813 4085e9 6794->6813 6795->6793 6795->6794 6802 40856e 6796->6802 6796->6813 6799 401a49 __except_handler4 5 API calls 6800 408674 6799->6800 6800->6784 6801 408640 GetStringTypeA 6805 40865b 6801->6805 6801->6813 6806 408583 _memset __crtLCMapStringA_stat 6802->6806 6807 40700f _malloc 66 API calls 6802->6807 6804 4085bc MultiByteToWideChar 6809 4085d2 GetStringTypeW 6804->6809 6810 4085e3 6804->6810 6811 40611b __freefls@4 66 API calls 6805->6811 6806->6804 6806->6813 6807->6806 6809->6810 6814 406fa5 6810->6814 6811->6813 6813->6799 6815 406fad 6814->6815 6816 406fbe 6814->6816 6815->6816 6817 40611b __freefls@4 66 API calls 6815->6817 6816->6813 6817->6816 6819 409c9c ___ansicp 6818->6819 6820 401a49 __except_handler4 5 API calls 6819->6820 6821 408613 6820->6821 6821->6801 6821->6813 6822 409cb7 6821->6822 6823 409d7f 6822->6823 6824 409cf5 GetCPInfo 6822->6824 6827 401a49 __except_handler4 5 API calls 6823->6827 6825 409d6a MultiByteToWideChar 6824->6825 6826 409d0c 6824->6826 6825->6823 6831 409d25 _strlen 6825->6831 6826->6825 6828 409d12 GetCPInfo 6826->6828 6829 408634 6827->6829 6828->6825 6830 409d1f 6828->6830 6829->6801 6829->6813 6830->6825 6830->6831 6832 40700f _malloc 66 API calls 6831->6832 6834 409d57 _memset __crtLCMapStringA_stat 6831->6834 6832->6834 6833 409db4 MultiByteToWideChar 6835 409deb 6833->6835 6836 409dcc 6833->6836 6834->6823 6834->6833 6837 406fa5 __freea 66 API calls 6835->6837 6838 409df0 6836->6838 6839 409dd3 WideCharToMultiByte 6836->6839 6837->6823 6840 409dfb WideCharToMultiByte 6838->6840 6841 409e0f 6838->6841 6839->6835 6840->6835 6840->6841 6842 4061e9 __calloc_crt 66 API calls 6841->6842 6843 409e17 6842->6843 6843->6835 6844 409e20 WideCharToMultiByte 6843->6844 6844->6835 6845 409e32 6844->6845 6846 40611b __freefls@4 66 API calls 6845->6846 6846->6835 7269 403521 InitializeCriticalSection 7371 4041e1 7372 404219 7371->7372 7373 4041ef 7371->7373 7373->7372 7375 403106 7373->7375 7376 403112 __freefls@4 7375->7376 7377 4025e8 _CallSETranslator 66 API calls 7376->7377 7380 403117 7377->7380 7378 406b47 _abort 68 API calls 7379 403139 __freefls@4 7378->7379 7379->7372 7380->7378 6847 405463 6854 4080d0 6847->6854 6850 405476 6852 40611b __freefls@4 66 API calls 6850->6852 6853 405481 6852->6853 6867 407ff6 6854->6867 6856 405468 6856->6850 6857 407eb3 6856->6857 6858 407ebf __freefls@4 6857->6858 6859 402bf4 __lock 66 API calls 6858->6859 6862 407ecb 6859->6862 6860 407f34 6908 407f49 6860->6908 6862->6860 6864 407f09 DeleteCriticalSection 6862->6864 6895 409b13 6862->6895 6863 407f40 __freefls@4 6863->6850 6866 40611b __freefls@4 66 API calls 6864->6866 6866->6862 6868 408002 __freefls@4 6867->6868 6869 402bf4 __lock 66 API calls 6868->6869 6874 408011 6869->6874 6870 4080a9 6885 4080c7 6870->6885 6873 4080b5 __freefls@4 6873->6856 6874->6870 6876 407fb4 104 API calls _flsall 6874->6876 6877 4054bf 6874->6877 6882 408098 6874->6882 6876->6874 6878 4054c8 6877->6878 6879 4054de EnterCriticalSection 6877->6879 6880 402bf4 __lock 66 API calls 6878->6880 6879->6874 6881 4054d1 6880->6881 6881->6874 6888 405523 6882->6888 6884 4080a6 6884->6874 6894 402b1c LeaveCriticalSection 6885->6894 6887 4080ce 6887->6873 6889 405530 6888->6889 6890 405542 LeaveCriticalSection 6888->6890 6893 402b1c LeaveCriticalSection 6889->6893 6890->6884 6892 405540 6892->6884 6893->6892 6894->6887 6896 409b1f __freefls@4 6895->6896 6897 409b50 6896->6897 6898 409b33 6896->6898 6904 409b48 __freefls@4 6897->6904 6911 405483 6897->6911 6899 4022a5 __msize 66 API calls 6898->6899 6901 409b38 6899->6901 6903 402246 __msize 66 API calls 6901->6903 6902 409b68 6917 409aa1 6902->6917 6903->6904 6904->6862 7004 402b1c LeaveCriticalSection 6908->7004 6910 407f50 6910->6863 6912 405491 6911->6912 6913 4054b3 EnterCriticalSection 6911->6913 6912->6913 6914 405499 6912->6914 6913->6902 6915 402bf4 __lock 66 API calls 6914->6915 6916 4054a9 6915->6916 6916->6902 6918 409ab1 6917->6918 6919 409acd 6917->6919 6920 4022a5 __msize 66 API calls 6918->6920 6921 409ac6 6919->6921 6936 407f52 6919->6936 6922 409ab6 6920->6922 6933 409b87 6921->6933 6924 402246 __msize 66 API calls 6922->6924 6924->6921 6928 40554d __flswbuf 66 API calls 6929 409ae7 6928->6929 6946 409fef 6929->6946 6931 409aed 6931->6921 6932 40611b __freefls@4 66 API calls 6931->6932 6932->6921 6997 4054ed 6933->6997 6935 409b8d 6935->6904 6937 407f67 6936->6937 6941 407f88 6936->6941 6938 40554d __flswbuf 66 API calls 6937->6938 6937->6941 6939 407f81 6938->6939 6940 40522e __locking 100 API calls 6939->6940 6940->6941 6942 40a0bc 6941->6942 6943 409ae1 6942->6943 6944 40a0c8 6942->6944 6943->6928 6944->6943 6945 40611b __freefls@4 66 API calls 6944->6945 6945->6943 6947 409ffb __freefls@4 6946->6947 6948 40a003 6947->6948 6951 40a01e 6947->6951 6950 4022b8 __write_nolock 66 API calls 6948->6950 6949 40a02c 6952 4022b8 __write_nolock 66 API calls 6949->6952 6953 40a008 6950->6953 6951->6949 6955 40a06d 6951->6955 6954 40a031 6952->6954 6956 4022a5 __msize 66 API calls 6953->6956 6957 4022a5 __msize 66 API calls 6954->6957 6958 407d2f __close 67 API calls 6955->6958 6965 40a010 __freefls@4 6956->6965 6959 40a038 6957->6959 6960 40a073 6958->6960 6961 402246 __msize 66 API calls 6959->6961 6962 40a080 6960->6962 6963 40a08e 6960->6963 6961->6965 6969 409f5b 6962->6969 6964 4022a5 __msize 66 API calls 6963->6964 6967 40a088 6964->6967 6965->6931 6984 40a0b2 6967->6984 6970 407cbe __lseeki64_nolock 66 API calls 6969->6970 6973 409f67 6970->6973 6971 409fba 6987 407c3d 6971->6987 6973->6971 6974 409f98 6973->6974 6976 407cbe __lseeki64_nolock 66 API calls 6973->6976 6974->6971 6977 407cbe __lseeki64_nolock 66 API calls 6974->6977 6980 409f8f 6976->6980 6978 409fa4 CloseHandle 6977->6978 6978->6971 6981 409fb0 GetLastError 6978->6981 6979 409fe4 6979->6967 6983 407cbe __lseeki64_nolock 66 API calls 6980->6983 6981->6971 6982 4022cb __dosmaperr 66 API calls 6982->6979 6983->6974 6996 407dcf LeaveCriticalSection 6984->6996 6986 40a0ba 6986->6965 6988 407ca5 6987->6988 6989 407c4a 6987->6989 6990 4022a5 __msize 66 API calls 6988->6990 6989->6988 6994 407c75 6989->6994 6991 407caa 6990->6991 6992 4022b8 __write_nolock 66 API calls 6991->6992 6993 407c9b 6992->6993 6993->6979 6993->6982 6994->6993 6995 407c95 SetStdHandle 6994->6995 6995->6993 6996->6986 6998 405518 LeaveCriticalSection 6997->6998 6999 4054fa 6997->6999 6998->6935 6999->6998 7000 405501 6999->7000 7003 402b1c LeaveCriticalSection 7000->7003 7002 405516 7002->6935 7003->7002 7004->6910 7381 4015e3 GetLastError 7382 401000 100 API calls 7381->7382 7383 401602 _wcsrchr 7382->7383 7384 401625 MessageBoxW 7383->7384 6244 401227 6245 401242 6244->6245 6246 40127a PostQuitMessage 6244->6246 6247 401247 DefWindowProcW 6245->6247 6248 401259 BeginPaint 6245->6248 6249 401283 6246->6249 6247->6249 6254 401294 6248->6254 6252 401a49 __except_handler4 5 API calls 6249->6252 6253 401290 6252->6253 6255 4012c1 6254->6255 6256 401000 100 API calls 6255->6256 6257 4012ee GetStockObject SelectObject SetBkMode 6256->6257 6262 401cfa 6257->6262 6259 401319 TextOutW SelectObject DeleteObject 6260 401a49 __except_handler4 5 API calls 6259->6260 6261 40126c EndPaint 6260->6261 6261->6249 6263 401cfe 6262->6263 6263->6259 6263->6263 7385 4069e9 7386 4016e8 __amsg_exit 66 API calls 7385->7386 7387 4069f0 7386->7387 7273 40312a 7274 40312d 7273->7274 7277 406b47 7274->7277 7278 406b73 7277->7278 7279 406b6c 7277->7279 7289 403346 7278->7289 7280 4028a5 _malloc 66 API calls 7279->7280 7280->7278 7282 406b84 _memset 7285 406c32 7282->7285 7287 406c07 SetUnhandledExceptionFilter UnhandledExceptionFilter 7282->7287 7286 401989 _raise 66 API calls 7285->7286 7288 406c39 7286->7288 7287->7285 7290 4023cc _raise 66 API calls 7289->7290 7291 403351 7290->7291 7291->7282 7292 403353 7291->7292 7295 40335f __freefls@4 7292->7295 7293 4033bb 7294 40339c 7293->7294 7299 4033ca 7293->7299 7298 4023cc _raise 66 API calls 7294->7298 7295->7293 7295->7294 7296 403386 7295->7296 7302 403382 7295->7302 7297 402571 _raise 66 API calls 7296->7297 7300 40338b _siglookup 7297->7300 7298->7300 7301 4022a5 __msize 66 API calls 7299->7301 7304 403431 7300->7304 7306 401989 _raise 66 API calls 7300->7306 7312 403394 __freefls@4 7300->7312 7303 4033cf 7301->7303 7302->7296 7302->7299 7305 402246 __msize 66 API calls 7303->7305 7307 402bf4 __lock 66 API calls 7304->7307 7308 40343c 7304->7308 7305->7312 7306->7304 7307->7308 7309 4023c3 _raise 66 API calls 7308->7309 7310 403471 7308->7310 7309->7310 7313 4034c7 7310->7313 7312->7282 7314 4034d4 7313->7314 7315 4034cd 7313->7315 7314->7312 7317 402b1c LeaveCriticalSection 7315->7317 7317->7314 7005 402f70 7006 402fa8 7005->7006 7007 402f9b 7005->7007 7009 401a49 __except_handler4 5 API calls 7006->7009 7008 401a49 __except_handler4 5 API calls 7007->7008 7008->7006 7013 402fb8 __except_handler4 7009->7013 7010 40303f 7011 403014 __except_handler4 7011->7010 7012 40302f 7011->7012 7014 401a49 __except_handler4 5 API calls 7011->7014 7015 401a49 __except_handler4 5 API calls 7012->7015 7013->7010 7013->7011 7018 403055 __except_handler4 7013->7018 7014->7012 7015->7010 7017 403094 __except_handler4 7019 4030cb 7017->7019 7020 401a49 __except_handler4 5 API calls 7017->7020 7023 406b16 RtlUnwind 7018->7023 7021 401a49 __except_handler4 5 API calls 7019->7021 7020->7019 7022 4030db __except_handler4 7021->7022 7023->7017 7397 4053b2 7398 4053bf 7397->7398 7399 4061e9 __calloc_crt 66 API calls 7398->7399 7400 4053d9 7399->7400 7401 4061e9 __calloc_crt 66 API calls 7400->7401 7402 4053f2 7400->7402 7401->7402 7024 409a74 7025 409a85 7024->7025 7026 409a8d 7024->7026 7025->7026 7028 409a8a CloseHandle 7025->7028 7027 409a9f 7026->7027 7029 409a9c CloseHandle 7026->7029 7028->7026 7029->7027 5221 401d75 5275 402f0c 5221->5275 5223 401d81 GetStartupInfoW GetProcessHeap HeapAlloc 5224 401dc0 GetVersionExA 5223->5224 5225 401db3 5223->5225 5227 401dd0 GetProcessHeap HeapFree 5224->5227 5228 401dde GetProcessHeap HeapFree 5224->5228 5376 401d10 5225->5376 5230 401dba __freefls@4 5227->5230 5229 401e0a 5228->5229 5276 4049de HeapCreate 5229->5276 5232 401e4b 5233 401e57 5232->5233 5234 401d10 _fast_error_exit 66 API calls 5232->5234 5384 402721 GetModuleHandleA 5233->5384 5234->5233 5236 401e5d 5237 401e61 5236->5237 5238 401e69 __RTC_Initialize 5236->5238 5239 401d10 _fast_error_exit 66 API calls 5237->5239 5286 404743 5238->5286 5240 401e68 5239->5240 5240->5238 5242 401e76 5243 401e82 5242->5243 5244 401e7a 5242->5244 5301 4046a4 5243->5301 5417 4016e8 5244->5417 5252 401e9b 5253 401ea7 5252->5253 5254 401e9f 5252->5254 5342 404272 5253->5342 5255 4016e8 __amsg_exit 66 API calls 5254->5255 5257 401ea6 5255->5257 5257->5253 5259 401eb0 5262 4016e8 __amsg_exit 66 API calls 5259->5262 5260 401eb8 5354 401804 5260->5354 5263 401eb7 5262->5263 5263->5260 5264 401ebe 5265 401ec3 5264->5265 5268 401eca __wwincmdln 5264->5268 5266 4016e8 __amsg_exit 66 API calls 5265->5266 5267 401ec9 5266->5267 5267->5268 5268->5267 5360 401053 5268->5360 5271 401efa 5431 40199a 5271->5431 5275->5223 5277 404a01 5276->5277 5278 4049fe 5276->5278 5434 404983 5277->5434 5278->5232 5281 404a10 5443 40713e HeapAlloc 5281->5443 5282 404a34 5282->5232 5285 404a1f HeapDestroy 5285->5278 5713 402f0c 5286->5713 5288 40474f GetStartupInfoA 5289 4061e9 __calloc_crt 66 API calls 5288->5289 5297 404770 5289->5297 5290 40497a __freefls@4 5290->5242 5291 4048f7 GetStdHandle 5296 4048c1 5291->5296 5292 4061e9 __calloc_crt 66 API calls 5292->5297 5293 40495c SetHandleCount 5293->5290 5294 404909 GetFileType 5294->5296 5295 404844 5295->5290 5295->5296 5298 40486d GetFileType 5295->5298 5300 403531 ___crtInitCritSecAndSpinCount 66 API calls 5295->5300 5296->5290 5296->5291 5296->5293 5296->5294 5299 403531 ___crtInitCritSecAndSpinCount 66 API calls 5296->5299 5297->5290 5297->5292 5297->5295 5297->5296 5298->5295 5299->5296 5300->5295 5302 4046e4 5301->5302 5303 4046b7 GetCommandLineW 5301->5303 5306 4046e9 GetCommandLineW 5302->5306 5307 4046d4 5302->5307 5304 4046c9 GetLastError 5303->5304 5305 4046bd 5303->5305 5304->5307 5310 401e87 5304->5310 5305->5306 5306->5310 5308 4046f2 GetCommandLineA MultiByteToWideChar 5307->5308 5307->5310 5309 404712 5308->5309 5308->5310 5311 4061e9 __calloc_crt 66 API calls 5309->5311 5316 404543 5310->5316 5312 40471a 5311->5312 5312->5310 5313 404722 MultiByteToWideChar 5312->5313 5313->5310 5314 404735 5313->5314 5315 40611b __freefls@4 66 API calls 5314->5315 5315->5310 5317 40457a 5316->5317 5318 40455b GetEnvironmentStringsW 5316->5318 5319 404563 5317->5319 5321 4045e2 5317->5321 5318->5319 5320 40456f GetLastError 5318->5320 5323 4045a1 5319->5323 5324 404592 GetEnvironmentStringsW 5319->5324 5320->5317 5322 4045eb GetEnvironmentStrings 5321->5322 5325 401e91 5321->5325 5322->5325 5331 4045f9 _strlen 5322->5331 5326 4061a9 __malloc_crt 66 API calls 5323->5326 5324->5323 5324->5325 5424 404498 GetModuleFileNameW 5325->5424 5330 4045c2 5326->5330 5327 404600 MultiByteToWideChar 5327->5325 5327->5331 5328 404623 5329 4061e9 __calloc_crt 66 API calls 5328->5329 5341 404630 __wsetenvp _strlen 5329->5341 5332 4045c9 FreeEnvironmentStringsW 5330->5332 5714 406c40 5330->5714 5331->5327 5331->5328 5332->5325 5333 404638 FreeEnvironmentStringsA 5333->5325 5335 404688 FreeEnvironmentStringsA 5335->5325 5336 40464e MultiByteToWideChar 5338 40469b 5336->5338 5336->5341 5339 40611b __freefls@4 66 API calls 5338->5339 5340 4046a1 5339->5340 5340->5333 5341->5333 5341->5335 5341->5336 5343 40428b __wsetenvp 5342->5343 5347 401eac 5342->5347 5344 4061e9 __calloc_crt 66 API calls 5343->5344 5352 4042af __wsetenvp 5344->5352 5345 404311 5346 40611b __freefls@4 66 API calls 5345->5346 5346->5347 5347->5259 5347->5260 5348 4061e9 __calloc_crt 66 API calls 5348->5352 5349 404336 5350 40611b __freefls@4 66 API calls 5349->5350 5350->5347 5352->5345 5352->5347 5352->5348 5352->5349 5353 40214a __invoke_watson 10 API calls 5352->5353 5718 4070d2 5352->5718 5353->5352 5355 40180d __except_handler4 5354->5355 5727 402da3 5355->5727 5357 40182c __initterm_e 5359 40184d __except_handler4 5357->5359 5731 402d49 5357->5731 5359->5264 5872 401148 5360->5872 5362 401081 5875 4011b8 KiUserCallbackDispatcher GetSystemMetrics CreateWindowExW 5362->5875 5365 401091 CreateThread 5366 4010e0 GetLastError 5365->5366 5367 4010ab FindCloseChangeNotification 5365->5367 6151 40134e 5365->6151 5878 401000 5366->5878 5370 4010ce KiUserCallbackDispatcher 5367->5370 5368 401a49 __except_handler4 5 API calls 5369 40113e 5368->5369 5369->5271 5428 401978 5369->5428 5372 4010ba TranslateMessage DispatchMessageW 5370->5372 5373 4010db 5370->5373 5372->5370 5373->5368 5374 4010fe _wcsrchr 5375 40111f MessageBoxW 5374->5375 5375->5373 5377 401d19 5376->5377 5378 401d1e 5376->5378 5379 402a45 __FF_MSGBANNER 66 API calls 5377->5379 5380 4028a5 _malloc 66 API calls 5378->5380 5379->5378 5381 401d27 5380->5381 5382 401732 _malloc 3 API calls 5381->5382 5383 401d31 5382->5383 5383->5230 5385 402733 5384->5385 5386 40273c GetProcAddress GetProcAddress GetProcAddress GetProcAddress 5384->5386 6193 402475 5385->6193 5388 402786 TlsAlloc 5386->5388 5391 4028a0 5388->5391 5392 4027d4 TlsSetValue 5388->5392 5391->5236 5392->5391 5393 4027e5 5392->5393 6204 4019b8 5393->6204 5396 402355 __initp_misc_cfltcvt_tab 66 API calls 5397 4027f5 5396->5397 5398 402355 __initp_misc_cfltcvt_tab 66 API calls 5397->5398 5399 402805 5398->5399 5400 402355 __initp_misc_cfltcvt_tab 66 API calls 5399->5400 5401 402815 5400->5401 5402 402355 __initp_misc_cfltcvt_tab 66 API calls 5401->5402 5403 402825 5402->5403 6211 402a7e 5403->6211 5406 40289b 5408 402475 __mtterm 69 API calls 5406->5408 5407 4023cc _raise 66 API calls 5409 402846 5407->5409 5408->5391 5409->5406 5410 4061e9 __calloc_crt 66 API calls 5409->5410 5411 40285f 5410->5411 5411->5406 5412 4023cc _raise 66 API calls 5411->5412 5413 402879 5412->5413 5413->5406 5414 402880 5413->5414 5415 4024b2 _raise 66 API calls 5414->5415 5416 402888 GetCurrentThreadId 5415->5416 5416->5391 5418 402a45 __FF_MSGBANNER 66 API calls 5417->5418 5419 4016ed 5418->5419 5420 4028a5 _malloc 66 API calls 5419->5420 5421 4016f6 5420->5421 5422 4023cc _raise 66 API calls 5421->5422 5423 401701 5422->5423 5423->5243 5425 4044ca _wparse_cmdline 5424->5425 5426 4061a9 __malloc_crt 66 API calls 5425->5426 5427 40450d _wparse_cmdline 5425->5427 5426->5427 5427->5252 6221 401896 5428->6221 5430 401985 5430->5271 5432 401896 _raise 66 API calls 5431->5432 5433 4019a5 5432->5433 5433->5230 5445 401791 5434->5445 5439 4049a9 5459 4017c8 5439->5459 5440 4049b5 5441 4049c4 5440->5441 5442 40214a __invoke_watson 10 API calls 5440->5442 5441->5281 5441->5282 5442->5441 5444 404a1a 5443->5444 5444->5282 5444->5285 5446 40179c 5445->5446 5448 4017c2 5446->5448 5466 4022a5 5446->5466 5448->5439 5452 40214a 5448->5452 5702 406540 5452->5702 5454 4021db IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 5455 402212 __invoke_watson 5454->5455 5456 40221e GetCurrentProcess TerminateProcess 5454->5456 5455->5456 5704 401a49 5456->5704 5458 40223e 5458->5439 5460 4017d3 5459->5460 5461 4022a5 __msize 66 API calls 5460->5461 5462 4017f8 5460->5462 5463 4017d8 5461->5463 5462->5440 5464 402246 __msize 66 API calls 5463->5464 5465 4017e8 5464->5465 5465->5440 5472 402571 GetLastError 5466->5472 5468 4017a1 5469 402246 5468->5469 5470 4023cc _raise 66 API calls 5469->5470 5471 402254 __invoke_watson 5470->5471 5486 402443 TlsGetValue 5472->5486 5475 4025dc SetLastError 5475->5468 5480 4025d3 5520 40611b 5480->5520 5481 4025bb 5506 4024b2 5481->5506 5484 4025c3 GetCurrentThreadId 5484->5475 5485 4025d9 5485->5475 5487 402471 5486->5487 5488 402456 5486->5488 5487->5475 5491 4061e9 5487->5491 5489 4023cc _raise 64 API calls 5488->5489 5490 402461 TlsSetValue 5489->5490 5490->5487 5493 4061ed 5491->5493 5494 40259a 5493->5494 5495 40620d Sleep 5493->5495 5533 408c8a 5493->5533 5494->5475 5496 4023cc TlsGetValue 5494->5496 5495->5493 5497 402400 GetModuleHandleA 5496->5497 5498 4023df 5496->5498 5500 402411 5497->5500 5505 4023f8 5497->5505 5498->5497 5499 4023e9 TlsGetValue 5498->5499 5502 4023f4 5499->5502 5670 4022e9 5500->5670 5502->5497 5502->5505 5503 402416 5504 40241a GetProcAddress 5503->5504 5503->5505 5504->5505 5505->5480 5505->5481 5675 402f0c 5506->5675 5508 4024be GetModuleHandleA 5509 4024e0 5508->5509 5510 40250f InterlockedIncrement 5508->5510 5511 4022e9 _raise 62 API calls 5509->5511 5512 402bf4 __lock 62 API calls 5510->5512 5513 4024e5 5511->5513 5514 402536 5512->5514 5513->5510 5515 4024e9 GetProcAddress GetProcAddress 5513->5515 5676 405d77 InterlockedIncrement 5514->5676 5515->5510 5517 402555 5688 402568 5517->5688 5519 402562 __freefls@4 5519->5484 5522 406127 __freefls@4 5520->5522 5521 4061a0 __dosmaperr __freefls@4 5521->5485 5522->5521 5523 406166 5522->5523 5524 402bf4 __lock 64 API calls 5522->5524 5523->5521 5525 40617b HeapFree 5523->5525 5528 40613e ___sbh_find_block 5524->5528 5525->5521 5526 40618d 5525->5526 5527 4022a5 __msize 64 API calls 5526->5527 5529 406192 GetLastError 5527->5529 5530 406158 5528->5530 5692 4071b1 5528->5692 5529->5521 5698 406171 5530->5698 5534 408c96 __freefls@4 5533->5534 5535 408cae 5534->5535 5545 408ccd _memset 5534->5545 5536 4022a5 __msize 65 API calls 5535->5536 5537 408cb3 5536->5537 5538 402246 __msize 65 API calls 5537->5538 5540 408cc3 __freefls@4 5538->5540 5539 408d3f HeapAlloc 5539->5545 5540->5493 5545->5539 5545->5540 5546 402bf4 5545->5546 5553 40795a 5545->5553 5559 408d86 5545->5559 5562 403600 5545->5562 5547 402c07 5546->5547 5548 402c1a EnterCriticalSection 5546->5548 5565 402b31 5547->5565 5548->5545 5550 402c0d 5550->5548 5551 4016e8 __amsg_exit 65 API calls 5550->5551 5552 402c19 5551->5552 5552->5548 5556 407986 5553->5556 5554 407a1f 5557 407a28 5554->5557 5665 407575 5554->5665 5556->5554 5556->5557 5658 4074c5 5556->5658 5557->5545 5669 402b1c LeaveCriticalSection 5559->5669 5561 408d8d 5561->5545 5563 4023cc _raise 66 API calls 5562->5563 5564 40360b 5563->5564 5564->5545 5566 402b3d __freefls@4 5565->5566 5567 402b63 5566->5567 5591 402a45 5566->5591 5575 402b73 __freefls@4 5567->5575 5637 4061a9 5567->5637 5573 402b94 5578 402bf4 __lock 66 API calls 5573->5578 5574 402b85 5577 4022a5 __msize 66 API calls 5574->5577 5575->5550 5577->5575 5580 402b9b 5578->5580 5581 402ba3 5580->5581 5582 402bcf 5580->5582 5642 403531 5581->5642 5583 40611b __freefls@4 66 API calls 5582->5583 5585 402bc0 5583->5585 5655 402beb 5585->5655 5586 402bae 5586->5585 5588 40611b __freefls@4 66 API calls 5586->5588 5589 402bba 5588->5589 5590 4022a5 __msize 66 API calls 5589->5590 5590->5585 5592 406900 __FF_MSGBANNER 66 API calls 5591->5592 5593 402a4c 5592->5593 5594 402a59 5593->5594 5595 406900 __FF_MSGBANNER 66 API calls 5593->5595 5596 4028a5 _malloc 66 API calls 5594->5596 5599 402a7b 5594->5599 5595->5594 5597 402a71 5596->5597 5598 4028a5 _malloc 66 API calls 5597->5598 5598->5599 5600 4028a5 5599->5600 5601 4028b1 5600->5601 5602 406900 __FF_MSGBANNER 63 API calls 5601->5602 5606 402a07 5601->5606 5603 4028d1 5602->5603 5604 402a0c GetStdHandle 5603->5604 5607 406900 __FF_MSGBANNER 63 API calls 5603->5607 5605 402a1a _strlen 5604->5605 5604->5606 5605->5606 5610 402a34 WriteFile 5605->5610 5634 401732 5606->5634 5608 4028e2 5607->5608 5608->5604 5609 4028f4 5608->5609 5609->5606 5611 40689b _strcpy_s 63 API calls 5609->5611 5610->5606 5612 402916 5611->5612 5613 40292a GetModuleFileNameA 5612->5613 5614 40214a __invoke_watson 10 API calls 5612->5614 5615 402948 5613->5615 5620 40296b _strlen 5613->5620 5616 402927 5614->5616 5617 40689b _strcpy_s 63 API calls 5615->5617 5616->5613 5618 402958 5617->5618 5618->5620 5621 40214a __invoke_watson 10 API calls 5618->5621 5619 4029ae 5622 406777 _strcat_s 63 API calls 5619->5622 5620->5619 5623 4067e8 _malloc 63 API calls 5620->5623 5621->5620 5624 4029c1 5622->5624 5625 40299b 5623->5625 5626 4029d2 5624->5626 5627 40214a __invoke_watson 10 API calls 5624->5627 5625->5619 5630 40214a __invoke_watson 10 API calls 5625->5630 5628 406777 _strcat_s 63 API calls 5626->5628 5627->5626 5629 4029e3 5628->5629 5631 4029f4 5629->5631 5632 40214a __invoke_watson 10 API calls 5629->5632 5630->5619 5633 4065ba _malloc 63 API calls 5631->5633 5632->5631 5633->5606 5635 40170c ___crtCorExitProcess GetModuleHandleA GetProcAddress 5634->5635 5636 40173b ExitProcess 5635->5636 5639 4061ad 5637->5639 5638 40700f _malloc 65 API calls 5638->5639 5639->5638 5640 402b7e 5639->5640 5641 4061c5 Sleep 5639->5641 5640->5573 5640->5574 5641->5639 5643 40353d __freefls@4 5642->5643 5644 4023cc _raise 64 API calls 5643->5644 5645 40354d 5644->5645 5646 401791 ___crtInitCritSecAndSpinCount 64 API calls 5645->5646 5654 4035a1 __freefls@4 5645->5654 5647 40355d 5646->5647 5648 40214a __invoke_watson 10 API calls 5647->5648 5651 40356c 5647->5651 5648->5651 5649 403575 GetModuleHandleA 5650 403596 5649->5650 5652 403584 GetProcAddress 5649->5652 5653 402355 __initp_misc_cfltcvt_tab 64 API calls 5650->5653 5651->5649 5651->5650 5652->5650 5653->5654 5654->5586 5656 402b1c __msize LeaveCriticalSection 5655->5656 5657 402bf2 5656->5657 5657->5575 5659 4074d8 HeapReAlloc 5658->5659 5660 40750c HeapAlloc 5658->5660 5661 4074f6 5659->5661 5662 4074fa 5659->5662 5660->5661 5663 40752f VirtualAlloc 5660->5663 5661->5554 5662->5660 5663->5661 5664 407549 HeapFree 5663->5664 5664->5661 5666 40758a VirtualAlloc 5665->5666 5668 4075d1 5666->5668 5668->5557 5669->5561 5671 4017c8 _malloc 65 API calls 5670->5671 5672 402304 5671->5672 5673 40230f GetModuleHandleA 5672->5673 5674 40230b ___TypeMatch 5672->5674 5673->5674 5674->5503 5675->5508 5677 405d92 InterlockedIncrement 5676->5677 5678 405d95 5676->5678 5677->5678 5679 405da2 5678->5679 5680 405d9f InterlockedIncrement 5678->5680 5681 405dac InterlockedIncrement 5679->5681 5682 405daf 5679->5682 5680->5679 5681->5682 5683 405db9 InterlockedIncrement 5682->5683 5684 405dbc 5682->5684 5683->5684 5685 405dd1 InterlockedIncrement 5684->5685 5686 405de1 InterlockedIncrement 5684->5686 5687 405dea InterlockedIncrement 5684->5687 5685->5684 5686->5684 5687->5517 5691 402b1c LeaveCriticalSection 5688->5691 5690 40256f 5690->5519 5691->5690 5693 4071ee 5692->5693 5697 407490 ___BuildCatchObjectHelper 5692->5697 5694 4073da VirtualFree 5693->5694 5693->5697 5695 40743e 5694->5695 5696 40744d VirtualFree HeapFree 5695->5696 5695->5697 5696->5697 5697->5530 5701 402b1c LeaveCriticalSection 5698->5701 5700 406178 5700->5523 5701->5700 5703 40654c __VEC_memzero 5702->5703 5703->5454 5705 401a51 5704->5705 5706 401a53 IsDebuggerPresent 5704->5706 5705->5458 5712 406535 5706->5712 5709 4037f3 SetUnhandledExceptionFilter UnhandledExceptionFilter 5710 403810 __invoke_watson 5709->5710 5711 403818 GetCurrentProcess TerminateProcess 5709->5711 5710->5711 5711->5458 5712->5709 5713->5288 5715 406c58 5714->5715 5716 406c7f __VEC_memcpy 5715->5716 5717 4045dd 5715->5717 5716->5717 5717->5332 5719 4070df 5718->5719 5721 4070e7 5718->5721 5719->5721 5724 40710f 5719->5724 5720 4022a5 __msize 66 API calls 5722 4070ec 5720->5722 5721->5720 5723 402246 __msize 66 API calls 5722->5723 5725 4070fb 5723->5725 5724->5725 5726 4022a5 __msize 66 API calls 5724->5726 5725->5352 5726->5722 5728 402da7 5727->5728 5730 402dbf 5728->5730 5734 402355 TlsGetValue 5728->5734 5730->5357 5744 402d0d 5731->5744 5733 402d52 5733->5359 5735 402368 5734->5735 5736 402389 GetModuleHandleA 5734->5736 5735->5736 5737 402372 TlsGetValue 5735->5737 5738 40239a 5736->5738 5743 402381 5736->5743 5740 40237d 5737->5740 5739 4022e9 _raise 62 API calls 5738->5739 5741 40239f 5739->5741 5740->5736 5740->5743 5742 4023a3 GetProcAddress 5741->5742 5741->5743 5742->5743 5743->5728 5745 402d19 __freefls@4 5744->5745 5752 401747 5745->5752 5751 402d3a __freefls@4 5751->5733 5753 402bf4 __lock 66 API calls 5752->5753 5754 40174e 5753->5754 5755 402c25 5754->5755 5756 4023cc _raise 66 API calls 5755->5756 5757 402c35 5756->5757 5758 4023cc _raise 66 API calls 5757->5758 5759 402c46 5758->5759 5760 402cc9 5759->5760 5775 406946 5759->5775 5772 402d43 5760->5772 5762 402caf 5763 402355 __initp_misc_cfltcvt_tab 66 API calls 5762->5763 5764 402cbe 5763->5764 5767 402355 __initp_misc_cfltcvt_tab 66 API calls 5764->5767 5765 402c86 5765->5760 5769 406231 __realloc_crt 73 API calls 5765->5769 5770 402c9d 5765->5770 5766 402c64 5766->5762 5766->5765 5788 406231 5766->5788 5767->5760 5769->5770 5770->5760 5771 402355 __initp_misc_cfltcvt_tab 66 API calls 5770->5771 5771->5762 5868 401750 5772->5868 5776 406952 __freefls@4 5775->5776 5777 406962 5776->5777 5778 40697f 5776->5778 5780 4022a5 __msize 66 API calls 5777->5780 5779 4069c0 HeapSize 5778->5779 5782 402bf4 __lock 66 API calls 5778->5782 5785 406977 __freefls@4 5779->5785 5781 406967 5780->5781 5783 402246 __msize 66 API calls 5781->5783 5784 40698f ___sbh_find_block 5782->5784 5783->5785 5793 4069e0 5784->5793 5785->5766 5791 406235 5788->5791 5790 406277 5790->5765 5791->5790 5792 406258 Sleep 5791->5792 5797 408da8 5791->5797 5792->5791 5796 402b1c LeaveCriticalSection 5793->5796 5795 4069bb 5795->5779 5795->5785 5796->5795 5798 408db4 __freefls@4 5797->5798 5799 408dc9 5798->5799 5800 408dbb 5798->5800 5802 408dd0 5799->5802 5803 408ddc 5799->5803 5834 40700f 5800->5834 5804 40611b __freefls@4 66 API calls 5802->5804 5809 408f4e 5803->5809 5832 408de9 ___sbh_resize_block ___sbh_find_block 5803->5832 5819 408dc3 __dosmaperr __freefls@4 5804->5819 5805 408f81 5807 403600 __calloc_impl 66 API calls 5805->5807 5806 408f53 HeapReAlloc 5806->5809 5806->5819 5810 408f87 5807->5810 5808 402bf4 __lock 66 API calls 5808->5832 5809->5805 5809->5806 5811 408fa5 5809->5811 5813 403600 __calloc_impl 66 API calls 5809->5813 5815 408f9b 5809->5815 5812 4022a5 __msize 66 API calls 5810->5812 5814 4022a5 __msize 66 API calls 5811->5814 5811->5819 5812->5819 5813->5809 5816 408fae GetLastError 5814->5816 5818 4022a5 __msize 66 API calls 5815->5818 5816->5819 5821 408f1c 5818->5821 5819->5791 5820 408e74 HeapAlloc 5820->5832 5821->5819 5822 408f21 GetLastError 5821->5822 5822->5819 5823 408ec9 HeapReAlloc 5823->5832 5824 40795a ___sbh_alloc_block 5 API calls 5824->5832 5825 408f34 5825->5819 5828 4022a5 __msize 66 API calls 5825->5828 5826 406c40 __VEC_memcpy ___crtGetEnvironmentStringsW 5826->5832 5827 403600 __calloc_impl 66 API calls 5827->5832 5830 408f41 5828->5830 5829 408f17 5831 4022a5 __msize 66 API calls 5829->5831 5830->5816 5830->5819 5831->5821 5832->5805 5832->5808 5832->5819 5832->5820 5832->5823 5832->5824 5832->5825 5832->5826 5832->5827 5832->5829 5833 4071b1 VirtualFree VirtualFree HeapFree ___sbh_free_block 5832->5833 5852 408eec 5832->5852 5833->5832 5835 4070bc 5834->5835 5846 40701d 5834->5846 5836 403600 __calloc_impl 65 API calls 5835->5836 5837 4070c2 5836->5837 5839 4022a5 __msize 65 API calls 5837->5839 5838 402a45 __FF_MSGBANNER 65 API calls 5838->5846 5840 4070c8 5839->5840 5840->5819 5842 4028a5 _malloc 65 API calls 5842->5846 5843 407080 HeapAlloc 5843->5846 5844 401732 _malloc 3 API calls 5844->5846 5845 4070b3 5845->5819 5846->5838 5846->5842 5846->5843 5846->5844 5846->5845 5847 4070a7 5846->5847 5848 403600 __calloc_impl 65 API calls 5846->5848 5850 4070a5 5846->5850 5855 406fc0 5846->5855 5849 4022a5 __msize 65 API calls 5847->5849 5848->5846 5849->5850 5851 4022a5 __msize 65 API calls 5850->5851 5851->5845 5867 402b1c LeaveCriticalSection 5852->5867 5854 408ef3 5854->5832 5856 406fcc __freefls@4 5855->5856 5857 406ffd __freefls@4 5856->5857 5858 402bf4 __lock 66 API calls 5856->5858 5857->5846 5859 406fe2 5858->5859 5860 40795a ___sbh_alloc_block 5 API calls 5859->5860 5861 406fed 5860->5861 5863 407006 5861->5863 5866 402b1c LeaveCriticalSection 5863->5866 5865 40700d 5865->5857 5866->5865 5867->5854 5871 402b1c LeaveCriticalSection 5868->5871 5870 401757 5870->5751 5871->5870 5873 406540 _memset 5872->5873 5874 40115d LoadCursorW GetSysColorBrush RegisterClassExW 5873->5874 5874->5362 5876 401087 5875->5876 5877 40120d ShowWindow UpdateWindow 5875->5877 5876->5365 5876->5373 5877->5876 5879 401009 5878->5879 5880 40100f 5878->5880 5879->5374 5882 401016 5880->5882 5883 401cdc 5880->5883 5882->5374 5886 401bd5 5883->5886 5887 401c01 5886->5887 5888 401be1 5886->5888 5890 401c0f 5887->5890 5892 401c36 5887->5892 5889 4022a5 __msize 66 API calls 5888->5889 5891 401be6 5889->5891 5893 4022a5 __msize 66 API calls 5890->5893 5897 401bf6 5890->5897 5894 402246 __msize 66 API calls 5891->5894 5896 4022a5 __msize 66 API calls 5892->5896 5895 401c2b 5893->5895 5894->5897 5899 402246 __msize 66 API calls 5895->5899 5898 401c3b 5896->5898 5897->5882 5900 401c76 5898->5900 5901 401c49 5898->5901 5899->5897 5902 401a58 __vswprintf_helper 100 API calls 5900->5902 5916 401a58 5901->5916 5904 401c87 5902->5904 5906 401cb0 5904->5906 5908 401c9a 5904->5908 5906->5897 5912 4022a5 __msize 66 API calls 5906->5912 5907 401c63 5909 4022a5 __msize 66 API calls 5907->5909 5910 4022a5 __msize 66 API calls 5908->5910 5911 401c68 5909->5911 5913 401c9f 5910->5913 5911->5897 5914 4022a5 __msize 66 API calls 5911->5914 5912->5895 5913->5897 5915 4022a5 __msize 66 API calls 5913->5915 5914->5897 5915->5897 5917 401a86 5916->5917 5918 401a66 5916->5918 5921 401a96 5917->5921 5926 401ab6 5917->5926 5919 4022a5 __msize 66 API calls 5918->5919 5920 401a6b 5919->5920 5923 402246 __msize 66 API calls 5920->5923 5922 4022a5 __msize 66 API calls 5921->5922 5924 401a9b 5922->5924 5929 401a7b 5923->5929 5925 402246 __msize 66 API calls 5924->5925 5925->5929 5927 401afd 5926->5927 5926->5929 5931 401f5e 5926->5931 5927->5929 5930 401f5e __flsbuf 100 API calls 5927->5930 5929->5906 5929->5907 5930->5929 5952 40554d 5931->5952 5933 401f6c 5934 401f77 5933->5934 5935 401f8e 5933->5935 5936 4022a5 __msize 66 API calls 5934->5936 5937 401f92 5935->5937 5938 401f9f __flswbuf 5935->5938 5945 401f7c 5936->5945 5939 4022a5 __msize 66 API calls 5937->5939 5938->5945 5948 401ff4 5938->5948 5951 401fff 5938->5951 5959 40534e 5938->5959 5939->5945 5940 40208d 5942 40522e __locking 100 API calls 5940->5942 5941 40200d 5943 402024 5941->5943 5947 402041 5941->5947 5942->5945 5972 40522e 5943->5972 5945->5927 5947->5945 5997 404b4f 5947->5997 5948->5951 5969 40530a 5948->5969 5951->5940 5951->5941 5953 405575 5952->5953 5954 405558 5952->5954 5953->5933 5955 4022a5 __msize 66 API calls 5954->5955 5956 40555d 5955->5956 5957 402246 __msize 66 API calls 5956->5957 5958 40556d 5957->5958 5958->5933 5960 405365 5959->5960 5961 405357 5959->5961 5964 405390 5960->5964 5965 4022a5 __msize 66 API calls 5960->5965 5962 4022a5 __msize 66 API calls 5961->5962 5963 40535c 5962->5963 5963->5948 5964->5948 5966 405379 5965->5966 5967 402246 __msize 66 API calls 5966->5967 5968 405389 5967->5968 5968->5948 5970 4061a9 __malloc_crt 66 API calls 5969->5970 5971 40531a 5970->5971 5971->5951 5973 40523a __freefls@4 5972->5973 5974 405242 5973->5974 5975 40525d 5973->5975 6029 4022b8 5974->6029 5977 40526b 5975->5977 5980 4052ac 5975->5980 5979 4022b8 __write_nolock 66 API calls 5977->5979 5982 405270 5979->5982 6032 407d2f 5980->6032 5981 4022a5 __msize 66 API calls 5990 40524f __freefls@4 5981->5990 5984 4022a5 __msize 66 API calls 5982->5984 5985 405277 5984->5985 5987 402246 __msize 66 API calls 5985->5987 5986 4052b2 5988 4052d5 5986->5988 5989 4052bf 5986->5989 5987->5990 5992 4022a5 __msize 66 API calls 5988->5992 6042 404c68 5989->6042 5990->5945 5994 4052da 5992->5994 5993 4052cd 6099 405300 5993->6099 5995 4022b8 __write_nolock 66 API calls 5994->5995 5995->5993 5998 404b5b __freefls@4 5997->5998 5999 404b88 5998->5999 6000 404b6c 5998->6000 6002 404b96 5999->6002 6004 404bb7 5999->6004 6001 4022b8 __write_nolock 66 API calls 6000->6001 6003 404b71 6001->6003 6005 4022b8 __write_nolock 66 API calls 6002->6005 6006 4022a5 __msize 66 API calls 6003->6006 6008 404bd7 6004->6008 6009 404bfd 6004->6009 6007 404b9b 6005->6007 6021 404b79 __freefls@4 6006->6021 6012 4022a5 __msize 66 API calls 6007->6012 6010 4022b8 __write_nolock 66 API calls 6008->6010 6011 407d2f __close 67 API calls 6009->6011 6013 404bdc 6010->6013 6014 404c03 6011->6014 6015 404ba2 6012->6015 6016 4022a5 __msize 66 API calls 6013->6016 6017 404c10 6014->6017 6018 404c2c 6014->6018 6019 402246 __msize 66 API calls 6015->6019 6020 404be3 6016->6020 6022 404acc __lseeki64_nolock 68 API calls 6017->6022 6023 4022a5 __msize 66 API calls 6018->6023 6019->6021 6024 402246 __msize 66 API calls 6020->6024 6021->5945 6025 404c21 6022->6025 6026 404c31 6023->6026 6024->6021 6147 404c5e 6025->6147 6027 4022b8 __write_nolock 66 API calls 6026->6027 6027->6025 6030 402571 _raise 66 API calls 6029->6030 6031 4022bd 6030->6031 6031->5981 6033 407d3b __freefls@4 6032->6033 6034 407d96 6033->6034 6037 402bf4 __lock 66 API calls 6033->6037 6035 407db8 __freefls@4 6034->6035 6036 407d9b EnterCriticalSection 6034->6036 6035->5986 6036->6035 6038 407d67 6037->6038 6039 407d7e 6038->6039 6041 403531 ___crtInitCritSecAndSpinCount 66 API calls 6038->6041 6102 407dc6 6039->6102 6041->6039 6043 404ca4 6042->6043 6044 404c9d 6042->6044 6045 404ca8 6043->6045 6046 404ccf 6043->6046 6048 401a49 __except_handler4 5 API calls 6044->6048 6047 4022b8 __write_nolock 66 API calls 6045->6047 6050 404d39 6046->6050 6051 404d13 6046->6051 6052 404cad 6047->6052 6049 405226 6048->6049 6049->5993 6054 404d4b 6050->6054 6106 404acc 6050->6106 6053 4022b8 __write_nolock 66 API calls 6051->6053 6055 4022a5 __msize 66 API calls 6052->6055 6058 404d18 6053->6058 6057 40534e __flswbuf 66 API calls 6054->6057 6056 404cb4 6055->6056 6060 402246 __msize 66 API calls 6056->6060 6066 404d54 6057->6066 6061 4022a5 __msize 66 API calls 6058->6061 6060->6044 6063 404d21 6061->6063 6062 404f53 6064 404f61 6062->6064 6065 405186 WriteFile 6062->6065 6067 402246 __msize 66 API calls 6063->6067 6068 405004 6064->6068 6074 404f73 6064->6074 6069 4051ad GetLastError 6065->6069 6078 404f4e 6065->6078 6066->6062 6116 4025e8 6066->6116 6067->6044 6079 40500e 6068->6079 6091 4050ab 6068->6091 6069->6078 6071 4051e7 6071->6044 6076 4022a5 __msize 66 API calls 6071->6076 6073 404d93 6073->6062 6077 404da1 GetConsoleCP 6073->6077 6074->6071 6075 404fbe WriteFile 6074->6075 6074->6078 6075->6069 6075->6074 6081 4051d4 6076->6081 6077->6078 6095 404dc1 6077->6095 6078->6044 6078->6071 6083 4051c7 6078->6083 6079->6071 6079->6078 6080 405061 WriteFile 6079->6080 6080->6069 6080->6079 6088 4022b8 __write_nolock 66 API calls 6081->6088 6082 405101 WideCharToMultiByte 6082->6069 6086 405134 WriteFile 6082->6086 6084 4051dc 6083->6084 6085 4051cf 6083->6085 6124 4022cb 6084->6124 6089 4022a5 __msize 66 API calls 6085->6089 6090 405162 GetLastError 6086->6090 6086->6091 6088->6044 6089->6081 6090->6091 6091->6071 6091->6078 6091->6082 6091->6086 6093 40643e 78 API calls __write_nolock 6093->6095 6094 404e39 WideCharToMultiByte 6094->6078 6096 404e67 WriteFile 6094->6096 6095->6069 6095->6078 6095->6093 6095->6094 6097 407df1 11 API calls __putwch_nolock 6095->6097 6098 404ea0 WriteFile 6095->6098 6121 40648b 6095->6121 6096->6069 6096->6095 6097->6095 6098->6069 6098->6095 6146 407dcf LeaveCriticalSection 6099->6146 6101 405308 6101->5990 6105 402b1c LeaveCriticalSection 6102->6105 6104 407dcd 6104->6034 6105->6104 6129 407cbe 6106->6129 6108 404ae8 6109 404af0 6108->6109 6110 404b01 SetFilePointer 6108->6110 6111 4022a5 __msize 66 API calls 6109->6111 6112 404b19 GetLastError 6110->6112 6114 404af5 6110->6114 6111->6114 6113 404b23 6112->6113 6112->6114 6115 4022cb __dosmaperr 66 API calls 6113->6115 6114->6054 6115->6114 6117 402571 _raise 66 API calls 6116->6117 6118 4025ee 6117->6118 6119 4025fb GetConsoleMode 6118->6119 6120 4016e8 __amsg_exit 66 API calls 6118->6120 6119->6062 6119->6073 6120->6119 6143 406455 6121->6143 6125 4022b8 __write_nolock 66 API calls 6124->6125 6126 4022d1 __dosmaperr 6125->6126 6127 4022a5 __msize 66 API calls 6126->6127 6128 4022e5 6127->6128 6128->6044 6130 407cc7 6129->6130 6131 407cde 6129->6131 6132 4022b8 __write_nolock 66 API calls 6130->6132 6133 4022b8 __write_nolock 66 API calls 6131->6133 6135 407d2b 6131->6135 6134 407ccc 6132->6134 6136 407d0c 6133->6136 6137 4022a5 __msize 66 API calls 6134->6137 6135->6108 6138 4022a5 __msize 66 API calls 6136->6138 6139 407cd4 6137->6139 6140 407d13 6138->6140 6139->6108 6141 402246 __msize 66 API calls 6140->6141 6142 407d23 6141->6142 6142->6108 6144 4020be _LocaleUpdate::_LocaleUpdate 76 API calls 6143->6144 6145 406466 6144->6145 6145->6095 6146->6101 6150 407dcf LeaveCriticalSection 6147->6150 6149 404c66 6149->6021 6150->6149 6152 401375 _memset __EH_prolog3_catch 6151->6152 6153 4013af GetTempPathW 6152->6153 6154 4013d4 6153->6154 6155 4015cf 6153->6155 6154->6155 6156 4013dc GetTempFileNameW 6154->6156 6157 401410 FindResourceW 6156->6157 6158 4013fb 6156->6158 6157->6158 6159 401434 SizeofResource 6157->6159 6175 40a234 6158->6175 6159->6158 6160 401455 LoadResource 6159->6160 6160->6158 6162 401474 LockResource 6160->6162 6162->6158 6163 401496 CreateFileW 6162->6163 6163->6158 6164 4014cf ShowWindow 6163->6164 6165 4014f1 6164->6165 6166 4014ff WriteFile 6165->6166 6167 401529 InvalidateRect 6165->6167 6166->6165 6166->6167 6167->6165 6168 40154a ShowWindow FindCloseChangeNotification 6167->6168 6172 4016cc 6168->6172 6170 40157b _memset 6171 40158a CreateProcessW ExitProcess 6170->6171 6178 401b4e 6172->6178 6176 40a267 RaiseException 6175->6176 6177 40a25b 6175->6177 6176->6157 6177->6176 6179 401b76 6178->6179 6180 401b59 6178->6180 6182 401b83 6179->6182 6184 401b90 6179->6184 6181 4022a5 __msize 66 API calls 6180->6181 6183 401b5e 6181->6183 6185 4022a5 __msize 66 API calls 6182->6185 6187 402246 __msize 66 API calls 6183->6187 6186 401a58 __vswprintf_helper 100 API calls 6184->6186 6192 401b88 6185->6192 6188 401ba7 6186->6188 6190 4016e4 6187->6190 6188->6190 6191 4022a5 __msize 66 API calls 6188->6191 6189 402246 __msize 66 API calls 6189->6190 6190->6170 6191->6192 6192->6189 6194 40247f 6193->6194 6197 40248b 6193->6197 6195 4023cc _raise 66 API calls 6194->6195 6195->6197 6196 40249f TlsFree 6198 4024ad 6196->6198 6197->6196 6197->6198 6199 402af9 6198->6199 6200 402ae1 DeleteCriticalSection 6198->6200 6202 402b0b DeleteCriticalSection 6199->6202 6203 402738 6199->6203 6201 40611b __freefls@4 66 API calls 6200->6201 6201->6198 6202->6199 6203->5236 6215 4023c3 6204->6215 6206 4019be __init_pointers 6218 403189 6206->6218 6209 402355 __initp_misc_cfltcvt_tab 66 API calls 6210 4019fa 6209->6210 6210->5396 6212 402a87 6211->6212 6213 403531 ___crtInitCritSecAndSpinCount 66 API calls 6212->6213 6214 402832 6212->6214 6213->6212 6214->5406 6214->5407 6216 402355 __initp_misc_cfltcvt_tab 66 API calls 6215->6216 6217 4023ca 6216->6217 6217->6206 6219 402355 __initp_misc_cfltcvt_tab 66 API calls 6218->6219 6220 4019f0 6219->6220 6220->6209 6222 4018a2 __freefls@4 6221->6222 6223 402bf4 __lock 66 API calls 6222->6223 6224 4018a9 6223->6224 6227 4023cc _raise 66 API calls 6224->6227 6234 401918 _raise 6224->6234 6229 4018d8 6227->6229 6228 401960 __freefls@4 6228->5430 6231 4023cc _raise 66 API calls 6229->6231 6235 4018e6 6231->6235 6232 401957 6233 401732 _malloc 3 API calls 6232->6233 6233->6228 6238 401963 6234->6238 6235->6234 6236 4023c3 _raise 66 API calls 6235->6236 6237 4023cc _raise 66 API calls 6235->6237 6236->6235 6237->6235 6239 401944 6238->6239 6240 401969 6238->6240 6239->6228 6242 402b1c LeaveCriticalSection 6239->6242 6243 402b1c LeaveCriticalSection 6240->6243 6242->6232 6243->6239 7030 403876 7034 403882 7030->7034 7031 403888 7032 40382c 102 API calls _write_multi_char 7032->7034 7033 4022a5 __msize 66 API calls 7033->7034 7034->7031 7034->7032 7034->7033 7035 40b479 7036 401a49 __except_handler4 5 API calls 7035->7036 7037 40b48a 7036->7037 7318 40aa39 7321 40a829 7318->7321 7320 40aa41 7322 40a86b 7321->7322 7323 40a833 7321->7323 7322->7320 7323->7322 7324 4025e8 _CallSETranslator 66 API calls 7323->7324 7325 40a85f 7324->7325 7325->7320 7326 40243a TlsAlloc 7327 40163c 7328 401654 7327->7328 7329 401647 DeleteFileW 7327->7329 7330 401663 PostMessageW 7328->7330 7331 40165a CloseHandle 7328->7331 7329->7328 7332 401a49 __except_handler4 5 API calls 7330->7332 7331->7330 7333 401692 7332->7333 7038 40a67d 7039 40a691 7038->7039 7040 40a684 7038->7040 7042 40b402 7040->7042 7043 40b416 7042->7043 7044 40b40e 7042->7044 7043->7039 7045 40611b __freefls@4 66 API calls 7044->7045 7045->7043 7334 40a33d 7335 401a49 __except_handler4 5 API calls 7334->7335 7336 40a34d 7335->7336 7337 40b221 ___InternalCxxFrameHandler 68 API calls 7336->7337 7338 40a368 7337->7338

                                                      Control-flow Graph

                                                      APIs
                                                      • __EH_prolog3_catch.LIBCMT ref: 00401370
                                                      • _memset.LIBCMT ref: 00401395
                                                      • _memset.LIBCMT ref: 004013AA
                                                      • GetTempPathW.KERNEL32(00000104,?,?,?,?,?,?,00000088), ref: 004013C6
                                                      • GetTempFileNameW.KERNELBASE(?,MSI,00000000,?,?,?,?,?,?,00000088), ref: 004013F1
                                                      • __CxxThrowException@8.LIBCMT ref: 0040140B
                                                      • FindResourceW.KERNEL32(?,DATA,MSI,?,?,?,?,?,00000088), ref: 00401417
                                                      • SizeofResource.KERNEL32(?,00000000,?,?,?,?,?,00000088), ref: 00401438
                                                      • LoadResource.KERNEL32(?,00000000,?,?,?,?,?,00000088), ref: 00401459
                                                      • LockResource.KERNEL32(00000000,?,?,?,?,?,00000088), ref: 00401475
                                                      • CreateFileW.KERNELBASE(?,00120116,00000003,00000000,00000002,00000080,00000000,?,?,?,?,?,00000088), ref: 004014AD
                                                      • ShowWindow.USER32(00000005,?,?,?,?,?,00000088), ref: 004014EF
                                                      • WriteFile.KERNELBASE(000000FF,?,00002000,?,00000000,?,?,?,?,?,00000088), ref: 0040150B
                                                      • InvalidateRect.USER32(00000000,00000001,?,?,?,?,?,00000088), ref: 00401540
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,00000088), ref: 00401551
                                                      • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,?,?,?,00000088), ref: 00401556
                                                      • _swprintf.LIBCMT ref: 00401576
                                                      • _memset.LIBCMT ref: 00401585
                                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004015C2
                                                      • ExitProcess.KERNEL32 ref: 004015C9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Resource$File_memset$CreateFindProcessShowTempWindow$ChangeCloseException@8ExitH_prolog3_catchInvalidateLoadLockNameNotificationPathRectSizeofThrowWrite_swprintf
                                                      • String ID: %s /i %s$DATA$MSI$msiexec.exe
                                                      • API String ID: 3524195846-4018923517
                                                      • Opcode ID: 6749e29da5631927e082cef264a39af6d613541d54a80a6319aa98c742fdb2b9
                                                      • Instruction ID: 20377c8c5a59a0e20dd786114ab2e7341586cf19af3ec8ffaaf84ee0be96f013
                                                      • Opcode Fuzzy Hash: 6749e29da5631927e082cef264a39af6d613541d54a80a6319aa98c742fdb2b9
                                                      • Instruction Fuzzy Hash: 49618B71900218EBDB20DFE5DD89EEE7AB8BB08704F20453AF505F61E1D7789A05CB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00401148: _memset.LIBCMT ref: 00401158
                                                        • Part of subcall function 00401148: LoadCursorW.USER32(00000000,00007F00), ref: 0040118A
                                                        • Part of subcall function 00401148: GetSysColorBrush.USER32(0000000F), ref: 00401195
                                                        • Part of subcall function 00401148: RegisterClassExW.USER32(00000030), ref: 004011AF
                                                        • Part of subcall function 004011B8: KiUserCallbackDispatcher.NTDLL(00000010), ref: 004011C2
                                                        • Part of subcall function 004011B8: GetSystemMetrics.USER32(00000011), ref: 004011C8
                                                        • Part of subcall function 004011B8: CreateWindowExW.USER32(00000008,msi2exestub_wnd_class,0040DB1C,80400000,-FFFFFED4,-00000050,0000012C,00000050,00000000,00000000,00401087,00000000), ref: 004011FA
                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000134E,?,00000000,?), ref: 004010A1
                                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004010AC
                                                      • TranslateMessage.USER32(?), ref: 004010BE
                                                      • DispatchMessageW.USER32(?), ref: 004010C8
                                                      • KiUserCallbackDispatcher.NTDLL(?,00000000,00000000,00000000), ref: 004010D5
                                                      • GetLastError.KERNEL32 ref: 004010E0
                                                      • _wcsrchr.LIBCMT ref: 00401108
                                                      • MessageBoxW.USER32(00000000,?,00000002,00000010), ref: 00401127
                                                      Strings
                                                      • %s (code: 0x%08X), xrefs: 004010EC
                                                      • Main::CreateThread() failure., xrefs: 004010E7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Message$CallbackCreateDispatcherUser$BrushChangeClassCloseColorCursorDispatchErrorFindLastLoadMetricsNotificationRegisterSystemThreadTranslateWindow_memset_wcsrchr
                                                      • String ID: %s (code: 0x%08X)$Main::CreateThread() failure.
                                                      • API String ID: 1851981397-3924681112
                                                      • Opcode ID: 049e3ccb6c8dc290916627f97ca683ac69638bb7bcb633166ab5af477786f08e
                                                      • Instruction ID: 75a78d69b7479f35fcbcbde4da154f35cd85ebbe6c1fc4ca16132148da7ba84c
                                                      • Opcode Fuzzy Hash: 049e3ccb6c8dc290916627f97ca683ac69638bb7bcb633166ab5af477786f08e
                                                      • Instruction Fuzzy Hash: F72174716002189BD724EBA5DC89EAF7BBCEF49748F100136F601FB1A1D778A505CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetStockObject.GDI32(00000011), ref: 004012F2
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401302
                                                      • SetBkMode.GDI32(00000000,00000001), ref: 0040130A
                                                      • TextOutW.GDI32(00000000,00000014,0000001E,?,00000000,?,?), ref: 00401324
                                                      • SelectObject.GDI32(00000000,?), ref: 0040132E
                                                      • DeleteObject.GDI32(00000000), ref: 00401331
                                                      Strings
                                                      • Extract File: %d%% completed., xrefs: 004012DC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Object$Select$DeleteModeStockText
                                                      • String ID: Extract File: %d%% completed.
                                                      • API String ID: 4006763339-4045747158
                                                      • Opcode ID: 92dc52152d32e0d1ab26bf13c14b1b0ea2a3de1fe09ef5487dd13f0131aeac37
                                                      • Instruction ID: 9a93ae32731b2c3143dd3ec75d958d03ebc0d71db21fdddcd7b42a98f2b5aeee
                                                      • Opcode Fuzzy Hash: 92dc52152d32e0d1ab26bf13c14b1b0ea2a3de1fe09ef5487dd13f0131aeac37
                                                      • Instruction Fuzzy Hash: 5011D631600108EFE7249BA5DD89EEE7B69E748308F20453EF505F71D1DAB4A8408B68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL(00000010), ref: 004011C2
                                                      • GetSystemMetrics.USER32(00000011), ref: 004011C8
                                                      • CreateWindowExW.USER32(00000008,msi2exestub_wnd_class,0040DB1C,80400000,-FFFFFED4,-00000050,0000012C,00000050,00000000,00000000,00401087,00000000), ref: 004011FA
                                                      • ShowWindow.USER32(00000000,00000000,?,00401087,?,?), ref: 0040120F
                                                      • UpdateWindow.USER32 ref: 0040121B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Window$CallbackCreateDispatcherMetricsShowSystemUpdateUser
                                                      • String ID: msi2exestub_wnd_class
                                                      • API String ID: 3969648196-2601022818
                                                      • Opcode ID: db02c076b439937e0c775e0810803778dadb1931fdffb0e9f2dc47625363d73f
                                                      • Instruction ID: ecada5e8bdef915ea8f2e7981d247ba1c1a188f04b7e147b0aa45f142b1714c6
                                                      • Opcode Fuzzy Hash: db02c076b439937e0c775e0810803778dadb1931fdffb0e9f2dc47625363d73f
                                                      • Instruction Fuzzy Hash: CDF05932695228B6C6201BF56D0CFCB3E69EB86B60F010735F600F60E1C6F45404CEA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Paint$BeginMessagePostProcQuitWindow
                                                      • String ID:
                                                      • API String ID: 1092305367-0
                                                      • Opcode ID: 597c37589dba2acb60f0748054ab0ab44619a96cf5f086050fe93c53279dbac8
                                                      • Instruction ID: 24c52d57e56dc4afd828dfb1bcd95dd531efafebb2a06c973aa2dd53e7d3d95f
                                                      • Opcode Fuzzy Hash: 597c37589dba2acb60f0748054ab0ab44619a96cf5f086050fe93c53279dbac8
                                                      • Instruction Fuzzy Hash: 61011931501508EBCF01EFA8DE89CAF37B8EF09304B50467AF902F61A1D738EA159B59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 83 4049de-4049fc HeapCreate 84 404a01-404a0e call 404983 83->84 85 4049fe-404a00 83->85 88 404a10-404a1d call 40713e 84->88 89 404a34-404a37 84->89 88->89 92 404a1f-404a32 HeapDestroy 88->92 92->85
                                                      APIs
                                                      • HeapCreate.KERNELBASE(00000000,00001000,00000000,00401E4B,00000001), ref: 004049EF
                                                      • HeapDestroy.KERNEL32 ref: 00404A25
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Heap$CreateDestroy
                                                      • String ID:
                                                      • API String ID: 3296620671-0
                                                      • Opcode ID: 82632065dbaa238cdc2c75c8c16dab901d15a17d5efe5241bd0ff9e4f6f429b6
                                                      • Instruction ID: 4a707c28839996d09bb20b269c2dbeba270cd3db389e7f498d1c99760f2ed9af
                                                      • Opcode Fuzzy Hash: 82632065dbaa238cdc2c75c8c16dab901d15a17d5efe5241bd0ff9e4f6f429b6
                                                      • Instruction Fuzzy Hash: 19E01BB56953019BDB109B30DD057673694DB94787F10843AF505E55E1FBB885405E0D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 194 4065ba-4065dc call 4023c3 197 406690-40669a 194->197 198 4065e2-4065f1 LoadLibraryA 194->198 199 406715-40671d 197->199 200 40669c-4066a2 197->200 201 406770 198->201 202 4065f7-406607 GetProcAddress 198->202 204 406750-40675e call 4023cc 199->204 205 40671f-406728 call 4023cc 199->205 200->199 203 4066a4-4066bd call 4023cc * 2 200->203 206 406772-406776 201->206 202->201 207 40660d-40664f call 402355 GetProcAddress call 402355 GetProcAddress call 402355 call 401791 202->207 203->199 223 4066bf-4066c1 203->223 204->201 218 406760-40676e 204->218 205->204 219 40672a-406731 205->219 235 406651-40665b call 40214a 207->235 236 40665e-406662 207->236 218->206 219->204 228 406733-40673b 219->228 223->199 227 4066c3-4066c7 223->227 237 4066e2-4066ee call 4017c8 227->237 238 4066c9-4066da 227->238 228->204 229 40673d-406746 call 4023cc 228->229 229->204 240 406748-40674d 229->240 235->236 236->197 242 406664-40667a GetProcAddress call 402355 236->242 247 4066f0-4066fa call 40214a 237->247 248 4066fd-406701 237->248 238->237 251 4066dc-4066e0 238->251 240->204 242->197 255 40667c-40668b GetProcAddress call 402355 242->255 247->248 253 406703-40670a 248->253 254 40670c-406713 248->254 251->199 251->237 253->204 254->204 255->197
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(USER32.DLL,00000000,00000000,00000314,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 004065E7
                                                      • GetProcAddress.KERNEL32(00000000,MessageBoxA), ref: 00406603
                                                        • Part of subcall function 00402355: TlsGetValue.KERNEL32(00000000,004023CA,00000000,004065C8,00000000,00000000,00000314,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402362
                                                        • Part of subcall function 00402355: TlsGetValue.KERNEL32(00000004,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402379
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00406620
                                                        • Part of subcall function 00402355: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 0040238E
                                                        • Part of subcall function 00402355: GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004023A9
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00406635
                                                      • __invoke_watson.LIBCMT ref: 00406656
                                                        • Part of subcall function 0040214A: _memset.LIBCMT ref: 004021D6
                                                        • Part of subcall function 0040214A: IsDebuggerPresent.KERNEL32(?,?,00000000), ref: 004021F4
                                                        • Part of subcall function 0040214A: SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,00000000), ref: 004021FE
                                                        • Part of subcall function 0040214A: UnhandledExceptionFilter.KERNEL32(?,?,?,00000000), ref: 00402208
                                                        • Part of subcall function 0040214A: GetCurrentProcess.KERNEL32(C000000D,?,?,00000000), ref: 00402223
                                                        • Part of subcall function 0040214A: TerminateProcess.KERNEL32(00000000,?,?,00000000), ref: 0040222A
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000000,00402461,?,?,?,?,?,00000088), ref: 004023D9
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000004,?,?,?,?,?,00000088), ref: 004023F0
                                                        • Part of subcall function 004023CC: GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,?,?,00000088), ref: 00402405
                                                        • Part of subcall function 004023CC: GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00402420
                                                      • GetProcAddress.KERNEL32(00000000,GetUserObjectInformationA), ref: 0040666A
                                                      • GetProcAddress.KERNEL32(00000000,GetProcessWindowStation), ref: 00406682
                                                      • __invoke_watson.LIBCMT ref: 004066F5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$Value$ExceptionFilterHandleModuleProcessUnhandled__invoke_watson$CurrentDebuggerLibraryLoadPresentTerminate_memset
                                                      • String ID: GetProcessWindowStation$GetUserObjectInformationA$MessageBoxA$USER32.DLL
                                                      • API String ID: 2940365033-1046234306
                                                      • Opcode ID: f92e63f97473645d0ee2bbb4634820050cc61aa16b2c6853a90bedad70716cb5
                                                      • Instruction ID: 903c93859fa46a6f4ea376e20a98d8dd23118c8d58616714cf58463bdc1121ca
                                                      • Opcode Fuzzy Hash: f92e63f97473645d0ee2bbb4634820050cc61aa16b2c6853a90bedad70716cb5
                                                      • Instruction Fuzzy Hash: 8641B471900205EADF10AFB59D8596F7BA9AE44348B25093FE40AF32D0DBBC99508B6D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 004037E1
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004037F6
                                                      • UnhandledExceptionFilter.KERNEL32(0040C8AC), ref: 00403801
                                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0040381D
                                                      • TerminateProcess.KERNEL32(00000000), ref: 00403824
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                      • String ID:
                                                      • API String ID: 2579439406-0
                                                      • Opcode ID: e1a142f2597a4008e7613153095846bbf84df19b1d486ef0f12ac1990e7fc7c8
                                                      • Instruction ID: 3151b91aa872a883dad0193dde7ea169f4a89536d61c20abba83bbf876892fdd
                                                      • Opcode Fuzzy Hash: e1a142f2597a4008e7613153095846bbf84df19b1d486ef0f12ac1990e7fc7c8
                                                      • Instruction Fuzzy Hash: 0B21CBB4941208EFD740DF68F9846843BA5FB98305F50913AE909A32A0E7B85AD18F5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_000041E1), ref: 00404223
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 531bf9125881a94b0db8439539261c5591d31a2986fbad8a3190194338fd3003
                                                      • Instruction ID: c9ab3a1dd1adf17f36c40b88a96730a33f5791edfa2a03c35caf01849fe1497e
                                                      • Opcode Fuzzy Hash: 531bf9125881a94b0db8439539261c5591d31a2986fbad8a3190194338fd3003
                                                      • Instruction Fuzzy Hash: AE9002B8B61100D6D60017B25D4D60565949B9860275145716205F8495DE7442409569
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 93 4028a5-4028af 94 4028b1-4028b8 93->94 95 4028c0-4028c3 94->95 96 4028ba-4028be 94->96 97 402a40-402a44 95->97 98 4028c9-4028d5 call 406900 95->98 96->94 96->95 101 4028db-4028e5 call 406900 98->101 102 402a0c-402a18 GetStdHandle 98->102 109 4028f4-4028fa 101->109 110 4028e7-4028ee 101->110 103 402a1a-402a1d 102->103 104 402a3f 102->104 103->104 106 402a1f-402a39 call 4062a0 WriteFile 103->106 104->97 106->104 109->104 112 402900-40291b call 40689b 109->112 110->102 110->109 115 40292a-402946 GetModuleFileNameA 112->115 116 40291d-402927 call 40214a 112->116 118 402948-40295d call 40689b 115->118 119 40296e-402979 call 4062a0 115->119 116->115 118->119 125 40295f-40296b call 40214a 118->125 126 4029b3 119->126 127 40297b-4029a0 call 4062a0 call 4067e8 119->127 125->119 129 4029b5-4029c6 call 406777 126->129 127->126 139 4029a2-4029b1 call 40214a 127->139 137 4029d5-4029e8 call 406777 129->137 138 4029c8-4029d2 call 40214a 129->138 145 4029f7-402a0a call 4065ba 137->145 146 4029ea-4029f4 call 40214a 137->146 138->137 139->129 145->104 146->145
                                                      APIs
                                                      • _strcpy_s.LIBCMT ref: 00402911
                                                      • __invoke_watson.LIBCMT ref: 00402922
                                                      • GetModuleFileNameA.KERNEL32(00000000,00410081,00000104,0040259A,00000001,00000214,?,?,?,?,?,00000088), ref: 0040293E
                                                      • _strcpy_s.LIBCMT ref: 00402953
                                                      • __invoke_watson.LIBCMT ref: 00402966
                                                      • _strlen.LIBCMT ref: 0040296F
                                                      • _strlen.LIBCMT ref: 0040297C
                                                      • __invoke_watson.LIBCMT ref: 004029A9
                                                      • _strcat_s.LIBCMT ref: 004029BC
                                                      • __invoke_watson.LIBCMT ref: 004029CD
                                                      • _strcat_s.LIBCMT ref: 004029DE
                                                      • __invoke_watson.LIBCMT ref: 004029EF
                                                      • GetStdHandle.KERNEL32(000000F4,00000001,00000001,00000000,76EC5E70,00000003,00402A71,000000FC,00407037,00000001,00000000,00000000,?,004061B6,0040259A,00000001), ref: 00402A0E
                                                      • _strlen.LIBCMT ref: 00402A2F
                                                      • WriteFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,004061B6,0040259A,00000001,00000001,00402B7E,00000018,0040E0A0,0000000C,00402C0D,00000001), ref: 00402A39
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: __invoke_watson$_strlen$File_strcat_s_strcpy_s$HandleModuleNameWrite
                                                      • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                                                      • API String ID: 1879448924-4022980321
                                                      • Opcode ID: 409424b9660b85a0269d64acb115b1ad67300d71880ba7c06291fded9d5e2056
                                                      • Instruction ID: 93a8d7d5ea80ae4c3e828802d8d553a9b5e06a216e86f543143183862d938038
                                                      • Opcode Fuzzy Hash: 409424b9660b85a0269d64acb115b1ad67300d71880ba7c06291fded9d5e2056
                                                      • Instruction Fuzzy Hash: 9F3127B3A402007AE52132615E8EF6B364C9B15318F15023BFD0AB52D2EAFD8D5081BD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 152 402721-402731 GetModuleHandleA 153 402733-40273b call 402475 152->153 154 40273c-402784 GetProcAddress * 4 152->154 156 402786-40278d 154->156 157 40279c-4027bb 154->157 156->157 160 40278f-402796 156->160 158 4027c0-4027ce TlsAlloc 157->158 161 4028a0 158->161 162 4027d4-4027df TlsSetValue 158->162 160->157 163 402798-40279a 160->163 164 4028a2-4028a4 161->164 162->161 165 4027e5-402834 call 4019b8 call 402355 * 4 call 402a7e 162->165 163->157 163->158 178 402836-402851 call 4023cc 165->178 179 40289b call 402475 165->179 178->179 184 402853-402865 call 4061e9 178->184 179->161 184->179 187 402867-40287e call 4023cc 184->187 187->179 191 402880-402899 call 4024b2 GetCurrentThreadId 187->191 191->164
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,00401E5D), ref: 00402727
                                                      • __mtterm.LIBCMT ref: 00402733
                                                        • Part of subcall function 00402475: TlsFree.KERNEL32(00000002,004028A0), ref: 004024A0
                                                        • Part of subcall function 00402475: DeleteCriticalSection.KERNEL32(00000000,00000000,7591DFB0,00000001,004028A0), ref: 00402AE2
                                                        • Part of subcall function 00402475: DeleteCriticalSection.KERNEL32(00000002,7591DFB0,00000001,004028A0), ref: 00402B0C
                                                      • GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00402749
                                                      • GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00402756
                                                      • GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00402763
                                                      • GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00402770
                                                      • TlsAlloc.KERNEL32 ref: 004027C0
                                                      • TlsSetValue.KERNEL32(00000000), ref: 004027DB
                                                      • __init_pointers.LIBCMT ref: 004027E5
                                                      • __calloc_crt.LIBCMT ref: 0040285A
                                                      • GetCurrentThreadId.KERNEL32 ref: 0040288A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$CriticalDeleteSection$AllocCurrentFreeHandleModuleThreadValue__calloc_crt__init_pointers__mtterm
                                                      • String ID: FlsAlloc$FlsFree$FlsGetValue$FlsSetValue$KERNEL32.DLL
                                                      • API String ID: 2125014093-3819984048
                                                      • Opcode ID: d95bc911496358f0c842fd71132bedc0ea270bbad93ccd9a414d7ca50f619fdd
                                                      • Instruction ID: d02e941b92a81709c8bf7b88b63dabc1874790f769ac485b758b067b94092550
                                                      • Opcode Fuzzy Hash: d95bc911496358f0c842fd71132bedc0ea270bbad93ccd9a414d7ca50f619fdd
                                                      • Instruction Fuzzy Hash: 15311931940311DADB21ABB5BE49B463FA5AB09714B14863BF814B62F1DBFCC480CB6C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,0040E058,0000000C,004025C3,00000000,00000000,?,?,?,?,?,00000088), ref: 004024C3
                                                      • GetProcAddress.KERNEL32(?,EncodePointer), ref: 004024F7
                                                      • GetProcAddress.KERNEL32(?,DecodePointer), ref: 00402507
                                                      • InterlockedIncrement.KERNEL32(0040F6F8), ref: 00402529
                                                      • __lock.LIBCMT ref: 00402531
                                                      • ___addlocaleref.LIBCMT ref: 00402550
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleIncrementInterlockedModule___addlocaleref__lock
                                                      • String ID: DecodePointer$EncodePointer$KERNEL32.DLL
                                                      • API String ID: 1036688887-2843748187
                                                      • Opcode ID: 2274a066ac026ae925fe5652a49c290d3624d1abdb19e6b261c600bba24699d5
                                                      • Instruction ID: fbdbd79d6d8703cd58bfce1346c9629dc42ac9281775cfae9e4e5af3c7655ebc
                                                      • Opcode Fuzzy Hash: 2274a066ac026ae925fe5652a49c290d3624d1abdb19e6b261c600bba24699d5
                                                      • Instruction Fuzzy Hash: EA116070940701DED720AFBA9D49B5ABBF0AF00304F10467FA959B26D0CBB89504DF1C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 277 404743-40476a call 402f0c GetStartupInfoA 280 40476b call 4061e9 277->280 281 404770-404774 280->281 282 40497a 281->282 283 40477a-40478b 281->283 285 40497d-404982 call 402f51 282->285 284 4047b6-4047b8 283->284 286 4047ba-4047be 284->286 287 40478d-4047b0 284->287 289 4048c1 286->289 290 4047c4-4047c9 286->290 287->284 292 4048c3-4048d3 289->292 290->289 293 4047cf-4047e1 290->293 294 4048e0-4048e6 292->294 295 4048d5-4048d8 292->295 296 4047e3 293->296 297 4047e5-4047e8 293->297 300 4048e8-4048eb 294->300 301 4048ed-4048f4 294->301 295->294 299 4048da-4048de 295->299 296->297 298 40483c-404842 297->298 302 404844 298->302 303 4047ea-4047ec 298->303 304 404952-404956 299->304 305 4048f7-404903 GetStdHandle 300->305 301->305 307 40484c-404852 302->307 306 4047ee call 4061e9 303->306 304->292 308 40495c-40496a SetHandleCount 304->308 309 404905-404907 305->309 310 404948-40494c 305->310 311 4047f3-4047f7 306->311 307->289 312 404854-40485c 307->312 308->285 309->310 313 404909-404912 GetFileType 309->313 310->304 315 404846 311->315 316 4047f9-40480f 311->316 317 4048b4-4048bf 312->317 318 40485e-404861 312->318 313->310 314 404914-40491e 313->314 319 404920-404924 314->319 320 404926-404929 314->320 315->307 321 404837-404839 316->321 317->289 317->312 318->317 322 404863-404867 318->322 323 40492f-404937 319->323 320->323 324 40492b 320->324 325 404811-404831 321->325 326 40483b 321->326 322->317 327 404869-40486b 322->327 330 404938 call 403531 323->330 324->323 325->321 326->298 328 404878-4048a1 327->328 329 40486d-404876 GetFileType 327->329 331 4048a2 call 403531 328->331 329->317 329->328 332 40493d-404941 330->332 333 4048a7-4048ab 331->333 332->282 334 404943-404946 332->334 333->282 335 4048b1 333->335 334->304 335->317
                                                      APIs
                                                      • GetStartupInfoA.KERNEL32(?), ref: 00404758
                                                      • __calloc_crt.LIBCMT ref: 0040476B
                                                        • Part of subcall function 004061E9: __calloc_impl.LIBCMT ref: 004061F7
                                                        • Part of subcall function 004061E9: Sleep.KERNEL32(00000000,0040259A,00000001,00000214,?,?,?,?,?,00000088), ref: 0040620E
                                                      • __calloc_crt.LIBCMT ref: 004047EE
                                                      • GetFileType.KERNEL32(00000038), ref: 0040486E
                                                      • ___crtInitCritSecAndSpinCount.LIBCMT ref: 004048A2
                                                      • GetStdHandle.KERNEL32(-000000F6), ref: 004048F8
                                                      • GetFileType.KERNEL32(00000000), ref: 0040490A
                                                      • ___crtInitCritSecAndSpinCount.LIBCMT ref: 00404938
                                                      • SetHandleCount.KERNEL32 ref: 00404962
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Count$CritFileHandleInitSpinType___crt__calloc_crt$InfoSleepStartup__calloc_impl
                                                      • String ID:
                                                      • API String ID: 1318386821-0
                                                      • Opcode ID: 549ced214fe30d9228ee0246e29af2e7086a577bc573e2d7a649d7adddc458a1
                                                      • Instruction ID: d491d6a5f774743e45dc405d5e5e38eec6b60656dbc77cbffaa76a34aa0bb66e
                                                      • Opcode Fuzzy Hash: 549ced214fe30d9228ee0246e29af2e7086a577bc573e2d7a649d7adddc458a1
                                                      • Instruction Fuzzy Hash: 676149B59043818FC7209B38C844B567BE0AF96334F258B7BD665BB2E1D738D405CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 336 4058a6-4058cd call 40582c 339 4058dd-4058e0 336->339 340 4058cf-4058d8 call 4055a9 336->340 342 4058e2-4058e8 339->342 347 405a70-405a7e call 401a49 340->347 344 4058ee-4058f9 342->344 345 40597f-4059a3 call 406540 342->345 344->342 348 4058fb-405901 344->348 354 4059cf-4059d2 345->354 351 405907-40590d 348->351 352 405a6d 348->352 351->352 355 405913-40591f IsValidCodePage 351->355 352->347 356 4059d4-4059e4 354->356 357 4059a5-4059aa 354->357 355->352 358 405925-405932 GetCPInfo 355->358 356->354 361 4059e6-405a05 call 40557a 356->361 357->356 362 4059ac-4059b2 357->362 359 405a61-405a67 358->359 360 405938-405956 call 406540 358->360 359->340 359->352 370 405a54 360->370 371 40595c-405960 360->371 372 405a06-405a11 361->372 365 4059c6-4059c8 362->365 368 4059b4-4059c5 365->368 369 4059ca-4059ce 365->369 368->365 369->354 373 405a57-405a5f 370->373 374 405a35-405a38 371->374 375 405966 371->375 372->372 376 405a13-405a1a call 4055fe 372->376 373->376 379 405a3d-405a42 374->379 377 405969-40596d 375->377 386 405a1f-405a24 376->386 377->374 380 405973-40597a 377->380 379->379 382 405a44-405a52 call 40557a 379->382 383 405a25-405a27 380->383 382->373 383->386 387 405a29-405a2f 383->387 386->383 387->374 387->377
                                                      APIs
                                                      • getSystemCP.LIBCMT ref: 004058BF
                                                        • Part of subcall function 0040582C: _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00405839
                                                        • Part of subcall function 0040582C: GetOEMCP.KERNEL32(00000000), ref: 00405853
                                                      • setSBCS.LIBCMT ref: 004058D1
                                                        • Part of subcall function 004055A9: _memset.LIBCMT ref: 004055BC
                                                      • IsValidCodePage.KERNEL32(-00000030), ref: 00405917
                                                      • GetCPInfo.KERNEL32(00000000,?), ref: 0040592A
                                                      • _memset.LIBCMT ref: 00405942
                                                      • setSBUpLow.LIBCMT ref: 00405A15
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Locale_memset$CodeInfoPageSystemUpdateUpdate::_Valid
                                                      • String ID:
                                                      • API String ID: 2658552758-0
                                                      • Opcode ID: fcad07914a744a3ed406cd8353dc3742bbee728f8a7734bc3712e5eef50fd376
                                                      • Instruction ID: e73e6ba14706cba1d3f0db2a5a95ade0cfbff73fe22f9ed9fb17c5f14122fbf6
                                                      • Opcode Fuzzy Hash: fcad07914a744a3ed406cd8353dc3742bbee728f8a7734bc3712e5eef50fd376
                                                      • Instruction Fuzzy Hash: F351D471A006549BDF259F65C8806BBBBB5EF44314F14817BE886BF2C2D63C8946CF98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 388 402355-402366 TlsGetValue 389 402368-402370 388->389 390 402389-402398 GetModuleHandleA 388->390 389->390 391 402372-40237f TlsGetValue 389->391 392 40239a-4023a1 call 4022e9 390->392 393 4023bd-4023c2 390->393 391->390 397 402381-402387 391->397 392->393 398 4023a3-4023a9 GetProcAddress 392->398 399 4023af-4023b1 397->399 398->399 399->393 400 4023b3-4023b9 399->400 400->393
                                                      APIs
                                                      • TlsGetValue.KERNEL32(00000000,004023CA,00000000,004065C8,00000000,00000000,00000314,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402362
                                                      • TlsGetValue.KERNEL32(00000004,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 00402379
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,00410068,00402A07,00410068,Microsoft Visual C++ Runtime Library,00012010), ref: 0040238E
                                                      • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 004023A9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Value$AddressHandleModuleProc
                                                      • String ID: EncodePointer$KERNEL32.DLL
                                                      • API String ID: 1929421221-3682587211
                                                      • Opcode ID: 2a42737889a403e7d8afdae4d2f3ffc8d2942cebba98d6740baa3c3f948ea94e
                                                      • Instruction ID: 54e1165a2b9932306059abba70c4f1523072c5380ccb0acef97fefcbe4b4d81e
                                                      • Opcode Fuzzy Hash: 2a42737889a403e7d8afdae4d2f3ffc8d2942cebba98d6740baa3c3f948ea94e
                                                      • Instruction Fuzzy Hash: 1AF01D30944213DBC7225BB5EE48A6B3AA49F417507144376ED18F6AF4DBBCCC41CA9D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 402 4023cc-4023dd TlsGetValue 403 402400-40240f GetModuleHandleA 402->403 404 4023df-4023e7 402->404 406 402411-402418 call 4022e9 403->406 407 402434-402439 403->407 404->403 405 4023e9-4023f6 TlsGetValue 404->405 405->403 411 4023f8-4023fe 405->411 406->407 412 40241a-402420 GetProcAddress 406->412 413 402426-402428 411->413 412->413 413->407 414 40242a-402430 413->414 414->407
                                                      APIs
                                                      • TlsGetValue.KERNEL32(00000000,00402461,?,?,?,?,?,00000088), ref: 004023D9
                                                      • TlsGetValue.KERNEL32(00000004,?,?,?,?,?,00000088), ref: 004023F0
                                                      • GetModuleHandleA.KERNEL32(KERNEL32.DLL,?,?,?,?,?,00000088), ref: 00402405
                                                      • GetProcAddress.KERNEL32(00000000,DecodePointer), ref: 00402420
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Value$AddressHandleModuleProc
                                                      • String ID: DecodePointer$KERNEL32.DLL
                                                      • API String ID: 1929421221-629428536
                                                      • Opcode ID: cafb124f787224b482a95b2ac3b4a91c0234f5a1e4f0cc787b7d164dfc720926
                                                      • Instruction ID: c78dc7a9585208a99074aea40c6bc01db638a5f6f1ffce41ee587fa2e8510638
                                                      • Opcode Fuzzy Hash: cafb124f787224b482a95b2ac3b4a91c0234f5a1e4f0cc787b7d164dfc720926
                                                      • Instruction Fuzzy Hash: 1EF09030905213DBC6255BB5EF88A6B3AA4AF013547148376F808F66F5CB78CC41CA9D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • _memset.LIBCMT ref: 00401158
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040118A
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00401195
                                                      • RegisterClassExW.USER32(00000030), ref: 004011AF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: BrushClassColorCursorLoadRegister_memset
                                                      • String ID: msi2exestub_wnd_class
                                                      • API String ID: 3090054752-2601022818
                                                      • Opcode ID: 15c0c6d461e849e98c826dcb55625be3356f68835af37811b6949290c6a09e8e
                                                      • Instruction ID: fa2573e763f026470a0bce276621579e665c34276362e989892a3b4fe65ab429
                                                      • Opcode Fuzzy Hash: 15c0c6d461e849e98c826dcb55625be3356f68835af37811b6949290c6a09e8e
                                                      • Instruction Fuzzy Hash: 2D01A8B1C11228EBDB009FE5D949ADEBFB8EB08704F10416AE515B6285D7B45604CFD8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: __flsbuf$__flswbuf_wctomb_s
                                                      • String ID:
                                                      • API String ID: 3257920507-0
                                                      • Opcode ID: 35b271bf05e1c390c82434762bfe095323d7c1b244e28f6ba5340548b9bdc927
                                                      • Instruction ID: 68cba1bc88cab562efc980cc02a5ce7e65c85dcf13bc00e4bc4d9c561325894c
                                                      • Opcode Fuzzy Hash: 35b271bf05e1c390c82434762bfe095323d7c1b244e28f6ba5340548b9bdc927
                                                      • Instruction Fuzzy Hash: 1B511A71014921DEC725DB389C418AB7BA9DE02338335067FF0A6AB2D2EA3ED5118E5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __lock.LIBCMT ref: 00406139
                                                        • Part of subcall function 00402BF4: __mtinitlocknum.LIBCMT ref: 00402C08
                                                        • Part of subcall function 00402BF4: __amsg_exit.LIBCMT ref: 00402C14
                                                        • Part of subcall function 00402BF4: EnterCriticalSection.KERNEL32(0040258B,0040258B,?,00408D0B,00000004,0040E328,0000000C,004061FC,00000000,00000000,00000000,00000000,00000000,0040259A,00000001,00000214), ref: 00402C1C
                                                      • ___sbh_find_block.LIBCMT ref: 00406144
                                                      • ___sbh_free_block.LIBCMT ref: 00406153
                                                      • HeapFree.KERNEL32(00000000,00000001,0040E260,0000000C,00402BD5,00000000,0040E0A0,0000000C,00402C0D,00000001,0040258B,?,00408D0B,00000004,0040E328,0000000C), ref: 00406183
                                                      • GetLastError.KERNEL32(?,00408D0B,00000004,0040E328,0000000C,004061FC,00000000,00000000,00000000,00000000,00000000,0040259A,00000001,00000214), ref: 00406194
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 2714421763-0
                                                      • Opcode ID: ec309f13ac6ed2460b9bc622685fdac9bcbdfdb6d37f39f168fb5652b14ded11
                                                      • Instruction ID: 2a96ef66e3485db1b055fe51310aebddc08bfb44f5d3ca0f1bd79134f6b4c0cc
                                                      • Opcode Fuzzy Hash: ec309f13ac6ed2460b9bc622685fdac9bcbdfdb6d37f39f168fb5652b14ded11
                                                      • Instruction Fuzzy Hash: D5018F31945202EAEF206FB29D0AB4E3774AF00769F11423FF505BA2C2CA7C95519A5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: __close__flush__freebuf
                                                      • String ID: @@
                                                      • API String ID: 3722736141-3711295321
                                                      • Opcode ID: 23ae5e9cf7fc43eeab9271814124b7a6b129034591e83fac89ec1055d0c476e0
                                                      • Instruction ID: e72f35c0867d74827d445a4e8d748ddb64675d5490647373c0be49720c881198
                                                      • Opcode Fuzzy Hash: 23ae5e9cf7fc43eeab9271814124b7a6b129034591e83fac89ec1055d0c476e0
                                                      • Instruction Fuzzy Hash: ADF0C871A04B006ED6207ABB5C8581BB6EC6ED63387144B3FF565F21D3E67C9C018A6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32 ref: 004015E3
                                                      • _wcsrchr.LIBCMT ref: 0040160C
                                                      • MessageBoxW.USER32(00000000,?,00000002,00000010), ref: 00401630
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastMessage_wcsrchr
                                                      • String ID: %s (code: 0x%08X)
                                                      • API String ID: 590718613-1129430558
                                                      • Opcode ID: 42228ad29eb8e18bd028f04732ce89d2b1ca83b379ec9be87060514659ffc1e2
                                                      • Instruction ID: 113e6492fe2261a857a4a11bc05034624d92531af5e25fa10a6206bb5dd77c16
                                                      • Opcode Fuzzy Hash: 42228ad29eb8e18bd028f04732ce89d2b1ca83b379ec9be87060514659ffc1e2
                                                      • Instruction Fuzzy Hash: F4F01CB5A00208AFE721DB54DC45BEA3768FB08704F044832F941FB2A1C2B9A9818A9C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0040635B
                                                      • __isleadbyte_l.LIBCMT ref: 0040638F
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000108,?,?,00000000,?,?,?), ref: 004063C0
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000108,00000001,?,00000000,?,?,?), ref: 0040642E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 3d6466147ee63cab85e1936a5fef035c853123870c94230fcfdac984927a4de7
                                                      • Instruction ID: 7491b92a4c32cea02cca1e18898105e8535631cd0ddae29ab752054e9d357e5d
                                                      • Opcode Fuzzy Hash: 3d6466147ee63cab85e1936a5fef035c853123870c94230fcfdac984927a4de7
                                                      • Instruction Fuzzy Hash: 7131E230500245EFDB20DFA4C880AAE7BB5FF01310F1A817AE866AB2D1D734DD60DB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004025E8: __amsg_exit.LIBCMT ref: 004025F6
                                                      • __amsg_exit.LIBCMT ref: 004057B4
                                                      • __lock.LIBCMT ref: 004057C4
                                                      • InterlockedDecrement.KERNEL32(?), ref: 004057E1
                                                      • InterlockedIncrement.KERNEL32(02482BF8), ref: 0040580C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__lock
                                                      • String ID:
                                                      • API String ID: 4129207761-0
                                                      • Opcode ID: 92750075eb3ef2bf1ee2714700a2e6cd28c9732acaf63113e8133cc47fa9dec7
                                                      • Instruction ID: 4349d519936afe56ffc5c276bbf6f90d14a5f85baeece521cae09b1fc0886954
                                                      • Opcode Fuzzy Hash: 92750075eb3ef2bf1ee2714700a2e6cd28c9732acaf63113e8133cc47fa9dec7
                                                      • Instruction Fuzzy Hash: 67017936901A12DBD620BBA6994A74B77B0BB04714F04413BE805B76D1CB3CA841EF9D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000000,004022AA,00401B88,00000000,00000000,?,004016E4,?,?,?,00000000,00000208,0040157B,?,00000208), ref: 00402573
                                                        • Part of subcall function 00402443: TlsGetValue.KERNEL32(00000000,00402586,?,?,?,?,?,00000088), ref: 0040244A
                                                        • Part of subcall function 00402443: TlsSetValue.KERNEL32(00000000,?,?,?,?,00000088), ref: 0040246B
                                                      • __calloc_crt.LIBCMT ref: 00402595
                                                        • Part of subcall function 004061E9: __calloc_impl.LIBCMT ref: 004061F7
                                                        • Part of subcall function 004061E9: Sleep.KERNEL32(00000000,0040259A,00000001,00000214,?,?,?,?,?,00000088), ref: 0040620E
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000000,00402461,?,?,?,?,?,00000088), ref: 004023D9
                                                        • Part of subcall function 004023CC: TlsGetValue.KERNEL32(00000004,?,?,?,?,?,00000088), ref: 004023F0
                                                        • Part of subcall function 004024B2: GetModuleHandleA.KERNEL32(KERNEL32.DLL,0040E058,0000000C,004025C3,00000000,00000000,?,?,?,?,?,00000088), ref: 004024C3
                                                        • Part of subcall function 004024B2: GetProcAddress.KERNEL32(?,EncodePointer), ref: 004024F7
                                                        • Part of subcall function 004024B2: GetProcAddress.KERNEL32(?,DecodePointer), ref: 00402507
                                                        • Part of subcall function 004024B2: InterlockedIncrement.KERNEL32(0040F6F8), ref: 00402529
                                                        • Part of subcall function 004024B2: __lock.LIBCMT ref: 00402531
                                                        • Part of subcall function 004024B2: ___addlocaleref.LIBCMT ref: 00402550
                                                      • GetCurrentThreadId.KERNEL32 ref: 004025C5
                                                      • SetLastError.KERNEL32(00000000,?,?,?,?,?,00000088), ref: 004025DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1981790193.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1981768078.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981811999.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981830123.000000000040F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1981851260.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_EhSODySB7R.jbxd
                                                      Similarity
                                                      • API ID: Value$AddressErrorLastProc$CurrentHandleIncrementInterlockedModuleSleepThread___addlocaleref__calloc_crt__calloc_impl__lock
                                                      • String ID:
                                                      • API String ID: 1081334783-0
                                                      • Opcode ID: 4b477ac62d0d8da954439966bd98dbafc4556b3d36004d3aa4a932d628616111
                                                      • Instruction ID: c34bda9c1bb9a39f5e0c4412eb6bf616bca4bee9ab0c0707fc9fbb88643eb821
                                                      • Opcode Fuzzy Hash: 4b477ac62d0d8da954439966bd98dbafc4556b3d36004d3aa4a932d628616111
                                                      • Instruction Fuzzy Hash: CDF02832104622EAC2313BB57E0E64B3E518F00771710023FF504BA5E2CEB8C981CA9D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:1.3%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:11.8%
                                                      Total number of Nodes:338
                                                      Total number of Limit Nodes:8
                                                      execution_graph 35347 6c926d 35348 6c9279 ___scrt_is_nonwritable_in_current_image 35347->35348 35373 6c8dcd 35348->35373 35350 6c9280 35351 6c93d3 35350->35351 35362 6c92aa ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock std::locale::_Setgloballocale 35350->35362 35420 6c97cd 4 API calls 2 library calls 35351->35420 35353 6c93da 35421 6d995c 23 API calls std::locale::_Setgloballocale 35353->35421 35355 6c93e0 35422 6d9920 23 API calls std::locale::_Setgloballocale 35355->35422 35357 6c93e8 35358 6c92c9 35359 6c934a 35384 6c98e8 35359->35384 35361 6c9350 35388 6b19c0 GetCommandLineW 35361->35388 35362->35358 35362->35359 35419 6d9936 41 API calls 4 library calls 35362->35419 35374 6c8dd6 35373->35374 35423 6c942c IsProcessorFeaturePresent 35374->35423 35376 6c8de2 35424 6cc269 7 API calls ___vcrt_initialize_locks 35376->35424 35378 6c8de7 35379 6c8deb 35378->35379 35425 6da3c0 35378->35425 35379->35350 35382 6c8e02 35382->35350 35484 6ca2a0 35384->35484 35386 6c98fb GetStartupInfoW 35387 6c990e 35386->35387 35387->35361 35389 6b1a00 35388->35389 35485 6a4e50 LocalAlloc 35389->35485 35391 6b1a11 35486 6a8b20 35391->35486 35393 6b1a69 35394 6b1a7d 35393->35394 35395 6b1a6d 35393->35395 35494 6b0b10 LocalAlloc LocalAlloc 35394->35494 35542 6a8710 79 API calls __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 35395->35542 35398 6b1a76 35400 6b1bc6 ExitProcess 35398->35400 35399 6b1a89 35495 6b0e30 35399->35495 35406 6b1acb 35513 6aada0 35406->35513 35408 6b1b22 35409 6a29d0 42 API calls 35408->35409 35411 6b1b54 35408->35411 35409->35411 35414 6b1ba8 35411->35414 35519 6a8da0 35411->35519 35412 6b1b8f 35413 6b1b9b 35412->35413 35412->35414 35543 6b13a0 CreateFileW SetFilePointer WriteFile CloseHandle 35413->35543 35544 6a3fd0 42 API calls 35414->35544 35417 6b1bb7 35545 6b1bd0 LocalFree LocalFree 35417->35545 35419->35359 35420->35353 35421->35355 35422->35357 35423->35376 35424->35378 35429 6e295b 35425->35429 35428 6cc288 7 API calls 2 library calls 35428->35379 35430 6e296b 35429->35430 35431 6c8df4 35429->35431 35430->35431 35433 6dd706 35430->35433 35431->35382 35431->35428 35434 6dd712 ___scrt_is_nonwritable_in_current_image 35433->35434 35445 6d86da EnterCriticalSection 35434->35445 35436 6dd719 35446 6e2ec9 35436->35446 35439 6dd737 35461 6dd75d LeaveCriticalSection std::_Lockit::~_Lockit 35439->35461 35442 6dd748 35442->35430 35443 6dd732 35460 6dd656 GetStdHandle GetFileType 35443->35460 35445->35436 35447 6e2ed5 ___scrt_is_nonwritable_in_current_image 35446->35447 35448 6e2ede 35447->35448 35449 6e2eff 35447->35449 35470 6cdac0 14 API calls __Wcrtomb 35448->35470 35462 6d86da EnterCriticalSection 35449->35462 35452 6e2ee3 35471 6cd9c2 41 API calls ___std_exception_copy 35452->35471 35454 6dd728 35454->35439 35459 6dd5a0 44 API calls 35454->35459 35455 6e2f37 35472 6e2f5e LeaveCriticalSection std::_Lockit::~_Lockit 35455->35472 35456 6e2f0b 35456->35455 35463 6e2e19 35456->35463 35459->35443 35460->35439 35461->35442 35462->35456 35473 6ddb3b 35463->35473 35465 6e2e2b 35469 6e2e38 35465->35469 35480 6de1ef 6 API calls std::_Lockit::_Lockit 35465->35480 35468 6e2e8d 35468->35456 35481 6dbe38 14 API calls 2 library calls 35469->35481 35470->35452 35471->35454 35472->35454 35478 6ddb48 __cftoe 35473->35478 35474 6ddb88 35483 6cdac0 14 API calls __Wcrtomb 35474->35483 35475 6ddb73 RtlAllocateHeap 35477 6ddb86 35475->35477 35475->35478 35477->35465 35478->35474 35478->35475 35482 6e2a03 EnterCriticalSection LeaveCriticalSection __cftoe 35478->35482 35480->35465 35481->35468 35482->35478 35483->35477 35484->35386 35485->35391 35487 6a8b72 35486->35487 35488 6a8bb4 35487->35488 35491 6a8ba2 35487->35491 35489 6c8b14 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35488->35489 35490 6a8bc2 35489->35490 35490->35393 35546 6c8b14 35491->35546 35493 6a8bb0 35493->35393 35494->35399 35496 6b0e44 35495->35496 35501 6b11e2 35495->35501 35497 6b1240 35496->35497 35496->35501 35554 6a8360 14 API calls 35497->35554 35499 6b1250 RegOpenKeyExW 35500 6b126e RegQueryValueExW 35499->35500 35499->35501 35500->35501 35502 6a29d0 35501->35502 35503 6a29f1 35502->35503 35503->35503 35555 6a3ac0 35503->35555 35505 6a2a09 35506 6a9090 35505->35506 35563 6a2a10 35506->35563 35508 6a90d6 35581 6a9850 35508->35581 35514 6aadaa 35513->35514 35515 6aadad 35513->35515 35514->35408 35516 6aadba ___vcrt_InitializeCriticalSectionEx 35515->35516 35629 6d232e 42 API calls 2 library calls 35515->35629 35516->35408 35518 6aadcd 35518->35408 35520 6a8de9 35519->35520 35521 6a8dd4 35519->35521 35630 6a5f10 GetCurrentProcess OpenProcessToken 35520->35630 35521->35412 35523 6a8dfc 35524 6a8ebe 35523->35524 35526 6a8e16 35523->35526 35635 6a1fc0 67 API calls 35524->35635 35687 6a1fc0 67 API calls 35526->35687 35527 6a8ee5 35636 6a1fc0 67 API calls 35527->35636 35530 6a8e2a 35688 6a1fc0 67 API calls 35530->35688 35531 6a8efa 35637 6a1fc0 67 API calls 35531->35637 35534 6a8e47 35689 6a1fc0 67 API calls 35534->35689 35535 6a8f0b 35638 6a75d0 35535->35638 35538 6a8e55 35690 6a6e50 160 API calls 3 library calls 35538->35690 35540 6a8e6d 35541 6a8f24 35540->35541 35541->35412 35542->35398 35543->35414 35544->35417 35545->35400 35547 6c8b1c 35546->35547 35548 6c8b1d IsProcessorFeaturePresent 35546->35548 35547->35493 35550 6c8fe8 35548->35550 35553 6c8fa8 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 35550->35553 35552 6c90cb 35552->35493 35553->35552 35554->35499 35556 6a3b95 35555->35556 35559 6a3ad4 __Strxfrm 35555->35559 35562 6a3630 42 API calls collate 35556->35562 35559->35505 35568 6a2a36 35563->35568 35564 6a2af7 35619 6a3630 42 API calls collate 35564->35619 35565 6a2a52 35565->35508 35567 6a2a72 35571 6a2af2 35567->35571 35574 6a2aa4 LocalAlloc 35567->35574 35568->35564 35568->35565 35568->35567 35568->35571 35573 6a2abc 35568->35573 35569 6a2afc 35620 6cd9d2 41 API calls 2 library calls 35569->35620 35618 6a3aa0 RaiseException CallUnexpected collate 35571->35618 35577 6a2ac0 LocalAlloc 35573->35577 35580 6a2acd __Strxfrm 35573->35580 35574->35569 35576 6a2ab1 35574->35576 35576->35580 35577->35580 35580->35508 35582 6a98aa ___vcrt_InitializeCriticalSectionEx 35581->35582 35589 6a9a12 ___vcrt_InitializeCriticalSectionEx 35581->35589 35586 6a98d5 35582->35586 35582->35589 35583 6a99f9 35584 6c8b14 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35583->35584 35585 6a90eb 35584->35585 35608 6a9b70 35585->35608 35587 6a98f2 35586->35587 35588 6a9b51 35586->35588 35590 6a3ac0 42 API calls 35587->35590 35624 6a45e0 42 API calls 35588->35624 35589->35583 35591 6a9b5b 35589->35591 35592 6a9a6b 35589->35592 35594 6a9916 35590->35594 35626 6a45e0 42 API calls 35591->35626 35595 6a3ac0 42 API calls 35592->35595 35621 6a9e70 45 API calls __Strxfrm 35594->35621 35599 6a9a8f 35595->35599 35596 6a9b56 35625 6cd9d2 41 API calls 2 library calls 35596->35625 35623 6a3c40 42 API calls collate 35599->35623 35602 6a9931 35622 6a3c40 42 API calls collate 35602->35622 35605 6a997a 35605->35583 35605->35596 35606 6a99ee 35605->35606 35606->35583 35607 6a99f2 LocalFree 35606->35607 35607->35583 35617 6a9bec __Strxfrm 35608->35617 35609 6a9103 35609->35406 35610 6a9e16 35610->35609 35612 6a9e30 LocalFree 35610->35612 35611 6a9e60 35627 6cd9d2 41 API calls 2 library calls 35611->35627 35612->35609 35614 6a9e65 35628 6a45e0 42 API calls 35614->35628 35617->35609 35617->35610 35617->35611 35617->35614 35621->35602 35622->35605 35623->35583 35629->35518 35631 6a5f31 35630->35631 35632 6a5f37 GetTokenInformation 35630->35632 35631->35523 35633 6a5f6e CloseHandle 35632->35633 35634 6a5f66 35632->35634 35633->35523 35634->35633 35635->35527 35636->35531 35637->35535 35639 6a7641 35638->35639 35691 6a2100 35639->35691 35641 6a7659 35642 6a2100 42 API calls 35641->35642 35643 6a7670 35642->35643 35707 6a7d30 35643->35707 35645 6a7688 35646 6a79fa 35645->35646 35648 6a76b7 35645->35648 35731 6a2750 41 API calls 35645->35731 35736 6a1910 LocalFree RaiseException CallUnexpected 35646->35736 35724 6d2149 35648->35724 35649 6a7a04 GetWindowThreadProcessId 35652 6a7a2e GetWindowLongW 35649->35652 35653 6a7a61 35649->35653 35652->35541 35653->35541 35655 6a76d6 35656 6a2100 42 API calls 35655->35656 35670 6a76eb 35656->35670 35657 6a77bf 35658 6a781d 35657->35658 35659 6a7814 GetForegroundWindow 35657->35659 35660 6a782d ShellExecuteExW 35658->35660 35659->35658 35661 6a783e 35660->35661 35662 6a7847 35660->35662 35734 6a7bb0 6 API calls 35661->35734 35664 6a7882 35662->35664 35666 6a785d ShellExecuteExW 35662->35666 35673 6a7947 35664->35673 35674 6a78a8 GetModuleHandleW GetProcAddress GetProcessId AllowSetForegroundWindow 35664->35674 35665 6a7786 GetWindowsDirectoryW 35732 6a1980 70 API calls 35665->35732 35666->35664 35669 6a7879 35666->35669 35668 6a77a7 35733 6a1980 70 API calls 35668->35733 35735 6a7bb0 6 API calls 35669->35735 35670->35657 35670->35665 35675 6a7971 35673->35675 35678 6a795b WaitForSingleObject GetExitCodeProcess 35673->35678 35674->35673 35676 6a78d0 35674->35676 35727 6a7cb0 35675->35727 35676->35673 35677 6a78d9 GetModuleHandleW GetProcAddress 35676->35677 35677->35673 35680 6a78f4 GetProcessId 35677->35680 35678->35675 35681 6a7900 35680->35681 35681->35673 35683 6a7905 Sleep EnumWindows 35681->35683 35683->35681 35684 6a7931 SetWindowPos 35683->35684 35684->35673 35685 6c8b14 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35686 6a79f2 35685->35686 35686->35541 35687->35530 35688->35534 35689->35538 35690->35540 35692 6a210b 35691->35692 35693 6a211a 35692->35693 35694 6a21ba 35692->35694 35700 6a2137 _Getvals 35692->35700 35693->35641 35696 6a21bf HeapAlloc 35694->35696 35695 6a215e 35737 6cdac0 14 API calls __Wcrtomb 35695->35737 35696->35641 35698 6a2163 35738 6cd9c2 41 API calls ___std_exception_copy 35698->35738 35699 6a217d __Strxfrm 35699->35641 35700->35695 35700->35699 35703 6a219f 35700->35703 35702 6a216e 35702->35641 35703->35699 35739 6cdac0 14 API calls __Wcrtomb 35703->35739 35705 6a21a8 35740 6cd9c2 41 API calls ___std_exception_copy 35705->35740 35708 6a7d9b 35707->35708 35709 6a7d6b 35707->35709 35718 6a7dac 35708->35718 35741 6a2510 56 API calls 35708->35741 35710 6a2100 42 API calls 35709->35710 35711 6a7d70 35710->35711 35711->35645 35713 6a7e5a 35745 6a1910 LocalFree RaiseException CallUnexpected 35713->35745 35714 6a7e50 35744 6a1910 LocalFree RaiseException CallUnexpected 35714->35744 35717 6a7e69 35718->35713 35718->35714 35719 6a7dfc 35718->35719 35720 6a7e21 35719->35720 35742 6cdac0 14 API calls __Wcrtomb 35719->35742 35720->35645 35722 6a7e16 35743 6cd9c2 41 API calls ___std_exception_copy 35722->35743 35746 6d2160 35724->35746 35728 6a797d 35727->35728 35729 6a7ce1 35727->35729 35728->35685 35729->35728 35730 6a7cf1 FindCloseChangeNotification 35729->35730 35730->35728 35731->35648 35732->35668 35733->35657 35734->35662 35735->35664 35736->35649 35737->35698 35738->35702 35739->35705 35740->35699 35741->35718 35742->35722 35743->35720 35744->35713 35745->35717 35751 6d1d14 35746->35751 35752 6d1d32 35751->35752 35758 6d1d2b 35751->35758 35752->35758 35796 6dc24c 41 API calls 3 library calls 35752->35796 35754 6d1d53 35797 6dc585 41 API calls __Getctype 35754->35797 35756 6d1d69 35798 6dc5e3 41 API calls __cftoe 35756->35798 35759 6d1fd0 35758->35759 35760 6d1fea 35759->35760 35761 6d2000 ___crtLCMapStringW 35759->35761 35799 6cdac0 14 API calls __Wcrtomb 35760->35799 35761->35760 35764 6d2017 35761->35764 35763 6d1fef 35800 6cd9c2 41 API calls ___std_exception_copy 35763->35800 35767 6d1ff9 35764->35767 35801 6dda32 6 API calls 2 library calls 35764->35801 35771 6c8b14 __ehhandler$??2@YAPAXIABUnothrow_t@std@@@Z 5 API calls 35767->35771 35768 6d2065 35769 6d206f 35768->35769 35770 6d2086 35768->35770 35802 6cdac0 14 API calls __Wcrtomb 35769->35802 35773 6d209c 35770->35773 35774 6d208b 35770->35774 35775 6a76c5 35771->35775 35776 6d211d 35773->35776 35779 6d20c3 35773->35779 35786 6d20b0 __alloca_probe_16 35773->35786 35804 6cdac0 14 API calls __Wcrtomb 35774->35804 35775->35646 35775->35655 35809 6cdac0 14 API calls __Wcrtomb 35776->35809 35777 6d2074 35803 6cdac0 14 API calls __Wcrtomb 35777->35803 35805 6dc537 15 API calls 2 library calls 35779->35805 35782 6d2122 35810 6cdac0 14 API calls __Wcrtomb 35782->35810 35785 6d20c9 35785->35776 35785->35786 35786->35776 35788 6d20dd 35786->35788 35806 6dda32 6 API calls 2 library calls 35788->35806 35790 6d20f9 35791 6d2111 35790->35791 35792 6d2100 35790->35792 35808 6cdac0 14 API calls __Wcrtomb 35791->35808 35807 6d2197 41 API calls 2 library calls 35792->35807 35795 6d210a 35811 6c84fb 14 API calls ___std_exception_destroy 35795->35811 35796->35754 35797->35756 35798->35758 35799->35763 35800->35767 35801->35768 35802->35777 35803->35767 35804->35763 35805->35785 35806->35790 35807->35795 35808->35795 35809->35782 35810->35795 35811->35767 35812 6a7ef0 35815 6a7f50 GetTokenInformation 35812->35815 35816 6a7fce GetLastError 35815->35816 35817 6a7f28 35815->35817 35816->35817 35818 6a7fd9 35816->35818 35819 6a801e GetTokenInformation 35818->35819 35820 6a7ff9 35818->35820 35822 6a7fe9 _Getvals 35818->35822 35819->35817 35824 6a81e0 45 API calls 3 library calls 35820->35824 35822->35819 35823 6a8002 35823->35819 35824->35823

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 6a75d0-6a7698 call 6a84b0 call 6a2100 * 2 call 6a7d30 9 6a79fa-6a7a2c call 6a1910 GetWindowThreadProcessId 0->9 10 6a769e-6a76ad 0->10 17 6a7a2e-6a7a5e GetWindowLongW 9->17 18 6a7a61-6a7a68 9->18 12 6a76ba-6a76d0 call 6d2149 10->12 13 6a76af-6a76b7 call 6a2750 10->13 12->9 21 6a76d6-6a7706 call 6a2100 12->21 13->12 24 6a7708-6a770b 21->24 25 6a7710-6a7714 21->25 24->25 26 6a771a-6a771f 25->26 27 6a77c5-6a7812 25->27 28 6a7721-6a7727 26->28 29 6a781d-6a781f 27->29 30 6a7814-6a781a GetForegroundWindow 27->30 31 6a7729-6a772c 28->31 32 6a7747-6a7749 28->32 33 6a782d-6a783c ShellExecuteExW 29->33 34 6a7821-6a782b call 6a7a70 29->34 30->29 37 6a772e-6a7736 31->37 38 6a7743-6a7745 31->38 39 6a774c-6a774e 32->39 35 6a783e-6a7849 call 6a7bb0 33->35 36 6a784c-6a784e 33->36 34->33 35->36 43 6a7882-6a78a2 call 6a7e70 36->43 44 6a7850-6a7856 36->44 37->32 45 6a7738-6a7741 37->45 38->39 46 6a7750-6a7755 39->46 47 6a7786-6a77c2 GetWindowsDirectoryW call 6a1980 * 2 39->47 64 6a794a-6a794f 43->64 65 6a78a8-6a78ce GetModuleHandleW GetProcAddress GetProcessId AllowSetForegroundWindow 43->65 49 6a7858-6a785b 44->49 50 6a785d-6a7877 ShellExecuteExW 44->50 45->28 45->38 53 6a7757-6a775d 46->53 47->27 49->43 49->50 50->43 57 6a7879-6a787d call 6a7bb0 50->57 54 6a775f-6a7762 53->54 55 6a777d-6a777f 53->55 59 6a7779-6a777b 54->59 60 6a7764-6a776c 54->60 61 6a7782-6a7784 55->61 57->43 59->61 60->55 66 6a776e-6a7777 60->66 61->27 61->47 67 6a7971-6a7978 call 6a7cb0 64->67 68 6a7951-6a7959 64->68 65->64 70 6a78d0-6a78d7 65->70 66->53 66->59 76 6a797d-6a7991 67->76 68->67 72 6a795b-6a796b WaitForSingleObject GetExitCodeProcess 68->72 70->64 71 6a78d9-6a78f2 GetModuleHandleW GetProcAddress 70->71 74 6a7947 71->74 75 6a78f4-6a78fc GetProcessId 71->75 72->67 74->64 77 6a7900-6a7903 75->77 78 6a799b-6a79ac 76->78 79 6a7993-6a7996 76->79 77->74 80 6a7905-6a792f Sleep EnumWindows 77->80 81 6a79ae-6a79b1 78->81 82 6a79b6-6a79cb 78->82 79->78 80->77 85 6a7931-6a7941 SetWindowPos 80->85 81->82 83 6a79cd-6a79d0 82->83 84 6a79d5-6a79f9 call 6c8b14 82->84 83->84 85->74
                                                      APIs
                                                      • GetWindowsDirectoryW.KERNEL32(00000010,00000104,?,?), ref: 006A778F
                                                      • GetForegroundWindow.USER32(?,?), ref: 006A7814
                                                      • ShellExecuteExW.SHELL32(?), ref: 006A7831
                                                      • ShellExecuteExW.SHELL32(?), ref: 006A786F
                                                      • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?), ref: 006A78B2
                                                      • GetProcAddress.KERNEL32(00000000), ref: 006A78B9
                                                      • GetProcessId.KERNELBASE(?,?,?,?), ref: 006A78C0
                                                      • AllowSetForegroundWindow.USER32(00000000), ref: 006A78C3
                                                      • GetModuleHandleW.KERNEL32(Kernel32.dll,GetProcessId,?,?,?), ref: 006A78E3
                                                      • GetProcAddress.KERNEL32(00000000), ref: 006A78EA
                                                      • GetProcessId.KERNELBASE(?,?,?,?), ref: 006A78F5
                                                      • Sleep.KERNELBASE(00000064,?,?,?), ref: 006A7907
                                                      • EnumWindows.USER32(006A7A10,?), ref: 006A7923
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00004003,?,?,?), ref: 006A7941
                                                      • WaitForSingleObject.KERNEL32(?,000000FF,?,?,?), ref: 006A795E
                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 006A796B
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 006A7A1C
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 006A7A34
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Window$Process$AddressExecuteForegroundHandleModuleProcShellWindows$AllowCodeDirectoryEnumExitLongObjectSingleSleepThreadWait
                                                      • String ID: %s\System32\cmd.exe$.bat$.cmd$/C ""%s" %s"$GetProcessId$Kernel32.dll$open$runas
                                                      • API String ID: 1995445601-986041216
                                                      • Opcode ID: 5ca0279dcb3e109874a9126b4c545fe3bd9a19563a2d7c75b27eef4c39728a76
                                                      • Instruction ID: b0e12c4dcf5f4df0ed35a0eda0281d4b047de856ad94bc603ba80d799c630a4a
                                                      • Opcode Fuzzy Hash: 5ca0279dcb3e109874a9126b4c545fe3bd9a19563a2d7c75b27eef4c39728a76
                                                      • Instruction Fuzzy Hash: 5BE18C71A042499FDB10EFA8CC88AEEB7B6EF16310F148169E515EB391DB319E41CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000008,?,210DFF48), ref: 006A5F20
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 006A5F27
                                                      • GetTokenInformation.KERNELBASE(?,00000014(TokenIntegrityLevel),?,00000004,?), ref: 006A5F5C
                                                      • CloseHandle.KERNEL32(?), ref: 006A5F72
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ProcessToken$CloseCurrentHandleInformationOpen
                                                      • String ID:
                                                      • API String ID: 215268677-0
                                                      • Opcode ID: 7efb6a825da607aee972333e7b87e4794ea711dcff96ce650ac4209033de4171
                                                      • Instruction ID: 0f7c6dbd6049ebf0c4e2a27666d8d1286afb22a5b693edf159009779c22d79b2
                                                      • Opcode Fuzzy Hash: 7efb6a825da607aee972333e7b87e4794ea711dcff96ce650ac4209033de4171
                                                      • Instruction Fuzzy Hash: D5F06274144341AFE710DF10EC45B9AB7E9BB84700F408829F980C62A1D379C61CDE63
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCommandLineW.KERNEL32(210DFF48,?,0000FFFF), ref: 006B19ED
                                                        • Part of subcall function 006A4E50: LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,00000000,00000000,?,?), ref: 006A4E6D
                                                      • ExitProcess.KERNEL32 ref: 006B1BC7
                                                        • Part of subcall function 006A8710: CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,00000000), ref: 006A878D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: AllocCommandCreateExitFileLineLocalProcess
                                                      • String ID: Full command line:
                                                      • API String ID: 1878577176-831861440
                                                      • Opcode ID: c9abccdb3a6eeaf9d5218050636de78062ad1e525a495bf80a67a9fc520477ea
                                                      • Instruction ID: d3bc22ad949d282b1fe4f007f7f1a7554fa1af19f4ce7f32d3b6fbc327c1a17b
                                                      • Opcode Fuzzy Hash: c9abccdb3a6eeaf9d5218050636de78062ad1e525a495bf80a67a9fc520477ea
                                                      • Instruction Fuzzy Hash: DB517B30D101689ECB95FB24CC69BDEB7B6AF52340F4441D8A009672A2EF745F89CF96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 151 6a7f50-6a7fcc GetTokenInformation 152 6a7fce-6a7fd7 GetLastError 151->152 153 6a8030-6a8043 151->153 152->153 154 6a7fd9-6a7fe7 152->154 155 6a7fe9-6a7fec 154->155 156 6a7fee 154->156 157 6a801b 155->157 158 6a801e-6a802a GetTokenInformation 156->158 159 6a7ff0-6a7ff7 156->159 157->158 158->153 160 6a7ff9-6a8005 call 6a81e0 159->160 161 6a8007-6a8018 call 6ca2a0 159->161 160->158 161->157
                                                      APIs
                                                      • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,006A7F28,210DFF48), ref: 006A7FC4
                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,00000000,00000000,006A7F28,210DFF48), ref: 006A7FCE
                                                      • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),?,00000000,00000000,?,TokenIntegrityLevel,00000000,00000000,006A7F28,210DFF48), ref: 006A802A
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: InformationToken$ErrorLast
                                                      • String ID:
                                                      • API String ID: 2567405617-0
                                                      • Opcode ID: 5856150cc9fbadca23de07d0fb3ca25b8f0a8444383342290d13fa47a3086fd1
                                                      • Instruction ID: a0cc75475e5be1844fdf57a0160aef1e09dba2e8dfb148259311d08670e3f15f
                                                      • Opcode Fuzzy Hash: 5856150cc9fbadca23de07d0fb3ca25b8f0a8444383342290d13fa47a3086fd1
                                                      • Instruction Fuzzy Hash: 69314C71A002159FDB20DF99DC45BAFFBFAFB45714F10452EE415A7280DBB5AD048BA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 166 6ddb3b-6ddb46 167 6ddb48-6ddb52 166->167 168 6ddb54-6ddb5a 166->168 167->168 169 6ddb88-6ddb93 call 6cdac0 167->169 170 6ddb5c-6ddb5d 168->170 171 6ddb73-6ddb84 RtlAllocateHeap 168->171 177 6ddb95-6ddb97 169->177 170->171 173 6ddb5f-6ddb66 call 6dbcc7 171->173 174 6ddb86 171->174 173->169 179 6ddb68-6ddb71 call 6e2a03 173->179 174->177 179->169 179->171
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,?,?,?,006DC3EA,00000001,00000364,?,00000006,000000FF,?,006CD692,?,?,?), ref: 006DDB7C
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 097c9212b7cd853dfd26305a2df4e46e51528fb065886a38b6c1bb1b23bd9688
                                                      • Instruction ID: e90194a55051f874d313d3caa5272c6db6aaba524ce5c61fe0fbc8f3ec9fae45
                                                      • Opcode Fuzzy Hash: 097c9212b7cd853dfd26305a2df4e46e51528fb065886a38b6c1bb1b23bd9688
                                                      • Instruction Fuzzy Hash: 3AF0E9B1E44665BBDB217B26EC05FAB774F9F50774B168127A8149B380CE20D80182E4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 182 6a7cb0-6a7cdf 183 6a7cff-6a7d10 182->183 184 6a7ce1-6a7cef 182->184 185 6a7cf8 184->185 186 6a7cf1-6a7cf2 FindCloseChangeNotification 184->186 185->183 186->185
                                                      APIs
                                                      • FindCloseChangeNotification.KERNELBASE(?,210DFF48,00000010,00000010,?,?), ref: 006A7CF2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: 946e85d6383a7bce62f6f7b76d4000848d14b962adf8257c48e74064fc0d93b5
                                                      • Instruction ID: c77943fc85115d888103444faa68f2183fbcdc66fa90749ee350cddb4ea512f1
                                                      • Opcode Fuzzy Hash: 946e85d6383a7bce62f6f7b76d4000848d14b962adf8257c48e74064fc0d93b5
                                                      • Instruction Fuzzy Hash: FCF06D71A44688EFCB10DF69DD44B9ABBF8EB06724F10826AE825D7790D73599048A90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006A5F10: GetCurrentProcess.KERNEL32(00000008,?,210DFF48), ref: 006A5F20
                                                        • Part of subcall function 006A5F10: OpenProcessToken.ADVAPI32(00000000), ref: 006A5F27
                                                      • CoInitialize.OLE32(00000000), ref: 006A6EC5
                                                      • CoCreateInstance.OLE32(006EF310,00000000,00000004,006FD320,00000000,?), ref: 006A6EF5
                                                      • CoUninitialize.OLE32 ref: 006A7465
                                                      • _com_issue_error.COMSUPP ref: 006A7493
                                                        • Part of subcall function 006A1910: LocalFree.KERNEL32(?,210DFF48,?,00000000,006EA6C0,000000FF,?,?,00703340,?,006A1E34,80004005), ref: 006A195C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Process$CreateCurrentFreeInitializeInstanceLocalOpenTokenUninitialize_com_issue_error
                                                      • String ID: $
                                                      • API String ID: 2507920217-3993045852
                                                      • Opcode ID: 942690b0095e2b9be08e0acf17a4bcfb219b698842d54413982ac1019c183293
                                                      • Instruction ID: 5a13041a260e290e32509fc4eeb5c6c8422b01aac8173f9901a8bc1a9339d773
                                                      • Opcode Fuzzy Hash: 942690b0095e2b9be08e0acf17a4bcfb219b698842d54413982ac1019c183293
                                                      • Instruction Fuzzy Hash: 44229D70A08388DFEF11DBA8CD48BAEBBB6AF46304F148199E405EB281D7759E45CF51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _swprintf$FreeLocal
                                                      • String ID: %$+
                                                      • API String ID: 2429749586-2626897407
                                                      • Opcode ID: 222c7a2401b7e6c004d9200b6cd92756b6edda5b4800d306b0f15fc3f8f0a0af
                                                      • Instruction ID: bac7c4d52605a085610678f43695a581fe6ce291451a26cc4f598f342857c458
                                                      • Opcode Fuzzy Hash: 222c7a2401b7e6c004d9200b6cd92756b6edda5b4800d306b0f15fc3f8f0a0af
                                                      • Instruction Fuzzy Hash: 9D02AD71D002199FDB15EFA8D850BEEBBB6FF4A300F144229F812AB281D735AD41CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(?,-00000002,00000000,00000001,?), ref: 006B1264
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,007077C0,00000800), ref: 006B1281
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: OpenQueryValue
                                                      • String ID: /DontWait $/EnforcedRunAsAdmin $/HideWindow$/RunAsAdmin
                                                      • API String ID: 4153817207-1914306501
                                                      • Opcode ID: 2160fcc4a381f7b8458b3902fa47fd58cac78d55fefb2a62dfad43948c50f9ce
                                                      • Instruction ID: b5542ea1d9bcd5fe2696f28a6ae82ff1dc6b59163ccf3df1a647843e5b97961c
                                                      • Opcode Fuzzy Hash: 2160fcc4a381f7b8458b3902fa47fd58cac78d55fefb2a62dfad43948c50f9ce
                                                      • Instruction Fuzzy Hash: E5E102A4A042569ADB34AF18C8602F7B7E3FF96780F998469D8458F351E771DDC2C390
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 006A61C2
                                                      • CloseHandle.KERNEL32(00000000), ref: 006A6205
                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 006A6261
                                                      • OpenProcess.KERNEL32(00000410,00000000,?), ref: 006A627D
                                                      • CloseHandle.KERNEL32(00000000), ref: 006A63C5
                                                      • Process32NextW.KERNEL32(?,0000022C), ref: 006A63E3
                                                      • CloseHandle.KERNEL32(00000000), ref: 006A640E
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle$Process32$CreateFirstNextOpenProcessSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 708755948-0
                                                      • Opcode ID: ea0b3e9b91e931b8db547ecb77eec40a75ded2d7e171ebcdab941c2184e71908
                                                      • Instruction ID: 2e3d09efba5d05679a40b491101285e0f9399baca9da6b5ee6c9d6c0b69cb0c1
                                                      • Opcode Fuzzy Hash: ea0b3e9b91e931b8db547ecb77eec40a75ded2d7e171ebcdab941c2184e71908
                                                      • Instruction Fuzzy Hash: B1A17B70901269DBDB20EF64CC48BEEBBB6EF45314F1482D9E419A7281D7B56E84CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(?,2000000B,006E52CE,00000002,00000000,?,?,?,006E52CE,?,00000000), ref: 006E5049
                                                      • GetLocaleInfoW.KERNEL32(?,20001004,006E52CE,00000002,00000000,?,?,?,006E52CE,?,00000000), ref: 006E5072
                                                      • GetACP.KERNEL32(?,?,006E52CE,?,00000000), ref: 006E5087
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: ea719a92188552b30832444850d06e0b8440ba9d304c879253f2efdc2843efbe
                                                      • Instruction ID: 5fcc9e0392f74cd6ea2eb89217d046807a4c4eefea23cf5d2926fc72c63ad5cc
                                                      • Opcode Fuzzy Hash: ea719a92188552b30832444850d06e0b8440ba9d304c879253f2efdc2843efbe
                                                      • Instruction Fuzzy Hash: 21216222602784ABDB348F26C905AD777A7AB54F68B564524F90BDB311FB32DD41C390
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006DC24C: GetLastError.KERNEL32(?,00000008,006E17CC), ref: 006DC250
                                                        • Part of subcall function 006DC24C: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 006DC2F2
                                                      • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 006E5291
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 006E52DA
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 006E52E9
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 006E5331
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 006E5350
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                      • String ID:
                                                      • API String ID: 415426439-0
                                                      • Opcode ID: 9e69b2ff33fb9b57d35e0571d1ecf3dc2cb5e5a782134e01257811b5fc3a4502
                                                      • Instruction ID: 10dff9b83a0600314c198715484cf5798604cee3dea3cf94d1d6466bf9b078a6
                                                      • Opcode Fuzzy Hash: 9e69b2ff33fb9b57d35e0571d1ecf3dc2cb5e5a782134e01257811b5fc3a4502
                                                      • Instruction Fuzzy Hash: 00518171A01749AFDF50DFA6DC41BFF73BAAF09704F144429A602EB290EB709A008B61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006DC24C: GetLastError.KERNEL32(?,00000008,006E17CC), ref: 006DC250
                                                        • Part of subcall function 006DC24C: SetLastError.KERNEL32(00000000,00000000,00000006,000000FF), ref: 006DC2F2
                                                      • GetACP.KERNEL32(?,?,?,?,?,?,006DAD5B,?,?,?,00000055,?,-00000050,?,?,00000004), ref: 006E48E2
                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,006DAD5B,?,?,?,00000055,?,-00000050,?,?), ref: 006E490D
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 006E4A70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CodeInfoLocalePageValid
                                                      • String ID: utf8
                                                      • API String ID: 607553120-905460609
                                                      • Opcode ID: 6edf56ede1e9140460b7f6fd5a67241e30316b2e49c7b0b8c464449df8986b0b
                                                      • Instruction ID: d37cdf811609e8434037bd0d856e6b8f9be408b9917400194fce1899145104ce
                                                      • Opcode Fuzzy Hash: 6edf56ede1e9140460b7f6fd5a67241e30316b2e49c7b0b8c464449df8986b0b
                                                      • Instruction Fuzzy Hash: B171E471A42386AADB24AB7ACC46BF773AAEF45710F10403EF505DB281FE70E9418758
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _strrchr
                                                      • String ID:
                                                      • API String ID: 3213747228-0
                                                      • Opcode ID: 90cca31b8b8871953aca1477b156b1578240a8b7fa0e55708987db146009c23a
                                                      • Instruction ID: f60f1a6b7529beb9a88662cc39796c5876c8c0d144b9f9dcbd17a813ced78643
                                                      • Opcode Fuzzy Hash: 90cca31b8b8871953aca1477b156b1578240a8b7fa0e55708987db146009c23a
                                                      • Instruction Fuzzy Hash: 5EB13972D0564E9FDB15CF68C891BFEBBA6EF59320F15816BE405AB341D2349D02C7A0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006C97D9
                                                      • IsDebuggerPresent.KERNEL32 ref: 006C98A5
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006C98C5
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 006C98CF
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: 4c380f5c1f5f3bc39978bc69931e53573048230c796520769499d5d14d467457
                                                      • Instruction ID: f1dde28d31efef787b63c8c0ed3aedc1a87ae702adb63c07bafe746d3c207355
                                                      • Opcode Fuzzy Hash: 4c380f5c1f5f3bc39978bc69931e53573048230c796520769499d5d14d467457
                                                      • Instruction Fuzzy Hash: 78310675D0521CDBDB10DFA4D989BCCBBB9AF08304F1040AEE40CAB250EB719A848F55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLocaleInfoEx.KERNEL32(!x-sys-default-locale,20000001,00000000,00000002,?,?,?,006A3220,?), ref: 006B2116
                                                      • FormatMessageA.KERNEL32(00001300,00000000,210DFF48,00000000,00000000,00000000,00000000,?,?,?,006A3220,?), ref: 006B2138
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: FormatInfoLocaleMessage
                                                      • String ID: !x-sys-default-locale
                                                      • API String ID: 4235545615-2729719199
                                                      • Opcode ID: 1e92664fb4151bb05206bbe0bab059ff8a5173eb4a19231a3ea81b76597030b4
                                                      • Instruction ID: 634c7caa5c734906fe1a86e40fdb5b6d96cb1ffb36d5c2195cbd47806f4a2c5b
                                                      • Opcode Fuzzy Hash: 1e92664fb4151bb05206bbe0bab059ff8a5173eb4a19231a3ea81b76597030b4
                                                      • Instruction Fuzzy Hash: 4AE030B6150208FFFB149BA0CC4BDFA7A6DEB04751F004114B901D6140D5B16E408B60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,006DE9E4,00000000,00000000,00000000), ref: 006DE8A3
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: InformationTimeZone
                                                      • String ID:
                                                      • API String ID: 565725191-0
                                                      • Opcode ID: c1774ea2b9eaee820d16f295ee6f85c503294fe944c752ea7bb0b0aaf6be9879
                                                      • Instruction ID: df5963d92cf9e2ed3e0224f5532a358cde029043d69a4a1d569777f4f9182344
                                                      • Opcode Fuzzy Hash: c1774ea2b9eaee820d16f295ee6f85c503294fe944c752ea7bb0b0aaf6be9879
                                                      • Instruction Fuzzy Hash: F0C1F472D00125EADB64BBA4DC02ABE77AAEF14750F54416BF901EF391E7329E01C794
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: d64580efd57d3558214e281ba7851369d6f95ca40f50936d685cd509f6c52d09
                                                      • Instruction ID: 58d28b6b9b4daa1457728ced7a6bcdbf1d78ef052bacb5e806338f35bc5d769a
                                                      • Opcode Fuzzy Hash: d64580efd57d3558214e281ba7851369d6f95ca40f50936d685cd509f6c52d09
                                                      • Instruction Fuzzy Hash: 1531F776901359AFCB20DFBDCC85DFB776EEB85310F144269F8159B240EA30AD409B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 2864318f6dce3f34aa64f3b9f5968b0c36cd4cfae0ffe164939727a64b01d4d1
                                                      • Instruction ID: 46c03048fcad22f6f324859734e74dc6b2e0346297dbf8d20e202c19a356745c
                                                      • Opcode Fuzzy Hash: 2864318f6dce3f34aa64f3b9f5968b0c36cd4cfae0ffe164939727a64b01d4d1
                                                      • Instruction Fuzzy Hash: 36E08C32912368EBCB25DBCDC90498AF3EDFB45B00B1104AAF501D7200C270DE00D7D0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3dda80f92e8400fcc772db5e13d420266169146e784e576c0d4a49e31e5b18b9
                                                      • Instruction ID: 09c8d4e3d447f7f98f6591a04b7a21ba65d85b9844fa82873b20a7c346bd7ef2
                                                      • Opcode Fuzzy Hash: 3dda80f92e8400fcc772db5e13d420266169146e784e576c0d4a49e31e5b18b9
                                                      • Instruction Fuzzy Hash: 92C08C34811B4046CF398A1182713E9339AA393F82F90088DC4120F743C62E9C82F660
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000,00000000,00000002,00000080,00000000,?,?,?,?,?,?,?,?,00000000), ref: 006A878D
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 006A87E0
                                                      • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A87EF
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 006A880B
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A88EB
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A88F7
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A8933
                                                      • LocalAlloc.KERNEL32(00000040,00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A8952
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A896F
                                                      • LocalFree.KERNEL32(00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A8A03
                                                      • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000005), ref: 006A8A4E
                                                      • ShellExecuteW.SHELL32(00000000,00000000,00000000,00000000,00000000,00000005), ref: 006A8A9C
                                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A8ACB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocalMultiWide$AllocExecuteFileFreeShell$CloseCreateHandleWrite
                                                      • String ID: -_.~!*'();:@&=+$,/?#[]$URL Shortcut content:$[InternetShortcut]URL=$open
                                                      • API String ID: 2199533872-3004881174
                                                      • Opcode ID: c5eae6ce68ecfb17627dae1b23d531380269f7c3db46905075fedf5859518bea
                                                      • Instruction ID: 7e138a8ff471cdd8a7c5bfaff9cf34230ae610b67eb28f958815effd5447d544
                                                      • Opcode Fuzzy Hash: c5eae6ce68ecfb17627dae1b23d531380269f7c3db46905075fedf5859518bea
                                                      • Instruction Fuzzy Hash: DDC1E3719002499FEB20AF68CC85BFFBBA6EF56700F144129E6059B2C2DB758D05CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(00706AF8,00000FA0,?,?,006C8B53), ref: 006C8B81
                                                      • GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,006C8B53), ref: 006C8B8C
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,?,?,006C8B53), ref: 006C8B9D
                                                      • GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 006C8BAF
                                                      • GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 006C8BBD
                                                      • CreateEventW.KERNEL32(00000000,00000001,00000000,00000000,?,?,006C8B53), ref: 006C8BE0
                                                      • DeleteCriticalSection.KERNEL32(00706AF8,00000007,?,?,006C8B53), ref: 006C8BFC
                                                      • CloseHandle.KERNEL32(00000000,?,?,006C8B53), ref: 006C8C0C
                                                      Strings
                                                      • SleepConditionVariableCS, xrefs: 006C8BA9
                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 006C8B87
                                                      • WakeAllConditionVariable, xrefs: 006C8BB5
                                                      • kernel32.dll, xrefs: 006C8B98
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                      • String ID: SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                      • API String ID: 2565136772-3242537097
                                                      • Opcode ID: acafaf31128fb003d931442c68802ae76f7b6d3ddaafb34d9abf39eaeb50ad28
                                                      • Instruction ID: 5ea93fffb760d0ea05297a55f41260a71b013ca14a8944b9dc65488a73e71667
                                                      • Opcode Fuzzy Hash: acafaf31128fb003d931442c68802ae76f7b6d3ddaafb34d9abf39eaeb50ad28
                                                      • Instruction Fuzzy Hash: 570192F5B41311EFD7202BA4AD5CEB636ABEB41B01701812AB900EB291DEB48C008661
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C625B
                                                      • collate.LIBCPMT ref: 006C6267
                                                        • Part of subcall function 006C4F3F: __EH_prolog3_GS.LIBCMT ref: 006C4F46
                                                        • Part of subcall function 006C4F3F: __Getcoll.LIBCPMT ref: 006C4FAA
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • __Getcoll.LIBCPMT ref: 006C62AA
                                                        • Part of subcall function 006C4DA3: __EH_prolog3.LIBCMT ref: 006C4DAA
                                                        • Part of subcall function 006C4DA3: std::_Lockit::_Lockit.LIBCPMT ref: 006C4DB4
                                                        • Part of subcall function 006C4DA3: std::_Lockit::~_Lockit.LIBCPMT ref: 006C4E25
                                                        • Part of subcall function 006B454B: __EH_prolog3.LIBCMT ref: 006B4552
                                                        • Part of subcall function 006B454B: std::_Lockit::_Lockit.LIBCPMT ref: 006B455C
                                                        • Part of subcall function 006B454B: std::_Lockit::~_Lockit.LIBCPMT ref: 006B4603
                                                      • numpunct.LIBCPMT ref: 006C64DA
                                                        • Part of subcall function 006A8440: LocalAlloc.KERNEL32(00000040,00000000,006C97AD,00000000,210DFF48,?,00000000,?,00000000,?,006EE009,000000FF,?,006A17D5,00000000,006EF3BA), ref: 006A8446
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3Lockit::_Lockit::~_$Getcoll$AllocH_prolog3_Localcollatenumpunct
                                                      • String ID: djp$hjp$ljp$pjp$tjp$xjp$|jp
                                                      • API String ID: 2732324234-329404585
                                                      • Opcode ID: d6b734d54fb38883db5887b2e1ece4ce17d1c98feff64c0c21ec9b035eb32fd1
                                                      • Instruction ID: e298d5bdc04b05e6dd2ab9ad4c2ee1bc3e8c86e0999847fa160b3f6d96f1ee88
                                                      • Opcode Fuzzy Hash: d6b734d54fb38883db5887b2e1ece4ce17d1c98feff64c0c21ec9b035eb32fd1
                                                      • Instruction Fuzzy Hash: 1591C3B1D01615ABDBA5AF64C805FBF7AE7EF81360F10851DF849A7282DE348D1087A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006BE445
                                                      • ctype.LIBCPMT ref: 006BE48C
                                                        • Part of subcall function 006BDF8B: __Getctype.LIBCPMT ref: 006BDF9A
                                                        • Part of subcall function 006B7D7D: __EH_prolog3.LIBCMT ref: 006B7D84
                                                        • Part of subcall function 006B7D7D: std::_Lockit::_Lockit.LIBCPMT ref: 006B7D8E
                                                        • Part of subcall function 006B7D7D: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7DFF
                                                        • Part of subcall function 006B7EA7: __EH_prolog3.LIBCMT ref: 006B7EAE
                                                        • Part of subcall function 006B7EA7: std::_Lockit::_Lockit.LIBCPMT ref: 006B7EB8
                                                        • Part of subcall function 006B7EA7: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7F29
                                                        • Part of subcall function 006B8066: __EH_prolog3.LIBCMT ref: 006B806D
                                                        • Part of subcall function 006B8066: std::_Lockit::_Lockit.LIBCPMT ref: 006B8077
                                                        • Part of subcall function 006B8066: std::_Lockit::~_Lockit.LIBCPMT ref: 006B80E8
                                                        • Part of subcall function 006B7FD1: __EH_prolog3.LIBCMT ref: 006B7FD8
                                                        • Part of subcall function 006B7FD1: std::_Lockit::_Lockit.LIBCPMT ref: 006B7FE2
                                                        • Part of subcall function 006B7FD1: std::_Lockit::~_Lockit.LIBCPMT ref: 006B8053
                                                        • Part of subcall function 006B454B: __EH_prolog3.LIBCMT ref: 006B4552
                                                        • Part of subcall function 006B454B: std::_Lockit::_Lockit.LIBCPMT ref: 006B455C
                                                        • Part of subcall function 006B454B: std::_Lockit::~_Lockit.LIBCPMT ref: 006B4603
                                                      • collate.LIBCPMT ref: 006BE5C0
                                                      • numpunct.LIBCPMT ref: 006BE83A
                                                        • Part of subcall function 006B8743: __EH_prolog3.LIBCMT ref: 006B874A
                                                        • Part of subcall function 006B8479: __EH_prolog3.LIBCMT ref: 006B8480
                                                        • Part of subcall function 006B8479: std::_Lockit::_Lockit.LIBCPMT ref: 006B848A
                                                        • Part of subcall function 006B8479: std::_Lockit::~_Lockit.LIBCPMT ref: 006B84FB
                                                        • Part of subcall function 006B85A3: __EH_prolog3.LIBCMT ref: 006B85AA
                                                        • Part of subcall function 006B85A3: std::_Lockit::_Lockit.LIBCPMT ref: 006B85B4
                                                        • Part of subcall function 006B85A3: std::_Lockit::~_Lockit.LIBCPMT ref: 006B8625
                                                        • Part of subcall function 006B454B: Concurrency::cancel_current_task.LIBCPMT ref: 006B460E
                                                        • Part of subcall function 006B796A: __EH_prolog3.LIBCMT ref: 006B7971
                                                        • Part of subcall function 006B796A: std::_Lockit::_Lockit.LIBCPMT ref: 006B797B
                                                        • Part of subcall function 006B796A: std::_Lockit::~_Lockit.LIBCPMT ref: 006B79EC
                                                      • __Getcoll.LIBCPMT ref: 006BE600
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                        • Part of subcall function 006A8440: LocalAlloc.KERNEL32(00000040,00000000,006C97AD,00000000,210DFF48,?,00000000,?,00000000,?,006EE009,000000FF,?,006A17D5,00000000,006EF3BA), ref: 006A8446
                                                      • codecvt.LIBCPMT ref: 006BE8EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3$Lockit::_Lockit::~_$AllocConcurrency::cancel_current_taskGetcollGetctypeLocalcodecvtcollatectypenumpunct
                                                      • String ID: ip$ip$ip$ip
                                                      • API String ID: 613171289-3750973409
                                                      • Opcode ID: 25a4d9a4103a9e8725e9f6368c14bb132a4e2429aa8ce2c173e1d83e82f5db7a
                                                      • Instruction ID: 9199ac1f4fc7abc50da70103db999ab28ebdc0c826a1c7b394e9a018942f740a
                                                      • Opcode Fuzzy Hash: 25a4d9a4103a9e8725e9f6368c14bb132a4e2429aa8ce2c173e1d83e82f5db7a
                                                      • Instruction Fuzzy Hash: 6CE1C1F180061AAFDBA16F648C029FF7AA7EF41350F14452DF9556B382EF328D908B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,00000018,210DFF48,?,00000000), ref: 006AF016
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AF053
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006AF0BD
                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 006AF259
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AF316
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 006AF33E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Lockit$AllocConcurrency::cancel_current_taskLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                      • String ID: bad locale name$false$true
                                                      • API String ID: 975656625-1062449267
                                                      • Opcode ID: 1eb8163708fde5f43516b68940b6d8b735d328578fcc324c68dcd80e33f0a70c
                                                      • Instruction ID: f2f08daa02a22d61adabe9d074c69f4ad9d001cf991c16fc5da78ec7beda0e0c
                                                      • Opcode Fuzzy Hash: 1eb8163708fde5f43516b68940b6d8b735d328578fcc324c68dcd80e33f0a70c
                                                      • Instruction Fuzzy Hash: 04B162B1D00348DAEF20DFE4C945BDEBBB5AF15304F1481ADE458AB281E7759A48CF62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • OpenProcess.KERNEL32(00000400,00000000,?,210DFF48,?,00000000), ref: 006A6A42
                                                      • OpenProcess.KERNEL32(00000400,00000000,00000000,?,210DFF48,?,00000000), ref: 006A6A63
                                                      • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,210DFF48,?,00000000), ref: 006A6A96
                                                      • GetProcessTimes.KERNEL32(00000000,?,00000000,00000000,00000000,?,210DFF48,?,00000000), ref: 006A6AA7
                                                      • CloseHandle.KERNEL32(00000000,?,210DFF48,?,00000000), ref: 006A6AC5
                                                      • CloseHandle.KERNEL32(00000000,?,210DFF48,?,00000000), ref: 006A6AE1
                                                      • CloseHandle.KERNEL32(00000000,?,210DFF48,?,00000000), ref: 006A6B09
                                                      • CloseHandle.KERNEL32(00000000,?,210DFF48,?,00000000), ref: 006A6B25
                                                      • CloseHandle.KERNEL32(00000000,?,210DFF48,?,00000000), ref: 006A6B43
                                                      • CloseHandle.KERNEL32(00000000,?,210DFF48,?,00000000), ref: 006A6B5F
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle$Process$OpenTimes
                                                      • String ID:
                                                      • API String ID: 1711917922-0
                                                      • Opcode ID: 70aed56b1b69461d5c6c34db2aa2e8280abcea9f5831ab72415d7aa2adc72db6
                                                      • Instruction ID: b44e9ed1ed8c9b59f0b1d2e46b372e8d1f5a4c7e5af193d5f06a5b28f44174f3
                                                      • Opcode Fuzzy Hash: 70aed56b1b69461d5c6c34db2aa2e8280abcea9f5831ab72415d7aa2adc72db6
                                                      • Instruction Fuzzy Hash: 55514A70E0125CABDB10EF98C984BEEFBB6EF49724F248219E614B7380D7755D058BA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C16C4
                                                        • Part of subcall function 006B7BBE: __EH_prolog3.LIBCMT ref: 006B7BC5
                                                        • Part of subcall function 006B7BBE: std::_Lockit::_Lockit.LIBCPMT ref: 006B7BCF
                                                        • Part of subcall function 006B7BBE: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7C40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3Lockitstd::_$Lockit::_Lockit::~_
                                                      • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                      • API String ID: 1538362411-2891247106
                                                      • Opcode ID: 2fac8fa7a030fa9a7e7c1b76d4491474b0a2a526f21e5684427eeb7819476320
                                                      • Instruction ID: 35e9e0fa549e6b80756fc49b86007f83d2b7117b2ea439d6f9f05bc9df32c7e8
                                                      • Opcode Fuzzy Hash: 2fac8fa7a030fa9a7e7c1b76d4491474b0a2a526f21e5684427eeb7819476320
                                                      • Instruction Fuzzy Hash: 12C14376500109AFDF18DF98C966FFE7BBAEB07304F15411EFA46AA252D630DA11CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C1AB4
                                                        • Part of subcall function 006AB4A0: std::_Lockit::_Lockit.LIBCPMT ref: 006AB4CD
                                                        • Part of subcall function 006AB4A0: std::_Lockit::_Lockit.LIBCPMT ref: 006AB4F0
                                                        • Part of subcall function 006AB4A0: std::_Lockit::~_Lockit.LIBCPMT ref: 006AB518
                                                        • Part of subcall function 006AB4A0: std::_Lockit::~_Lockit.LIBCPMT ref: 006AB5B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                      • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                      • API String ID: 1383202999-2891247106
                                                      • Opcode ID: b2d66db83b6cfa526ef550bd1d8ad8d52962a51d0cbd13639768d069c3448048
                                                      • Instruction ID: cf9993be5f522bf4507a7f28094a3e86ee1a2e36fb2d9981fc4b777160ad40d1
                                                      • Opcode Fuzzy Hash: b2d66db83b6cfa526ef550bd1d8ad8d52962a51d0cbd13639768d069c3448048
                                                      • Instruction Fuzzy Hash: 6DC13276500109AFDB18DFA8C955EFA77BAEF0B300F15421EFA02EA256D630DE11CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C6DE0
                                                        • Part of subcall function 006AC530: std::_Lockit::_Lockit.LIBCPMT ref: 006AC55D
                                                        • Part of subcall function 006AC530: std::_Lockit::_Lockit.LIBCPMT ref: 006AC580
                                                        • Part of subcall function 006AC530: std::_Lockit::~_Lockit.LIBCPMT ref: 006AC5A8
                                                        • Part of subcall function 006AC530: std::_Lockit::~_Lockit.LIBCPMT ref: 006AC647
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3
                                                      • String ID: %H : %M$%H : %M : %S$%I : %M : %S %p$%b %d %H : %M : %S %Y$%d / %m / %y$%m / %d / %y$:AM:am:PM:pm
                                                      • API String ID: 1383202999-2891247106
                                                      • Opcode ID: 4ad5c05f4d680370fb5ccfe902df768ac6aea4d9875196c4e0a614f08fd8ea10
                                                      • Instruction ID: aadf4797a1ac7c9bf664c09db4b90f4a68dcb5572f498228b2ab1b8d9f5b0541
                                                      • Opcode Fuzzy Hash: 4ad5c05f4d680370fb5ccfe902df768ac6aea4d9875196c4e0a614f08fd8ea10
                                                      • Instruction Fuzzy Hash: F0C183B650410AAFDB18DF68CD56FFF3BAAEB49300F18011DFA06E2651E630DA15CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006A6010: GetSystemDirectoryW.KERNEL32(?,00000105), ref: 006A6074
                                                        • Part of subcall function 006A6010: GetLastError.KERNEL32 ref: 006A6110
                                                      • GetProcAddress.KERNEL32(?,NtQueryInformationProcess), ref: 006A65B2
                                                      • ReadProcessMemory.KERNEL32(00000000,?,?,000001D8,00000000,?,?,?,?,00000000), ref: 006A660B
                                                      • ReadProcessMemory.KERNEL32(00000000,?,?,00000048,00000000,?,?,?,?,?,?,?,00000000), ref: 006A6692
                                                      • ReadProcessMemory.KERNEL32(00000000,?,?,?,00000000,?,00000000,?,?,?,?,?,?,?,00000000), ref: 006A6776
                                                      • LocalFree.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 006A67EE
                                                      • GetLastError.KERNEL32(?,00000000), ref: 006A6849
                                                      • FreeLibrary.KERNEL32(?,?,00000000), ref: 006A689E
                                                      Strings
                                                      • NtQueryInformationProcess, xrefs: 006A65AC
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: MemoryProcessRead$ErrorFreeLast$AddressDirectoryLibraryLocalProcSystem
                                                      • String ID: NtQueryInformationProcess
                                                      • API String ID: 253270903-2781105232
                                                      • Opcode ID: 6706f51a776b3b5316d2e1d1e956f8acc31dc92ea2a588c5d07a488c287f2ec9
                                                      • Instruction ID: b599fabaf45e93d0d9486f658ea15ddc00244f37266d80e7c36595a3783135bd
                                                      • Opcode Fuzzy Hash: 6706f51a776b3b5316d2e1d1e956f8acc31dc92ea2a588c5d07a488c287f2ec9
                                                      • Instruction Fuzzy Hash: 2FB18D70910749CBEB20DF64C9487AEBBF5EF49308F14465DE449A7280D7B9AAC8CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006BDFCB
                                                      • _Maklocstr.LIBCPMT ref: 006BE034
                                                      • _Maklocstr.LIBCPMT ref: 006BE046
                                                      • _Maklocchr.LIBCPMT ref: 006BE05E
                                                      • _Maklocchr.LIBCPMT ref: 006BE06E
                                                      • _Getvals.LIBCPMT ref: 006BE090
                                                        • Part of subcall function 006B7404: _Maklocchr.LIBCPMT ref: 006B7433
                                                        • Part of subcall function 006B7404: _Maklocchr.LIBCPMT ref: 006B7449
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Maklocchr$Maklocstr$GetvalsH_prolog3_
                                                      • String ID: false$true
                                                      • API String ID: 3549167292-2658103896
                                                      • Opcode ID: cc6fabae785a0fd14aeff06e7fe0e479e4e0273fb5ba8bd25161a27bfcd8cab4
                                                      • Instruction ID: 2537177ae6ebe2dac8db0bb1bb56d0b68475c9568ba668e3bf0335ce5313a902
                                                      • Opcode Fuzzy Hash: cc6fabae785a0fd14aeff06e7fe0e479e4e0273fb5ba8bd25161a27bfcd8cab4
                                                      • Instruction Fuzzy Hash: 102195B2D04318AADF14EFA5D885EDF7BAAEF05710F00805AB9049F282DAB1D550CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006B5FC6: __EH_prolog3.LIBCMT ref: 006B5FCD
                                                        • Part of subcall function 006B5FC6: std::_Lockit::_Lockit.LIBCPMT ref: 006B5FD8
                                                        • Part of subcall function 006B5FC6: std::locale::_Setgloballocale.LIBCPMT ref: 006B5FF3
                                                        • Part of subcall function 006B5FC6: std::_Lockit::~_Lockit.LIBCPMT ref: 006B6046
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AC9BA
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006ACA20
                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 006ACAEF
                                                        • Part of subcall function 006B46EF: __EH_prolog3.LIBCMT ref: 006B46F6
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006ACBA0
                                                      • LocalFree.KERNEL32(?,?,?,006FD6C9,00000000,006FD6C9), ref: 006ACCA1
                                                      • __cftoe.LIBCMT ref: 006ACDFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$H_prolog3Locinfo::_Lockit::_Lockit::~_$FreeLocalLocinfo_ctorLocinfo_dtorSetgloballocale__cftoestd::locale::_
                                                      • String ID: bad locale name
                                                      • API String ID: 2085124900-1405518554
                                                      • Opcode ID: 17a269b9debe0dc0dc5a3dfdb1a3012cec3ac68c9d9928d5e9d9b480e6918a74
                                                      • Instruction ID: a5d75fd6878204ffca5ec85d9c8dcadc82906c958681e2907ab2d690983270c1
                                                      • Opcode Fuzzy Hash: 17a269b9debe0dc0dc5a3dfdb1a3012cec3ac68c9d9928d5e9d9b480e6918a74
                                                      • Instruction Fuzzy Hash: 13127DB1D00249DFDB10DFA8C985BEEBBB6EF15314F144169E415AB381E735AE04CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • type_info::operator==.LIBVCRUNTIME ref: 006CC75B
                                                      • ___TypeMatch.LIBVCRUNTIME ref: 006CC869
                                                      • _UnwindNestedFrames.LIBCMT ref: 006CC9BB
                                                      • CallUnexpected.LIBVCRUNTIME ref: 006CC9D6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                                      • String ID: csm$csm$csm
                                                      • API String ID: 2751267872-393685449
                                                      • Opcode ID: ab10bafbb497c3350ae217c008978b3fd7882256aea636c6c2838954251ca7df
                                                      • Instruction ID: ee718c472bd499c95fb4a66c56f1de4800d799985c1ba94ba3ca91c3899e94da
                                                      • Opcode Fuzzy Hash: ab10bafbb497c3350ae217c008978b3fd7882256aea636c6c2838954251ca7df
                                                      • Instruction Fuzzy Hash: 1EB13671800219EFCF19DFA4C881EBEBBB6EF18320B14415EE8196B252D735DA51CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 006B02BF
                                                      • LocalAlloc.KERNEL32(00000040,?), ref: 006B0304
                                                      • ___std_exception_copy.LIBVCRUNTIME ref: 006B037B
                                                      • LocalFree.KERNEL32(?), ref: 006B03B8
                                                      • LocalFree.KERNEL32(?,?,?,?,?,210DFF48,210DFF48,?,?), ref: 006B04E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Local$AllocFree$___std_exception_copy
                                                      • String ID: ios_base::failbit set$iostream
                                                      • API String ID: 2276494016-302468714
                                                      • Opcode ID: 5f0c60a0e92cf487e2428a6229f5d070b76cc5ab248a73cacee1be8c847d6b19
                                                      • Instruction ID: 2f1a3f9d52d01648b725f855c1f87721f1161358d08af5a38119bd123e1ed3c4
                                                      • Opcode Fuzzy Hash: 5f0c60a0e92cf487e2428a6229f5d070b76cc5ab248a73cacee1be8c847d6b19
                                                      • Instruction Fuzzy Hash: BFA192B1D00249DFDB08DF68D985BAEFBB6FB49310F10826DE8159B391D7709A84CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • #224.MSI(?,00000001,00000000,00000000,00000000), ref: 006A2C43
                                                      • LocalFree.KERNEL32(?), ref: 006A2CA2
                                                      • LocalFree.KERNEL32(?), ref: 006A2D0C
                                                      • CertFreeCertificateContext.CRYPT32(00000000), ref: 006A2E94
                                                        • Part of subcall function 006A3CE0: CertGetNameStringW.CRYPT32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 006A3D23
                                                      • LocalFree.KERNEL32(?), ref: 006A2E13
                                                      • LocalFree.KERNEL32(?), ref: 006A2E6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Free$Local$Cert$#224CertificateContextNameString
                                                      • String ID: HZp
                                                      • API String ID: 2665452496-2442772872
                                                      • Opcode ID: 6a61f7826e5899da25fde5fc7ecaa3b3a2f8c84228819a79889c6f15381487a4
                                                      • Instruction ID: 7a99c1c04318dc3e2617f339be38a941d185280bd7de2747d5e0d49c85ac86aa
                                                      • Opcode Fuzzy Hash: 6a61f7826e5899da25fde5fc7ecaa3b3a2f8c84228819a79889c6f15381487a4
                                                      • Instruction Fuzzy Hash: 8C916C7090024ACFDB18DFA8C55879EFBB2FF85304F14865DD415AB391DBB5AA84CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,00000044,210DFF48,?,00000000), ref: 006ABA2B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006ABA68
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006ABAD5
                                                      • __Getctype.LIBCPMT ref: 006ABB1E
                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 006ABB92
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006ABC4F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Lockit$AllocGetctypeLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                      • String ID: bad locale name
                                                      • API String ID: 3635123611-1405518554
                                                      • Opcode ID: f10f7208c12b8c7abaccc8061bf685a7ab88811097a343373847e2d939e90224
                                                      • Instruction ID: a250d01e3fa1dbd2f135098868b03479e66a3d3749d2ee9f926ede6dba4d565e
                                                      • Opcode Fuzzy Hash: f10f7208c12b8c7abaccc8061bf685a7ab88811097a343373847e2d939e90224
                                                      • Instruction Fuzzy Hash: 0D8190B0D04388DFEB10DFA8C945B9EBBF5AF15304F14819DD448AB382EB759A48CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,00000018,210DFF48,?,00000000,?,?,?,?,?,?,?,00000000,006EBFC5,000000FF), ref: 006AC204
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AC23E
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006AC2A2
                                                      • __Getctype.LIBCPMT ref: 006AC2EB
                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 006AC331
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AC3E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Lockit$AllocGetctypeLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                      • String ID: bad locale name
                                                      • API String ID: 3635123611-1405518554
                                                      • Opcode ID: 7306dc605b91afc6a6d9993fe0077aefa27415c983abb2f30970f12eee0beb80
                                                      • Instruction ID: 43168a187c5c89ed459cc3970dcb49d5a3e0ac7e6ceffdd54f502f5989a476bc
                                                      • Opcode Fuzzy Hash: 7306dc605b91afc6a6d9993fe0077aefa27415c983abb2f30970f12eee0beb80
                                                      • Instruction Fuzzy Hash: D0616BB0D01288EAEF10DFA8C908BDEBFF5AF15314F14815DE454AB381D7B99A08CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCPInfo.KERNEL32(?,?,?,?,?), ref: 006C88D5
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 006C8963
                                                      • __alloca_probe_16.LIBCMT ref: 006C898D
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006C89D5
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 006C89EF
                                                      • __alloca_probe_16.LIBCMT ref: 006C8A15
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 006C8A52
                                                      • CompareStringEx.KERNEL32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 006C8A6F
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__alloca_probe_16$CompareInfoString
                                                      • String ID:
                                                      • API String ID: 3603178046-0
                                                      • Opcode ID: a3d753e96919886720ccfb5b4a0b29c3adfc52f789f6580f66559305376bd85d
                                                      • Instruction ID: 0762284577d81c0ab4566045dd2b0f2ae9ce91860728e9ca7f7342fbaa288c4e
                                                      • Opcode Fuzzy Hash: a3d753e96919886720ccfb5b4a0b29c3adfc52f789f6580f66559305376bd85d
                                                      • Instruction Fuzzy Hash: 7A716A3290424AAEDF318BA8CC45FFE7BBBEF89750F19405EE904A7251DE358901DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,CCCCCCCC,006AC67F,?,00000001,00000000,?,00000000,?,006AC67F,?), ref: 006C8378
                                                      • __alloca_probe_16.LIBCMT ref: 006C83A4
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000,?,006AC67F,?,?,00000000,006ACC73,0000003F,?), ref: 006C83E3
                                                      • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,006AC67F,?,?,00000000,006ACC73,0000003F), ref: 006C8400
                                                      • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?,006AC67F,?,?,00000000,006ACC73,0000003F), ref: 006C843F
                                                      • __alloca_probe_16.LIBCMT ref: 006C845C
                                                      • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,?,006AC67F,?,?,00000000,006ACC73,0000003F), ref: 006C849E
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,?,006AC67F,?,?,00000000,006ACC73,0000003F,?), ref: 006C84C1
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiStringWide$__alloca_probe_16
                                                      • String ID:
                                                      • API String ID: 2040435927-0
                                                      • Opcode ID: 326020df1e70f089a1c21461f7ddd193b7570795101c5ec9810850db053e4b29
                                                      • Instruction ID: aee3213f8cf8b6891393fa2ab2ebd2445715aad870f209264221eca0c04109d9
                                                      • Opcode Fuzzy Hash: 326020df1e70f089a1c21461f7ddd193b7570795101c5ec9810850db053e4b29
                                                      • Instruction Fuzzy Hash: 30519F7260025AAFEB349FA4CC45FFB7BEAEB44750F14852DF9159B250DB348D118BA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetTempFileNameW.KERNEL32(?,URL,00000000,?,210DFF48,?,00000004), ref: 006A592A
                                                      • LocalFree.KERNEL32(?), ref: 006A5A3B
                                                      • MoveFileW.KERNEL32(?,00000000), ref: 006A5CDB
                                                      • DeleteFileW.KERNEL32(?), ref: 006A5D23
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: File$DeleteFreeLocalMoveNameTemp
                                                      • String ID: URL$url
                                                      • API String ID: 1622375482-346267919
                                                      • Opcode ID: b3d0d51b6601fec4c518d868a95d78f3a8fdf64238a1fefb1a5f51aa31d0a697
                                                      • Instruction ID: bccf58722f46e7b6c156d504d98ec9130a2fb6dcd694e4d1bec10f21f1da8d43
                                                      • Opcode Fuzzy Hash: b3d0d51b6601fec4c518d868a95d78f3a8fdf64238a1fefb1a5f51aa31d0a697
                                                      • Instruction Fuzzy Hash: 1F025A70A116698BCB64DF28CD9879DB7B2BF55304F1042D9E40AA7251EB74AFC4CF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,0000000C,210DFF48,?,00000000,00000000,?,?,?,?,00000000,006EC6D1,000000FF,?,006AEB6A,00000000), ref: 006AF5C4
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AF5FA
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006AF65E
                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 006AF71E
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AF7D2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Lockit$AllocLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                      • String ID: bad locale name
                                                      • API String ID: 2968629171-1405518554
                                                      • Opcode ID: 2894fab8f86308f60c1f38c9d7d3db54ca232ec027697c2cb0b91cdd0821c6d7
                                                      • Instruction ID: f06f9a5d6d34f7cecaf5798c87a0e7541c0c0c5ca24e253965f7f28377362059
                                                      • Opcode Fuzzy Hash: 2894fab8f86308f60c1f38c9d7d3db54ca232ec027697c2cb0b91cdd0821c6d7
                                                      • Instruction Fuzzy Hash: 07716DB0D01248EAEF10DFA8C948BDEBFB5AF15314F14416DE414BB381D7B59A04CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,00000008,210DFF48,?,00000000,00000000,?,?,?,00000000,006EC5DD,000000FF,?,006AECAA,00000000,?), ref: 006AF394
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AF3CA
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006AF42E
                                                      • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 006AF49E
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AF552
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Lockit$AllocLocalLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                      • String ID: bad locale name
                                                      • API String ID: 2968629171-1405518554
                                                      • Opcode ID: 380042e098e15bc6d0862e18099b5becb964287764e7a79ab816f07f7b15e3ee
                                                      • Instruction ID: d3ee3381509ce5ef0e322db496c4f4e8e6c4eff9eaff779a1bab7c0d565e81f0
                                                      • Opcode Fuzzy Hash: 380042e098e15bc6d0862e18099b5becb964287764e7a79ab816f07f7b15e3ee
                                                      • Instruction Fuzzy Hash: E1613BB0D01288EAEF10DFE9C5487DEBBB5AF15314F14416DE454AB381D7799A08CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 006CA177
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 006CA17F
                                                      • _ValidateLocalCookies.LIBCMT ref: 006CA208
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 006CA233
                                                      • _ValidateLocalCookies.LIBCMT ref: 006CA288
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: 8d34dd191bb5a2ea01f1c9274831f30e6ad812a9b5df7f6746e5b98049437deb
                                                      • Instruction ID: b3ab817cf24c7bf3dca9ddd70562621d33dd0bbe8ed6edc20a0fd2795a2a51f8
                                                      • Opcode Fuzzy Hash: 8d34dd191bb5a2ea01f1c9274831f30e6ad812a9b5df7f6746e5b98049437deb
                                                      • Instruction Fuzzy Hash: B4418334A0025C9BCF10DFA8C844FAEBBA6EF45318F18815DE9155B392D736EA15CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FreeLibrary.KERNEL32(00000000,?,006DDE88,?,?,?,00000000,?,?,006DE0B2,00000021,FlsSetValue,006F3E00,006F3E08,?), ref: 006DDE3C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: FreeLibrary
                                                      • String ID: api-ms-$ext-ms-
                                                      • API String ID: 3664257935-537541572
                                                      • Opcode ID: 76189d7aa1b2d20f090f9b52a5c006aa589694bc9ca88c8548e1473b6fdde386
                                                      • Instruction ID: 532cb53967890874dbb60a53dff1295ab0187d82e9f8398e7ca8db6166ea812c
                                                      • Opcode Fuzzy Hash: 76189d7aa1b2d20f090f9b52a5c006aa589694bc9ca88c8548e1473b6fdde386
                                                      • Instruction Fuzzy Hash: 1821A871E01211E7C731AB65EC40AEA776B9F557A0F151226E915EF390EB70EE01C6D0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B27DA
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B27E4
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • numpunct.LIBCPMT ref: 006B281E
                                                      • std::_Facet_Register.LIBCPMT ref: 006B2835
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B2855
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                      • String ID: thp
                                                      • API String ID: 743221004-1368951053
                                                      • Opcode ID: aa370367d0a08a518a069c51c5ddcaf6d1eda53560e143128faf5ea4424513a2
                                                      • Instruction ID: ab8dc390c3ebe980a77c4915ad49bab1c107ed43b387e521712b12daa98af233
                                                      • Opcode Fuzzy Hash: aa370367d0a08a518a069c51c5ddcaf6d1eda53560e143128faf5ea4424513a2
                                                      • Instruction Fuzzy Hash: 6211AC769002169BCB04EBA0C865AFE77A2AF84720F24411CF911AB3C1DF349E41CB88
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B83EB
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B83F5
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • numpunct.LIBCPMT ref: 006B842F
                                                      • std::_Facet_Register.LIBCPMT ref: 006B8446
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B8466
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registernumpunct
                                                      • String ID: ip
                                                      • API String ID: 743221004-734542
                                                      • Opcode ID: cc8f383b52079180c29dc876e5680aadd737e56b92cb1eb791a1c12a3afb750b
                                                      • Instruction ID: 0fe008ad7c003a97697a22fb6d94f405617684a17fcba91779a9776c16e03a29
                                                      • Opcode Fuzzy Hash: cc8f383b52079180c29dc876e5680aadd737e56b92cb1eb791a1c12a3afb750b
                                                      • Instruction Fuzzy Hash: 8A01E1B69001158FCB00BFA4C855AFD77A6AF84720F24840CF8116B281CF349E40CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B261B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B2625
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • codecvt.LIBCPMT ref: 006B265F
                                                      • std::_Facet_Register.LIBCPMT ref: 006B2676
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B2696
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                      • String ID: xhp
                                                      • API String ID: 712880209-1484943465
                                                      • Opcode ID: 30352facf9b3d3ccacde5702d777b601bdb7bd20ed869f85532e2168f7d8d936
                                                      • Instruction ID: 7385c7a0ef7959c007feb27e99ffcd6d5c831a35431251fcc04fa4e99f8522fe
                                                      • Opcode Fuzzy Hash: 30352facf9b3d3ccacde5702d777b601bdb7bd20ed869f85532e2168f7d8d936
                                                      • Instruction Fuzzy Hash: 0601A1B59002199FCB04EBA4C865AFD77A2AF85720F14451CF4116B2D2DF749E818B99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4997
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C49A1
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • collate.LIBCPMT ref: 006C49DB
                                                      • std::_Facet_Register.LIBCPMT ref: 006C49F2
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4A12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                      • String ID: djp
                                                      • API String ID: 1007100420-2139638015
                                                      • Opcode ID: 0ee18209a4c72fb1f457824199cd165115fec5ade8bc6161d4a5fb20d1ae6062
                                                      • Instruction ID: 8d3878e6d71507b790f4b200fdcbfdae62007e2f6df4c1e6f02073a1e2e8b72d
                                                      • Opcode Fuzzy Hash: 0ee18209a4c72fb1f457824199cd165115fec5ade8bc6161d4a5fb20d1ae6062
                                                      • Instruction Fuzzy Hash: C8018B759002599BCB04FBA4C865BBE7BA2EF88720F14850DF8116B281DF749E01CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4A2C
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4A36
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • messages.LIBCPMT ref: 006C4A70
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4A87
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4AA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                      • String ID: hjp
                                                      • API String ID: 2750803064-1989325211
                                                      • Opcode ID: 0d149d4fe3d980b8b57b20a482c6a80b90d56015da157a4359903b2d9159166e
                                                      • Instruction ID: cca5cee62f0210fc3949370e2842186ef18971e9af7afaf92547e7491f7d5745
                                                      • Opcode Fuzzy Hash: 0d149d4fe3d980b8b57b20a482c6a80b90d56015da157a4359903b2d9159166e
                                                      • Instruction Fuzzy Hash: D0015E759002199FCB05FBA4C865ABD7766EF84720F25450DF4116B291DF389E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7A9B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7AA5
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • collate.LIBCPMT ref: 006B7ADF
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7AF6
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7B16
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                      • String ID: ip
                                                      • API String ID: 1007100420-734542
                                                      • Opcode ID: a970d522cd02fbde609f1ec30b48a18ce74ac535d9e91562972d786ff6438666
                                                      • Instruction ID: 4925f46dd7051212cc5012fdb1e9742df01c7eff96f774d988e11bced1de8e18
                                                      • Opcode Fuzzy Hash: a970d522cd02fbde609f1ec30b48a18ce74ac535d9e91562972d786ff6438666
                                                      • Instruction Fuzzy Hash: 7601ADB69042199BCB04BFA4C855AFDBB67AF84720F14450CF9116B2C2DF749E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4BEB
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4BF5
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • moneypunct.LIBCPMT ref: 006C4C2F
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4C46
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4C66
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID: xjp
                                                      • API String ID: 419941038-1790186219
                                                      • Opcode ID: c81f5ded9a52021b45f1a4c299936972f61d8ecf4222ca068539130fd779e534
                                                      • Instruction ID: e9dbdcd874d7f5fc2c18848ea47ef545e3053813c07acdeefd64e4dcb20759fe
                                                      • Opcode Fuzzy Hash: c81f5ded9a52021b45f1a4c299936972f61d8ecf4222ca068539130fd779e534
                                                      • Instruction Fuzzy Hash: EC01E1719006159BCB00FBA0C8A5BFD7762EF85720F24850CF411AB2A1CF389E40CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4C80
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4C8A
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • moneypunct.LIBCPMT ref: 006C4CC4
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4CDB
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4CFB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID: tjp
                                                      • API String ID: 419941038-1672407951
                                                      • Opcode ID: cd65f06ccb0914f5e01f63823321a5e109fd149806b2932e8f07b8040cd2f48f
                                                      • Instruction ID: 849ce481b1a83158fbcf21717c50ea0f22f33821df60d8dfb96e6524091b88d7
                                                      • Opcode Fuzzy Hash: cd65f06ccb0914f5e01f63823321a5e109fd149806b2932e8f07b8040cd2f48f
                                                      • Instruction Fuzzy Hash: D801A1759016159BDB04FBA4C865BBD77A2EF84720F25450CF8116B391DF349E018B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AB4CD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AB4F0
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AB518
                                                      • std::_Facet_Register.LIBCPMT ref: 006AB58D
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AB5B7
                                                      • LocalFree.KERNEL32 ref: 006AB660
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_FreeLocalRegister
                                                      • String ID:
                                                      • API String ID: 1378673503-0
                                                      • Opcode ID: 09d2e32475bae6b21a13792c93830ca7e6bd48d5437f97c45198ee3302612f52
                                                      • Instruction ID: 9f5f025ad316f47c4e9c80a5720b391aeee0b27016a9f1c4ce7512b08b7a36ba
                                                      • Opcode Fuzzy Hash: 09d2e32475bae6b21a13792c93830ca7e6bd48d5437f97c45198ee3302612f52
                                                      • Instruction Fuzzy Hash: 1A519BB1C00248DFDB20EF58D844BAABBB6EB05720F14865DE82567392DB74AE40CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 3509577899-3206640213
                                                      • Opcode ID: bada76edc76c4816d883084fd180f53ca81955d3ca535c8393a685d56804ea01
                                                      • Instruction ID: 4c104fb6c9b862521dfe9ec74a3fae7896d39fd36f699efc9f7c61cedcd0e1ca
                                                      • Opcode Fuzzy Hash: bada76edc76c4816d883084fd180f53ca81955d3ca535c8393a685d56804ea01
                                                      • Instruction Fuzzy Hash: D3C1D175D08216EADB249F68C845AFAB7B3FF55704F18424BE901AB741E3319D42CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,006CC2FC,006CAB20,006C99B3), ref: 006CC313
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 006CC321
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 006CC33A
                                                      • SetLastError.KERNEL32(00000000,006CC2FC,006CAB20,006C99B3), ref: 006CC38C
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 6aee296748004f51db37e967e49f2a639b5195b5b7c321d7c52827ce5efea5ae
                                                      • Instruction ID: 541fe721011c95e4e8c34cce9b801311b6c11cb6eca751c07ea9ab47a5deebbe
                                                      • Opcode Fuzzy Hash: 6aee296748004f51db37e967e49f2a639b5195b5b7c321d7c52827ce5efea5ae
                                                      • Instruction Fuzzy Hash: E401D8722097519FD7642B757C99FBB2687EB01774720833EF21C9A2E0EF958C019988
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B46F6
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                        • Part of subcall function 006A8440: LocalAlloc.KERNEL32(00000040,00000000,006C97AD,00000000,210DFF48,?,00000000,?,00000000,?,006EE009,000000FF,?,006A17D5,00000000,006EF3BA), ref: 006A8446
                                                        • Part of subcall function 006AC050: __Getctype.LIBCPMT ref: 006AC0B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$AllocGetctypeH_prolog3LocalLockit::_Lockit::~_
                                                      • String ID: lhp$php$thp$xhp
                                                      • API String ID: 3791111190-4061352736
                                                      • Opcode ID: ccba5860767383972560a49db26279f6de0e320e5f8cf63901ff5eb16f3c5063
                                                      • Instruction ID: eff0f3bafd9e1630139a6b7f784a33a317a2d94171a43a34bc59b1b6c4914872
                                                      • Opcode Fuzzy Hash: ccba5860767383972560a49db26279f6de0e320e5f8cf63901ff5eb16f3c5063
                                                      • Instruction Fuzzy Hash: DC51A7F1900216ABEB917F658C829FF7AAAEF52350F14402DF94557283EF34CD9087A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Mpunct$GetvalsH_prolog3
                                                      • String ID: $+xv
                                                      • API String ID: 2204710431-1686923651
                                                      • Opcode ID: 041e13b2c7ab05f3296744857569c8e1d38ea3c95a6f40ce32a43028f9b8fcbf
                                                      • Instruction ID: 40c4e9da689373e911507368ccc02207d51b97c748157bb2a8a67f5cd97e8225
                                                      • Opcode Fuzzy Hash: 041e13b2c7ab05f3296744857569c8e1d38ea3c95a6f40ce32a43028f9b8fcbf
                                                      • Instruction Fuzzy Hash: 4021B2B1904B91AED761DF75C490BBBBEF9AB08300F04051EF099CBA41E730EA41CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(210DFF48,210DFF48,?,?,00000000,006EB621,000000FF), ref: 006A83FB
                                                        • Part of subcall function 006C8C81: EnterCriticalSection.KERNEL32(00706AF8,00000000,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26), ref: 006C8C8C
                                                        • Part of subcall function 006C8C81: LeaveCriticalSection.KERNEL32(00706AF8,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26,?,?,?,210DFF48), ref: 006C8CC9
                                                      • GetModuleHandleW.KERNEL32(kernel32,IsWow64Process), ref: 006A83C0
                                                      • GetProcAddress.KERNEL32(00000000), ref: 006A83C7
                                                        • Part of subcall function 006C8C37: EnterCriticalSection.KERNEL32(00706AF8,?,?,006A2627,0070771C,006EE130), ref: 006C8C41
                                                        • Part of subcall function 006C8C37: LeaveCriticalSection.KERNEL32(00706AF8,?,?,006A2627,0070771C,006EE130), ref: 006C8C74
                                                        • Part of subcall function 006C8C37: RtlWakeAllConditionVariable.NTDLL ref: 006C8CEB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$AddressConditionCurrentHandleModuleProcProcessVariableWake
                                                      • String ID: IsWow64Process$kernel32
                                                      • API String ID: 2056477612-3789238822
                                                      • Opcode ID: 0756e1cef0f7a55833b506829521e3fa0f3a02bef4787a86ca8ecfc369a97d98
                                                      • Instruction ID: 1fa6c00fc4bd0343a8dd1fa9012b1bf437926c98e1453927784ae00c5ffb14b7
                                                      • Opcode Fuzzy Hash: 0756e1cef0f7a55833b506829521e3fa0f3a02bef4787a86ca8ecfc369a97d98
                                                      • Instruction Fuzzy Hash: 4911AFB2D48748DFCB14DFA4EC45BA977E9F709B20F10436AE91197380EB396900CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B822C
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B8236
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B8287
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B82A7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: ip
                                                      • API String ID: 2854358121-734542
                                                      • Opcode ID: d987e38fccf0a3a4a7c7dcb4a74428d71b932e38413aebdbf3e670bb67550fa1
                                                      • Instruction ID: d7561d02a5796a35eb1475d9bcba0240306e20d3e657b5f1268010c587256883
                                                      • Opcode Fuzzy Hash: d987e38fccf0a3a4a7c7dcb4a74428d71b932e38413aebdbf3e670bb67550fa1
                                                      • Instruction Fuzzy Hash: BF01CBB59016188FCB40ABA4C856AFD77A6AF84720F14440CF810AB282CF349E40CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B8356
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B8360
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B83B1
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B83D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: ip
                                                      • API String ID: 2854358121-734542
                                                      • Opcode ID: 4093906bdee523d79ada879d78627f6776955a5b15cb4cced9bbd3cb0569de2a
                                                      • Instruction ID: b2dacb49922b0bb1580fec8808bf79ffa0eef74a2b464d7ca1f36a739fdf59d4
                                                      • Opcode Fuzzy Hash: 4093906bdee523d79ada879d78627f6776955a5b15cb4cced9bbd3cb0569de2a
                                                      • Instruction Fuzzy Hash: 8B01A1B59002199FCB04BFA4C855AFD77A7AF84B20F14451DF5116B282CF749E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B26B0
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B26BA
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B270B
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B272B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: lhp
                                                      • API String ID: 2854358121-1135442885
                                                      • Opcode ID: 7f7fb2896b8dbafc540ddac63692051b02df7331dc73d85c79ae2ab681cae5f4
                                                      • Instruction ID: a888836f7814fd5da5cb3f2fdfc0026ffcd7d6363f9abcd0256f1c8b7174d1bd
                                                      • Opcode Fuzzy Hash: 7f7fb2896b8dbafc540ddac63692051b02df7331dc73d85c79ae2ab681cae5f4
                                                      • Instruction Fuzzy Hash: 3401ADB590021A9BCB05FBA4C865AFDB7E6AF89720F14451DF8116B2C1CF34DE42CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B2745
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B274F
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B27A0
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B27C0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: php
                                                      • API String ID: 2854358121-1452351953
                                                      • Opcode ID: e590c860ab98f2c4ad9a3e8475cdfc10f128920f66a66b95ce6aa462edb70412
                                                      • Instruction ID: 6b42f8624ec04ebfd4cfab1563a14a38df19bc6ce9daaad4c50c9ed6999c6aa9
                                                      • Opcode Fuzzy Hash: e590c860ab98f2c4ad9a3e8475cdfc10f128920f66a66b95ce6aa462edb70412
                                                      • Instruction Fuzzy Hash: 87016DB590021A9FCB05FBA4C865AFE77A2AF84B20F14451DF8116B2D2DF349E418B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4AC1
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4ACB
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4B1C
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4B3C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: ljp
                                                      • API String ID: 2854358121-1905989959
                                                      • Opcode ID: 5c7ca35691d9b11bdc1e4bb1c92aeb18f6723c6d66e1ae94dc104fc50cb61b88
                                                      • Instruction ID: 5b4503b4f045ab4992716e72873af6c67d51123b71a03491d81efa894c6fe161
                                                      • Opcode Fuzzy Hash: 5c7ca35691d9b11bdc1e4bb1c92aeb18f6723c6d66e1ae94dc104fc50cb61b88
                                                      • Instruction Fuzzy Hash: ED01AD769006199FCB04FFA5C865BBEB762EF84720F14850DF811AB291DF349E018B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4B56
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4B60
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4BB1
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4BD1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: pjp
                                                      • API String ID: 2854358121-1688683347
                                                      • Opcode ID: b0c310182338d454ff9080ec6ef680226b94bd4810bd047db3f28b359f25473e
                                                      • Instruction ID: d781d1070c08eaebdf96b35c4c9f68a3d653570de381427d202e56589bdface5
                                                      • Opcode Fuzzy Hash: b0c310182338d454ff9080ec6ef680226b94bd4810bd047db3f28b359f25473e
                                                      • Instruction Fuzzy Hash: 77018B759006199BCB04FBA4C865BBD7763EF84720F24450CF812AB282DF349E018B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4D15
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4D1F
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4D70
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4D90
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID: |jp
                                                      • API String ID: 2854358121-1841150519
                                                      • Opcode ID: c2d83e27c85a6ab3a751dddedac003bc1f41289fc23a534632f0be5512464f69
                                                      • Instruction ID: 3831516bafe62c36dade3da5907ce027f3798a9ff7369d9f0023c251752293c6
                                                      • Opcode Fuzzy Hash: c2d83e27c85a6ab3a751dddedac003bc1f41289fc23a534632f0be5512464f69
                                                      • Instruction Fuzzy Hash: 7801A1769005159BCB04FFA4C865BBD7766EF84720F24850DF8126B2D1DF34AE01CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,210DFF48,?,?,00000000,006EE060,000000FF,?,006D9801,?,?,006D97D5,?), ref: 006D98A6
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 006D98B8
                                                      • FreeLibrary.KERNEL32(00000000,?,00000000,006EE060,000000FF,?,006D9801,?,?,006D97D5,?), ref: 006D98DA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: e1c602b5cc317da0319c5886aab9d2cc5f9502c9120570c2583c9912a9ea8d7d
                                                      • Instruction ID: c0cdbef10054cf97cd63c81516e3918a9ad000d540ecd55aafec6f091ccd682d
                                                      • Opcode Fuzzy Hash: e1c602b5cc317da0319c5886aab9d2cc5f9502c9120570c2583c9912a9ea8d7d
                                                      • Instruction Fuzzy Hash: B601F231900669EFCB018F50CC45BEEBBBAFB05B11F000936F811E2390CB759900CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006BE921
                                                      • collate.LIBCPMT ref: 006BEA9C
                                                      • numpunct.LIBCPMT ref: 006BED16
                                                        • Part of subcall function 006B8776: __EH_prolog3.LIBCMT ref: 006B877D
                                                        • Part of subcall function 006B850E: __EH_prolog3.LIBCMT ref: 006B8515
                                                        • Part of subcall function 006B850E: std::_Lockit::_Lockit.LIBCPMT ref: 006B851F
                                                        • Part of subcall function 006B850E: std::_Lockit::~_Lockit.LIBCPMT ref: 006B8590
                                                        • Part of subcall function 006AEA90: std::_Lockit::_Lockit.LIBCPMT ref: 006AEABD
                                                        • Part of subcall function 006AEA90: std::_Lockit::_Lockit.LIBCPMT ref: 006AEAE0
                                                        • Part of subcall function 006AEA90: std::_Lockit::~_Lockit.LIBCPMT ref: 006AEB08
                                                        • Part of subcall function 006AEA90: std::_Lockit::~_Lockit.LIBCPMT ref: 006AEBA7
                                                        • Part of subcall function 006B454B: Concurrency::cancel_current_task.LIBCPMT ref: 006B460E
                                                        • Part of subcall function 006B79FF: __EH_prolog3.LIBCMT ref: 006B7A06
                                                        • Part of subcall function 006B79FF: std::_Lockit::_Lockit.LIBCPMT ref: 006B7A10
                                                        • Part of subcall function 006B79FF: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7A81
                                                      • __Getcoll.LIBCPMT ref: 006BEADC
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                        • Part of subcall function 006A8440: LocalAlloc.KERNEL32(00000040,00000000,006C97AD,00000000,210DFF48,?,00000000,?,00000000,?,006EE009,000000FF,?,006A17D5,00000000,006EF3BA), ref: 006A8446
                                                        • Part of subcall function 006AB980: __Getctype.LIBCPMT ref: 006AB98B
                                                        • Part of subcall function 006B7E12: __EH_prolog3.LIBCMT ref: 006B7E19
                                                        • Part of subcall function 006B7E12: std::_Lockit::_Lockit.LIBCPMT ref: 006B7E23
                                                        • Part of subcall function 006B7E12: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7E94
                                                        • Part of subcall function 006B7F3C: __EH_prolog3.LIBCMT ref: 006B7F43
                                                        • Part of subcall function 006B7F3C: std::_Lockit::_Lockit.LIBCPMT ref: 006B7F4D
                                                        • Part of subcall function 006B7F3C: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7FBE
                                                        • Part of subcall function 006B8190: __EH_prolog3.LIBCMT ref: 006B8197
                                                        • Part of subcall function 006B8190: std::_Lockit::_Lockit.LIBCPMT ref: 006B81A1
                                                        • Part of subcall function 006B8190: std::_Lockit::~_Lockit.LIBCPMT ref: 006B8212
                                                        • Part of subcall function 006B80FB: __EH_prolog3.LIBCMT ref: 006B8102
                                                        • Part of subcall function 006B80FB: std::_Lockit::_Lockit.LIBCPMT ref: 006B810C
                                                        • Part of subcall function 006B80FB: std::_Lockit::~_Lockit.LIBCPMT ref: 006B817D
                                                        • Part of subcall function 006B454B: __EH_prolog3.LIBCMT ref: 006B4552
                                                        • Part of subcall function 006B454B: std::_Lockit::_Lockit.LIBCPMT ref: 006B455C
                                                        • Part of subcall function 006B454B: std::_Lockit::~_Lockit.LIBCPMT ref: 006B4603
                                                      • codecvt.LIBCPMT ref: 006BEDC7
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3$AllocConcurrency::cancel_current_taskGetcollGetctypeLocalcodecvtcollatenumpunct
                                                      • String ID:
                                                      • API String ID: 2252558201-0
                                                      • Opcode ID: 4f45487344a3fd8b0b3194c9213bb1b95a14191857a15b8324ed114042c9d047
                                                      • Instruction ID: cb80fb68d7fd9f058f0fd58d197bca9eceb5daffb6fc5576cad41c23a5b6cb97
                                                      • Opcode Fuzzy Hash: 4f45487344a3fd8b0b3194c9213bb1b95a14191857a15b8324ed114042c9d047
                                                      • Instruction Fuzzy Hash: EFE1A2B180061AAFDBA17F648C029FF7AA7EF41360F14452DF9556B382DF328D908B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __alloca_probe_16.LIBCMT ref: 006DD819
                                                      • __alloca_probe_16.LIBCMT ref: 006DD8DA
                                                      • __freea.LIBCMT ref: 006DD941
                                                        • Part of subcall function 006DC537: HeapAlloc.KERNEL32(00000000,?,?,?,006DBEBA,?,00000000,?,006CD692,?,?,?,?,?,?,006A1668), ref: 006DC569
                                                      • __freea.LIBCMT ref: 006DD956
                                                      • __freea.LIBCMT ref: 006DD966
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: __freea$__alloca_probe_16$AllocHeap
                                                      • String ID:
                                                      • API String ID: 1096550386-0
                                                      • Opcode ID: 5c80b37d2cd75c8ee31fd31d9a507644680b7abc8238acecea94ba2a8745617f
                                                      • Instruction ID: 69dcd8ee55cba395e4efd03de51d978273a6b221a16de6588d71104439a93d0f
                                                      • Opcode Fuzzy Hash: 5c80b37d2cd75c8ee31fd31d9a507644680b7abc8238acecea94ba2a8745617f
                                                      • Instruction Fuzzy Hash: 88519172E00206AFEB25AE64CC91EFF36ABEB45750B15412EFD04EB341EA31DC1197A4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,80000022,?,?,?,00000000,?,00000000,?,?), ref: 006A4A95
                                                      • LocalAlloc.KERNEL32(00000040,7FFFFFFF,?,?,?,00000000,?,00000000,?,?), ref: 006A4AB5
                                                      • LocalFree.KERNEL32(7FFFFFFE,?,?,00000000,?,00000000,?,?), ref: 006A4B3B
                                                      • LocalFree.KERNEL32(00000000,210DFF48,00000000,00000000,Function_0004A6C0,000000FF,?,?,00000000,?,00000000,?,?), ref: 006A4BBD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Local$AllocFree
                                                      • String ID: /Bj
                                                      • API String ID: 2012307162-2742582542
                                                      • Opcode ID: f5f7058cbe49cb976d2f6badd7bf54a1a84ff0c843e112294008fa615b948f51
                                                      • Instruction ID: 31c938dc5a68e2a3e4e49c795650af65b30123bc63d958693f78fade7eb4f3c1
                                                      • Opcode Fuzzy Hash: f5f7058cbe49cb976d2f6badd7bf54a1a84ff0c843e112294008fa615b948f51
                                                      • Instruction Fuzzy Hash: 0751D5726042159FC714EF28DC80BABB7EAEB89364F14066EF516D7390DB70DD018B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AC55D
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AC580
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AC5A8
                                                      • std::_Facet_Register.LIBCPMT ref: 006AC61D
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AC647
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                      • String ID:
                                                      • API String ID: 459529453-0
                                                      • Opcode ID: 036146cbd6b490bfe6b2c4d5ddbc56d7d40306210877f11087ac46a78b155943
                                                      • Instruction ID: 9b11f0989e8cd45ff007832558a4308c5745d4932f4c78e3024be109b25737b9
                                                      • Opcode Fuzzy Hash: 036146cbd6b490bfe6b2c4d5ddbc56d7d40306210877f11087ac46a78b155943
                                                      • Instruction Fuzzy Hash: 7541A971C00259DFDB11EF58D940BAEBBA5EF05320F148259E815AB391DB34AE40CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AEABD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AEAE0
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AEB08
                                                      • std::_Facet_Register.LIBCPMT ref: 006AEB7D
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AEBA7
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                      • String ID:
                                                      • API String ID: 459529453-0
                                                      • Opcode ID: 81d62b0ca9b4a2b41c79595d19cad9cdfdf0471fae5ebca275ee23e61ee0e4ec
                                                      • Instruction ID: 96de39b0fe63b58dcdfef72d7b6ca1492d5efbc197ccd6c3e864ad7b7e3c4dec
                                                      • Opcode Fuzzy Hash: 81d62b0ca9b4a2b41c79595d19cad9cdfdf0471fae5ebca275ee23e61ee0e4ec
                                                      • Instruction Fuzzy Hash: EC41E071900219DFCB10DF94CA44BEEBBB5FB05720F148259E81667391DB35AE40CFA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AEBFD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AEC20
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AEC48
                                                      • std::_Facet_Register.LIBCPMT ref: 006AECBD
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AECE7
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                      • String ID:
                                                      • API String ID: 459529453-0
                                                      • Opcode ID: 075fdcb7738ba7c1f6ca366746ad29e58affecb76f3d765936a1862c0f6fbfe7
                                                      • Instruction ID: 727cad9f3ff51c5fc54a80d9c8ade13146806e8b42e1e3b8bcc852c15b0bd9bf
                                                      • Opcode Fuzzy Hash: 075fdcb7738ba7c1f6ca366746ad29e58affecb76f3d765936a1862c0f6fbfe7
                                                      • Instruction Fuzzy Hash: A241CE71800215DFCB10EF98D840BAEBBB5FB05720F158659E82267391DB35AE44CFD5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AED3D
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AED60
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AED88
                                                      • std::_Facet_Register.LIBCPMT ref: 006AEDFD
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006AEE27
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                      • String ID:
                                                      • API String ID: 459529453-0
                                                      • Opcode ID: c61d04669f4791da25df9f5652ba2773898038e27db78b1cfc1cdb630f305f85
                                                      • Instruction ID: c23938a1673abe40af0a15bda23b68798f60ee0538716b34aebbdfb58580bf5d
                                                      • Opcode Fuzzy Hash: c61d04669f4791da25df9f5652ba2773898038e27db78b1cfc1cdb630f305f85
                                                      • Instruction Fuzzy Hash: 4B419D71800219DFCB11EF98C8407AEBBB6FB05720F248669E814A7391DB35AE40CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(00000010,00000010,?,006A7882,?,?), ref: 006A7BB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: Call to ShellExecuteEx() returned:$Last error=$false$true
                                                      • API String ID: 1452528299-1782174991
                                                      • Opcode ID: d68ebf16ca3ed6cfcea04e3efa7da11d872028099907a3846984d73a3925616d
                                                      • Instruction ID: 2f9bf1cf08d10e9aac0b0820cad7bf3b9bcb977307780b83b43e1213ae65a3a3
                                                      • Opcode Fuzzy Hash: d68ebf16ca3ed6cfcea04e3efa7da11d872028099907a3846984d73a3925616d
                                                      • Instruction Fuzzy Hash: 29216D49A202628ACB702F3C88003B5A6F2EF55758F65187FDDC9D7390E6798CC2C794
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Maklocstr$Maklocchr
                                                      • String ID:
                                                      • API String ID: 2020259771-0
                                                      • Opcode ID: fb97b997aed1d2e33844298a9b62f440629be402d92849dc49c50d5db2492ead
                                                      • Instruction ID: ac54aab1d6397c275eeaa0ecdc783dbf6edb5d47cd174bbab3de9e650f312a33
                                                      • Opcode Fuzzy Hash: fb97b997aed1d2e33844298a9b62f440629be402d92849dc49c50d5db2492ead
                                                      • Instruction Fuzzy Hash: 1D119EF25487847FEB20DBA58881F96B7EDAF88314F04051AF645CBA41D674F99087A8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B806D
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B8077
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • moneypunct.LIBCPMT ref: 006B80B1
                                                      • std::_Facet_Register.LIBCPMT ref: 006B80C8
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B80E8
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 704c628bcd7af7656fe8f1f61e915615ccf6e0979f2fd5bb007efc294b6f51d2
                                                      • Instruction ID: 89a2fe5f501d9eceece73c775311ec7e73e0fa1a456ef67a5decadbb7e052a13
                                                      • Opcode Fuzzy Hash: 704c628bcd7af7656fe8f1f61e915615ccf6e0979f2fd5bb007efc294b6f51d2
                                                      • Instruction Fuzzy Hash: 68018BB6900219DFCB05FBA4C859AEE7766AF84720F14850CE9116B2D2CF349E45CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B8102
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B810C
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • moneypunct.LIBCPMT ref: 006B8146
                                                      • std::_Facet_Register.LIBCPMT ref: 006B815D
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B817D
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 9db7482167f83b8450c79a64e9df12dc5d68103977ba2c667cb71c2c8581a25d
                                                      • Instruction ID: afffd2318408d09ec77f0328106132b7ef3c611d349f7536be873eea15d8c9f1
                                                      • Opcode Fuzzy Hash: 9db7482167f83b8450c79a64e9df12dc5d68103977ba2c667cb71c2c8581a25d
                                                      • Instruction Fuzzy Hash: 4F01A1B5901516DFCB05BBA8C855AFD7BA7AF84720F14450DF4116B282CF349E42CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B8197
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B81A1
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • moneypunct.LIBCPMT ref: 006B81DB
                                                      • std::_Facet_Register.LIBCPMT ref: 006B81F2
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B8212
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 20540a7a58ee77cd584b16d6690856304ed57d82a8c0f044eb0b6702fb731f31
                                                      • Instruction ID: a0f14ae680d481c91af13e91e82e4bcdc488ce5b8ae9dc0b6d7f7374e20b8be9
                                                      • Opcode Fuzzy Hash: 20540a7a58ee77cd584b16d6690856304ed57d82a8c0f044eb0b6702fb731f31
                                                      • Instruction Fuzzy Hash: 6B01CBB19006199FCB04BBA4C825AFE7BA7AF84720F24410CE9116B2C2CF349E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7971
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B797B
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • codecvt.LIBCPMT ref: 006B79B5
                                                      • std::_Facet_Register.LIBCPMT ref: 006B79CC
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B79EC
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                      • String ID:
                                                      • API String ID: 712880209-0
                                                      • Opcode ID: 7413549d09819834ef62fa594dd0fcf4ee17ad357753ec9e0b5cc7be5da7a771
                                                      • Instruction ID: ab638b91c7e36c82e1686b79b9d443c16e43b475da4bfb747bcd3979b210cbaf
                                                      • Opcode Fuzzy Hash: 7413549d09819834ef62fa594dd0fcf4ee17ad357753ec9e0b5cc7be5da7a771
                                                      • Instruction Fuzzy Hash: DC01ADB59002199BCB04BBA4C856AFD7B67AF84720F24450DF811AB2C2CF349E81CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7A06
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7A10
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • codecvt.LIBCPMT ref: 006B7A4A
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7A61
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7A81
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercodecvt
                                                      • String ID:
                                                      • API String ID: 712880209-0
                                                      • Opcode ID: 54a18981ceb78dbaad10c28b846433befd61a9708021e5c857cd59f45de2bca5
                                                      • Instruction ID: 257bc5b0320b4ac3547d9688a7bd878206830b54116dbf916a544d7c50a9e2e6
                                                      • Opcode Fuzzy Hash: 54a18981ceb78dbaad10c28b846433befd61a9708021e5c857cd59f45de2bca5
                                                      • Instruction Fuzzy Hash: CF01E1B69041198FCB40FBA4C815AFD7B63AF84720F24440CF8116B2C1DF749E40CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7B30
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7B3A
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • collate.LIBCPMT ref: 006B7B74
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7B8B
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7BAB
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registercollate
                                                      • String ID:
                                                      • API String ID: 1007100420-0
                                                      • Opcode ID: f727170cb318fe2a20e7f976ce24b032f2719b80d6672616c2ad9441f4aa522c
                                                      • Instruction ID: 108f1ac9d785f83ecfc9eeb0f3167ba593ff3bb9c3d6d30fbb30432d6f29ee64
                                                      • Opcode Fuzzy Hash: f727170cb318fe2a20e7f976ce24b032f2719b80d6672616c2ad9441f4aa522c
                                                      • Instruction Fuzzy Hash: 9B018BB59002199BCB05FFA4C855AFDB7A2AF84720F14450CE9117B3C2CF349E418B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7BC5
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7BCF
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • ctype.LIBCPMT ref: 006B7C09
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7C20
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7C40
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registerctype
                                                      • String ID:
                                                      • API String ID: 83828444-0
                                                      • Opcode ID: e4365524ec79a2bd9c7fe3b3e4c423a6bf3708befb94e33f4e61f11dcba86988
                                                      • Instruction ID: b57e49b8f41c6fb802d51cf355a9055bad55b31cbd5bde139a4a0232fcf38b8b
                                                      • Opcode Fuzzy Hash: e4365524ec79a2bd9c7fe3b3e4c423a6bf3708befb94e33f4e61f11dcba86988
                                                      • Instruction Fuzzy Hash: 2C01ADB59002199FCB05BBA4C855AFD7BA2AF84720F15450CF9116B3D1CF349E419B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7C5A
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7C64
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • messages.LIBCPMT ref: 006B7C9E
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7CB5
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7CD5
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                      • String ID:
                                                      • API String ID: 2750803064-0
                                                      • Opcode ID: 67d049e5475519214afc0a8cc1631a509c2b24c7da8f73195492e2d4e4a1d23f
                                                      • Instruction ID: c7a7b742298e0178aa179034ecf94205bb47981b85255fb90ccc453d5af37a9a
                                                      • Opcode Fuzzy Hash: 67d049e5475519214afc0a8cc1631a509c2b24c7da8f73195492e2d4e4a1d23f
                                                      • Instruction Fuzzy Hash: 9701ADB59002199FCB05BFA4C855AFD7BA6EF84720F25450CF9116B382CF749E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7CEF
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7CF9
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • messages.LIBCPMT ref: 006B7D33
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7D4A
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7D6A
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermessages
                                                      • String ID:
                                                      • API String ID: 2750803064-0
                                                      • Opcode ID: 5f1fd95bdc000552c724f5ed8a3cc98ad143d6fe9c7a801f64c6aa0ce1d62059
                                                      • Instruction ID: 0a12270b4ffa3c649086bdfa530521dac8cf9eead786f2188aa8f2b5b3b9fb92
                                                      • Opcode Fuzzy Hash: 5f1fd95bdc000552c724f5ed8a3cc98ad143d6fe9c7a801f64c6aa0ce1d62059
                                                      • Instruction Fuzzy Hash: C601ADB59002199BCB05FBA4C855AFD7BA2AF84720F14450CF8116B3D2CF349E41CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7FD8
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7FE2
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • moneypunct.LIBCPMT ref: 006B801C
                                                      • std::_Facet_Register.LIBCPMT ref: 006B8033
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B8053
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Registermoneypunct
                                                      • String ID:
                                                      • API String ID: 419941038-0
                                                      • Opcode ID: 0805380fccd47bd7dd0e5da4f399e21d8e7d4d4021d975feb08f224d4e9091e2
                                                      • Instruction ID: 4867bbb748cf5d55c692b7706ed2f5f7fa9ee80c59f05c7aea7abebf5471b7f7
                                                      • Opcode Fuzzy Hash: 0805380fccd47bd7dd0e5da4f399e21d8e7d4d4021d975feb08f224d4e9091e2
                                                      • Instruction Fuzzy Hash: E9018EB59006199FCB04FBA4C855AFE77A6AF84720F14450CF9116B381CF389E45CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(00706AF8,?,?,006A2627,0070771C,006EE130), ref: 006C8C41
                                                      • LeaveCriticalSection.KERNEL32(00706AF8,?,?,006A2627,0070771C,006EE130), ref: 006C8C74
                                                      • RtlWakeAllConditionVariable.NTDLL ref: 006C8CEB
                                                      • SetEvent.KERNEL32(?,006A2627,0070771C,006EE130), ref: 006C8CF5
                                                      • ResetEvent.KERNEL32(?,006A2627,0070771C,006EE130), ref: 006C8D01
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CriticalEventSection$ConditionEnterLeaveResetVariableWake
                                                      • String ID:
                                                      • API String ID: 3916383385-0
                                                      • Opcode ID: ef8db41a76dbb17fd2fe49e50a6524ac7fdb769ab15199e7d90c3d16edcf3777
                                                      • Instruction ID: 5583374882af85fccaef6ae31a1e7b368196e0270a33d9dd9c5ba274d6fe1ab6
                                                      • Opcode Fuzzy Hash: ef8db41a76dbb17fd2fe49e50a6524ac7fdb769ab15199e7d90c3d16edcf3777
                                                      • Instruction Fuzzy Hash: C8016DB1A01650DFC714AF68FD68A9A37A6FB09301705C17AF8019B321CF781810CFE9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?,00000105), ref: 006A6074
                                                      • GetLastError.KERNEL32 ref: 006A6110
                                                        • Part of subcall function 006A1FC0: FindResourceW.KERNEL32(00000000,?,00000006,?,00000000,006EA78D,000000FF,?,80070057,?,?,00000000,00000010,006A1B09,?), ref: 006A2040
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000000,00000009,006FD2DC,00000001,00000000), ref: 006A60CE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: DirectoryErrorFindLastLibraryLoadResourceSystem
                                                      • String ID: ntdll.dll
                                                      • API String ID: 4113295189-2227199552
                                                      • Opcode ID: a9bd3b58e926dfa8b006853e1c8a486feaf66efe3224f599891af2e81f4fe5ea
                                                      • Instruction ID: 5d8fffa7af6e6fecfa6e188c86b32a474e30cc73d92f2e9eb6703d541d0bd7c2
                                                      • Opcode Fuzzy Hash: a9bd3b58e926dfa8b006853e1c8a486feaf66efe3224f599891af2e81f4fe5ea
                                                      • Instruction Fuzzy Hash: 1D319F716006499BDB20EF68CD44BAEBBF6BF45B10F14862DF525D72C1EB70AA048F50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Mpunct$H_prolog3
                                                      • String ID: $+xv
                                                      • API String ID: 4281374311-1686923651
                                                      • Opcode ID: 26f4c79b4b7a87eddde655ac6200d9820285c226dcb48129922aab3971dccd1d
                                                      • Instruction ID: 6ae9372ff89bcdde0033bbe6948a34eb1f36e1518828cb6744e7d0ba8044659b
                                                      • Opcode Fuzzy Hash: 26f4c79b4b7a87eddde655ac6200d9820285c226dcb48129922aab3971dccd1d
                                                      • Instruction Fuzzy Hash: C421A3B1904A926EDB61DF75C890B7B7EE9AB08301F04051EF099C7E42D730EA01CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006BDDFC
                                                        • Part of subcall function 006B7372: _Maklocstr.LIBCPMT ref: 006B7392
                                                        • Part of subcall function 006B7372: _Maklocstr.LIBCPMT ref: 006B73AF
                                                        • Part of subcall function 006B7372: _Maklocstr.LIBCPMT ref: 006B73CC
                                                        • Part of subcall function 006B7372: _Maklocchr.LIBCPMT ref: 006B73DE
                                                        • Part of subcall function 006B7372: _Maklocchr.LIBCPMT ref: 006B73F1
                                                      • _Mpunct.LIBCPMT ref: 006BDE89
                                                      • _Mpunct.LIBCPMT ref: 006BDEA3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Maklocstr$MaklocchrMpunct$H_prolog3
                                                      • String ID: $+xv
                                                      • API String ID: 2939335142-1686923651
                                                      • Opcode ID: fc199fee2d7fb82e26b760a1e6efc458ab1c587c67bc290e10cb6222d8c264f0
                                                      • Instruction ID: cbb602c4fa249b06e670c72bfe9c2378fc541b38395bddc3b8d5d57efacaa6fb
                                                      • Opcode Fuzzy Hash: fc199fee2d7fb82e26b760a1e6efc458ab1c587c67bc290e10cb6222d8c264f0
                                                      • Instruction Fuzzy Hash: C021C7F1904B516ED765DF748480BBB7EF9AB0C700F04051EE499CBA41E730EA42CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,006CD3D3,00000000,?,00706EA4,?,?,?,006CD576,00000004,InitializeCriticalSectionEx,006F192C,InitializeCriticalSectionEx), ref: 006CD42F
                                                      • GetLastError.KERNEL32(?,006CD3D3,00000000,?,00706EA4,?,?,?,006CD576,00000004,InitializeCriticalSectionEx,006F192C,InitializeCriticalSectionEx,00000000,?,006CD32D), ref: 006CD439
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 006CD461
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID: api-ms-
                                                      • API String ID: 3177248105-2084034818
                                                      • Opcode ID: ef25fd43f1fccbd264e1d1be444f2c5c1ea1a95f4ff7fa5a71b308057aa8e801
                                                      • Instruction ID: 6ca0a52d3eb1c71ad98cd18d43833bbc7b693d449f8d0305b897a764d716a592
                                                      • Opcode Fuzzy Hash: ef25fd43f1fccbd264e1d1be444f2c5c1ea1a95f4ff7fa5a71b308057aa8e801
                                                      • Instruction Fuzzy Hash: 88E01A30680348B7EB201B61EC46FAC3B97AB01B91F208035FA0DEC1A1D7B2A9519684
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: FreeLocal_strcspn
                                                      • String ID:
                                                      • API String ID: 2585785616-0
                                                      • Opcode ID: 6a5dbd8f83a51d6b1b7ebfa72ea3e4214a9da82819d9d192f41752eb61c930e9
                                                      • Instruction ID: 40f27bad40203b09f368572040e2167363e204b481beb03de216f126755109b6
                                                      • Opcode Fuzzy Hash: 6a5dbd8f83a51d6b1b7ebfa72ea3e4214a9da82819d9d192f41752eb61c930e9
                                                      • Instruction Fuzzy Hash: 6CF14675A002499FDF14EFA8C884AEEBBF6EF49304F144169E415AB351D732AE45CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetConsoleOutputCP.KERNEL32(210DFF48,?,00000000,?), ref: 006E87EE
                                                        • Part of subcall function 006E143B: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,-00000008,00000000,?,006DD937,?,00000000,-00000008), ref: 006E14E7
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 006E8A49
                                                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 006E8A91
                                                      • GetLastError.KERNEL32 ref: 006E8B34
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                      • String ID:
                                                      • API String ID: 2112829910-0
                                                      • Opcode ID: 53137729805adb563567fa45afce43fe816790b2a0594b41729648faac010409
                                                      • Instruction ID: 463228d9764dbca28824a486f8684ae388adcc24959c1ab2d08072e2fd40eb56
                                                      • Opcode Fuzzy Hash: 53137729805adb563567fa45afce43fe816790b2a0594b41729648faac010409
                                                      • Instruction Fuzzy Hash: 1DD15AB5D052889FCB15CFE9C8909EDBBB6FF08300F18416AE859EB351DB30A942CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _strcspn$H_prolog3_ctype
                                                      • String ID:
                                                      • API String ID: 838279627-0
                                                      • Opcode ID: 8aa27dc2e498fd8465c0a0f58dece0b9be822e9379cd672a9db62c0ea900bd4d
                                                      • Instruction ID: f061ad3a1d33960498617d61fe9c57b24bd290dfcce207df0e61b50c43883e05
                                                      • Opcode Fuzzy Hash: 8aa27dc2e498fd8465c0a0f58dece0b9be822e9379cd672a9db62c0ea900bd4d
                                                      • Instruction Fuzzy Hash: 19C16DB1D00209DFDF15DF94C981AEEBBBAFF48310F14405AE905AB251DB34AE86CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _strcspn$H_prolog3_ctype
                                                      • String ID:
                                                      • API String ID: 838279627-0
                                                      • Opcode ID: d137f2fb6f1263653d6735500e07b8b862efbd09c5ce688e12d62cd40c9edcdf
                                                      • Instruction ID: 60ed8beb46d00e4de8f912ca046b63dfb9f12e940484f3347d2dbd4b6a766254
                                                      • Opcode Fuzzy Hash: d137f2fb6f1263653d6735500e07b8b862efbd09c5ce688e12d62cd40c9edcdf
                                                      • Instruction Fuzzy Hash: 5AC16DB1D0020A9FDF55DF98C9919EEBBFAFF08310F144059E805A7251D734AE85CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: AdjustPointer
                                                      • String ID:
                                                      • API String ID: 1740715915-0
                                                      • Opcode ID: b94f5710b794b22872f3e912c16d0cd9a72507d297b6a55ee77f9632c739a7e5
                                                      • Instruction ID: 8ce92b7b523b93d74c70b7fbb06ec9a529b14075ad8be4f68f939bd367c7233e
                                                      • Opcode Fuzzy Hash: b94f5710b794b22872f3e912c16d0cd9a72507d297b6a55ee77f9632c739a7e5
                                                      • Instruction Fuzzy Hash: CD511572600206DFDB298F94C895FBA73E7EF44324F54812DE80A87291D731EC91CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c40504b2621e4f4c3a6294113eb2c9f8f29dd24856aac60a155ce11ec9f0f1e0
                                                      • Instruction ID: 9dacef62f9ba6c1cf5e431b65b4f7bf2401dd1a5e6323ee2b38cc75a01eb7c4c
                                                      • Opcode Fuzzy Hash: c40504b2621e4f4c3a6294113eb2c9f8f29dd24856aac60a155ce11ec9f0f1e0
                                                      • Instruction Fuzzy Hash: 57216A31A08209AFDB61AF65DC89DAA77ABEF443A4710852EF915D7350EF30ED41C7A0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,00000000,75475490,006A8ABA,00000000,?,?,?,?,?,?,?,00000000,006EB685,000000FF), ref: 006A8FA7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast
                                                      • String ID: > returned:$Call to ShellExecute() for verb<$Last error=
                                                      • API String ID: 1452528299-1781106413
                                                      • Opcode ID: 68096fb1de10c777883ee33e3a5b55c83ef38745614cc6be3b0208856daea2b2
                                                      • Instruction ID: 774c230a07c626715c74b3c86829c82a630d1c5117cb57d55a6f13115fa5126a
                                                      • Opcode Fuzzy Hash: 68096fb1de10c777883ee33e3a5b55c83ef38745614cc6be3b0208856daea2b2
                                                      • Instruction Fuzzy Hash: 1A219209A1026286CB702F3C8400375A6F3EF55758F25042FD9C8D7390FA658C81C7A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B4552
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B455C
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B4603
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 006B460E
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Concurrency::cancel_current_taskH_prolog3Lockit::_Lockit::~_
                                                      • String ID:
                                                      • API String ID: 4244582100-0
                                                      • Opcode ID: 6bee0407c7c7ecb91dafb4dc0d54701132d0f73787a168e2b00ad0796ac9b957
                                                      • Instruction ID: a503d97665511919ec0c24070106739ba2fd909f45e6db65c9735c6af12ac80b
                                                      • Opcode Fuzzy Hash: 6bee0407c7c7ecb91dafb4dc0d54701132d0f73787a168e2b00ad0796ac9b957
                                                      • Instruction Fuzzy Hash: 2F216975A00A16AFDB14EF14C8A1AADB762FF49710F018459E9169F7A1CF30EE90CF84
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000004,00000080,00000000,210DFF48), ref: 006B13DC
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 006B13FC
                                                      • WriteFile.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 006B142D
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000000,?,40000000,00000001,00000000,00000004,00000080,00000000), ref: 006B1446
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandlePointerWrite
                                                      • String ID:
                                                      • API String ID: 3604237281-0
                                                      • Opcode ID: 6e1ac46d60b06d9b1fe9d3e57efbbb708fd1b0850a71142801e088d536bd9dd9
                                                      • Instruction ID: 195cf72f90cbae13e606895beb42c19d4f3c0c6d20b19bff1ff0631f4a9234f3
                                                      • Opcode Fuzzy Hash: 6e1ac46d60b06d9b1fe9d3e57efbbb708fd1b0850a71142801e088d536bd9dd9
                                                      • Instruction Fuzzy Hash: 9D218170941358ABD720DF54DC46FEABBF9EB05B24F10422AF610AB2C0D7B46A458B94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006C8C81: EnterCriticalSection.KERNEL32(00706AF8,00000000,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26), ref: 006C8C8C
                                                        • Part of subcall function 006C8C81: LeaveCriticalSection.KERNEL32(00706AF8,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26,?,?,?,210DFF48), ref: 006C8CC9
                                                      • GetProcessHeap.KERNEL32 ref: 006A2565
                                                        • Part of subcall function 006C8C37: EnterCriticalSection.KERNEL32(00706AF8,?,?,006A2627,0070771C,006EE130), ref: 006C8C41
                                                        • Part of subcall function 006C8C37: LeaveCriticalSection.KERNEL32(00706AF8,?,?,006A2627,0070771C,006EE130), ref: 006C8C74
                                                        • Part of subcall function 006C8C37: RtlWakeAllConditionVariable.NTDLL ref: 006C8CEB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$ConditionHeapProcessVariableWake
                                                      • String ID: wp$ wp$<wp
                                                      • API String ID: 325507722-1711493401
                                                      • Opcode ID: c053c9e5890ed776adeb3069ef95de70bf69581f461d32702bed41a66bcd21a2
                                                      • Instruction ID: 2928865b4cd2af0cf967ce4d91c2bbd8cdc69d95106bfaa35f5795d39607c4e3
                                                      • Opcode Fuzzy Hash: c053c9e5890ed776adeb3069ef95de70bf69581f461d32702bed41a66bcd21a2
                                                      • Instruction Fuzzy Hash: E02159B0C49340DFC718DFA8EC45B9977E2E7053A0F10A769E421973D0DBB96900CBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B82C1
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B82CB
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B831C
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B833C
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 15c26b392c0a54b40162bce6a13ef034a5b0db3c3fbeac1b230121996c041bf9
                                                      • Instruction ID: 6fdf73ae3e95eb69a8f2e4340d55c19b4012103c979c90ff3462d10632b7f822
                                                      • Opcode Fuzzy Hash: 15c26b392c0a54b40162bce6a13ef034a5b0db3c3fbeac1b230121996c041bf9
                                                      • Instruction Fuzzy Hash: 41018EB6900155DFCB05BFA4C855AFD77A6AF85720F14850DE811AB292CF349E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B8480
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B848A
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B84DB
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B84FB
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 178b9804940c4152d8df02d9351add8b3ae07857c5c50b70c6ffea7de26f0da7
                                                      • Instruction ID: 36b3a007ad40981325dfc39e1ef4ef6ed06361c381cdec086226e5e0f840cc1d
                                                      • Opcode Fuzzy Hash: 178b9804940c4152d8df02d9351add8b3ae07857c5c50b70c6ffea7de26f0da7
                                                      • Instruction Fuzzy Hash: 9B01A1B59002559FCB04FBA4C855AFD77A7AF85720F14451CF9116B391CF389E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B8515
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B851F
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B8570
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B8590
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 56775c02c822d4727857342c71b947092342c76f1730ba29ed22a32f35a039e0
                                                      • Instruction ID: 77a2530450da08c8b6be7cc7f19d332b6ee3a2429653116282334d17a2947182
                                                      • Opcode Fuzzy Hash: 56775c02c822d4727857342c71b947092342c76f1730ba29ed22a32f35a039e0
                                                      • Instruction Fuzzy Hash: 1501E1B29106199FCB40BFA4C855AFD7BA7AF84720F14451DF5116B382CF349E40CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B85AA
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B85B4
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B8605
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B8625
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: c161493f0b094174ed1001f02d0ee214b1c6993c08c97a0c0bcf632a333cd34e
                                                      • Instruction ID: e085025e3721af6170ad43519725d395f5f11c49f9d5fbfc6dd9db7bd6568587
                                                      • Opcode Fuzzy Hash: c161493f0b094174ed1001f02d0ee214b1c6993c08c97a0c0bcf632a333cd34e
                                                      • Instruction Fuzzy Hash: 26018EB69002159FCB44FBA4C865AEDB766AF84720F14850DE811AB381DF389E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7D84
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7D8E
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7DDF
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7DFF
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 9a067ea8c17b17164c13027b1e512362ff80e298dda4b582dff744397fe22551
                                                      • Instruction ID: 4ac2ce997acad46bdea22cd0f8ce980d8eeb7fee05e19ef466be437d2e7cb83d
                                                      • Opcode Fuzzy Hash: 9a067ea8c17b17164c13027b1e512362ff80e298dda4b582dff744397fe22551
                                                      • Instruction Fuzzy Hash: CA01ADB59002199BCB05BBA4C855AFE7BB2AF84720F24450DF9116B2D2CF789E418B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006C4DAA
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006C4DB4
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006C4E05
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006C4E25
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 2bf6e8f80e24216d4157c7533b555c693db4ac647e09c464411f7204e0dd018b
                                                      • Instruction ID: 2c14a1fb1376d2dd9d125359f3ae617272357ee7815b07b2bd6b782b8979dd11
                                                      • Opcode Fuzzy Hash: 2bf6e8f80e24216d4157c7533b555c693db4ac647e09c464411f7204e0dd018b
                                                      • Instruction Fuzzy Hash: BD01A1759002159FCB45FBA4C865BBE7762FF84720F15450DF9126B291CF349E01CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7E19
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7E23
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7E74
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7E94
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: b7d0c2d935d82c1b9d277af5785e58f1c04b719c10d890b7314028aba3d22830
                                                      • Instruction ID: 09362e40936e1b705982827aabf4ee8515520fc43985e26a409a832075a24f4f
                                                      • Opcode Fuzzy Hash: b7d0c2d935d82c1b9d277af5785e58f1c04b719c10d890b7314028aba3d22830
                                                      • Instruction Fuzzy Hash: 8A018EB69002199BCB04EBA4C855AED7762AF84720F14454CF8116B382CF349E418B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7EAE
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7EB8
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7F09
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7F29
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: d3a927ceb206576e0d254dd08171c05cd8cadb1498fa26c37631ed503e4fb1ee
                                                      • Instruction ID: b56218672479dccd49f16f575db30c5fd4a39a2ade0aa38573deb0e3d85e5259
                                                      • Opcode Fuzzy Hash: d3a927ceb206576e0d254dd08171c05cd8cadb1498fa26c37631ed503e4fb1ee
                                                      • Instruction Fuzzy Hash: AF01E1B29006199BCB00FBA0C855AFD7767AF84720F14450CF8126B2C1CF349E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B7F43
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B7F4D
                                                        • Part of subcall function 006ABC80: std::_Lockit::_Lockit.LIBCPMT ref: 006ABCB0
                                                        • Part of subcall function 006ABC80: std::_Lockit::~_Lockit.LIBCPMT ref: 006ABCD8
                                                      • std::_Facet_Register.LIBCPMT ref: 006B7F9E
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B7FBE
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_H_prolog3Register
                                                      • String ID:
                                                      • API String ID: 2854358121-0
                                                      • Opcode ID: 50e5f8bddac55035b34d6f364e2059030fd4523e72df92554227d29695e9a943
                                                      • Instruction ID: 95f225b0b05b851e8a2b9abfee1fd86be04607bb64c4fe52bcdf7132b84b6ce6
                                                      • Opcode Fuzzy Hash: 50e5f8bddac55035b34d6f364e2059030fd4523e72df92554227d29695e9a943
                                                      • Instruction Fuzzy Hash: FC01A1B69001159BCB04FBA4C855AFDB776AF84720F14450DF9116B3C2CF349E41CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 006B5FCD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006B5FD8
                                                      • std::_Lockit::~_Lockit.LIBCPMT ref: 006B6046
                                                        • Part of subcall function 006B6128: std::locale::_Locimp::_Locimp.LIBCPMT ref: 006B6140
                                                      • std::locale::_Setgloballocale.LIBCPMT ref: 006B5FF3
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                      • String ID:
                                                      • API String ID: 677527491-0
                                                      • Opcode ID: 418c1dbf3181695349ad18665ff1063d94a124cd5bea6e249027265d1ee5957c
                                                      • Instruction ID: ee95cafac21c04e39095361b1ea9fc0d66e0f2cf02b77a8cfbd1f68cddcf882c
                                                      • Opcode Fuzzy Hash: 418c1dbf3181695349ad18665ff1063d94a124cd5bea6e249027265d1ee5957c
                                                      • Instruction Fuzzy Hash: 6F01BCB5A002109BDB45FF64C855ABD7BA3FF85700B05800CF91157382CF78AE42CB89
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,?,006E9A43,?,00000001,?,?,?,006E8B88,?,?,00000000), ref: 006EA08D
                                                      • GetLastError.KERNEL32(?,006E9A43,?,00000001,?,?,?,006E8B88,?,?,00000000,?,?,?,006E910F,?), ref: 006EA099
                                                        • Part of subcall function 006EA05F: CloseHandle.KERNEL32(FFFFFFFE,006EA0A9,?,006E9A43,?,00000001,?,?,?,006E8B88,?,?,00000000,?,?), ref: 006EA06F
                                                      • ___initconout.LIBCMT ref: 006EA0A9
                                                        • Part of subcall function 006EA021: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,006EA050,006E9A30,?,?,006E8B88,?,?,00000000,?), ref: 006EA034
                                                      • WriteConsoleW.KERNEL32(?,?,00000000,00000000,?,006E9A43,?,00000001,?,?,?,006E8B88,?,?,00000000,?), ref: 006EA0BE
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                      • String ID:
                                                      • API String ID: 2744216297-0
                                                      • Opcode ID: 7200c633461d6366c2ef8e3e01330de8e445192415760f7d0b2e2b29374e8bb9
                                                      • Instruction ID: 88697d8112a143123abf5bca0c399b4e112d0d2be99ff3aa5d5e870b123398ca
                                                      • Opcode Fuzzy Hash: 7200c633461d6366c2ef8e3e01330de8e445192415760f7d0b2e2b29374e8bb9
                                                      • Instruction Fuzzy Hash: C6F01C36101699BBCF722FD2DC4898A3F67FF087B4F108120FA198A121DA329820DB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SleepConditionVariableCS.KERNELBASE(?,006C8CA6,00000064), ref: 006C8D2C
                                                      • LeaveCriticalSection.KERNEL32(00706AF8,?,?,006C8CA6,00000064,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26), ref: 006C8D36
                                                      • WaitForSingleObjectEx.KERNEL32(?,00000000,?,006C8CA6,00000064,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26), ref: 006C8D47
                                                      • EnterCriticalSection.KERNEL32(00706AF8,?,006C8CA6,00000064,?,?,006A25B6,0070771C,210DFF48,?,00000000,006EA7ED,000000FF,?,006A1A26), ref: 006C8D4E
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$ConditionEnterLeaveObjectSingleSleepVariableWait
                                                      • String ID:
                                                      • API String ID: 3269011525-0
                                                      • Opcode ID: fc405ad7e22b6af5767cc4f8594d59bb22eef8c591d620cf8a5155c86288ce61
                                                      • Instruction ID: 505bfe61c1e7a7c87180484af152a2e4c7951c0a193b66b56171e86aa2442a3e
                                                      • Opcode Fuzzy Hash: fc405ad7e22b6af5767cc4f8594d59bb22eef8c591d620cf8a5155c86288ce61
                                                      • Instruction Fuzzy Hash: E8E09BB1641264FBC7113BD0EC24E9D3F66EF04751B11C132F5056B1A1CFB519108BD5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: pPp$pPp
                                                      • API String ID: 0-357014332
                                                      • Opcode ID: ec582ec5182f3f27c4aa1938974ff4dae2f5bc365c91f8d2e2e4f638142d6147
                                                      • Instruction ID: b85a0291a32ab690071df9719efafadd8f139e0d575a18bcbd34f8c29165d81c
                                                      • Opcode Fuzzy Hash: ec582ec5182f3f27c4aa1938974ff4dae2f5bc365c91f8d2e2e4f638142d6147
                                                      • Instruction Fuzzy Hash: EAC195B2E01344BFDB60DBA9CC46FEE77F99B09741F140169FA04EB382E6709A419B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006B3D36
                                                        • Part of subcall function 006B27D3: __EH_prolog3.LIBCMT ref: 006B27DA
                                                        • Part of subcall function 006B27D3: std::_Lockit::_Lockit.LIBCPMT ref: 006B27E4
                                                        • Part of subcall function 006B27D3: std::_Lockit::~_Lockit.LIBCPMT ref: 006B2855
                                                        • Part of subcall function 006AA250: LocalAlloc.KERNEL32(00000040,80000023,00000000,?,?,?,?,006B403E,00000001,?,00000000,?,?,00000001,?,?), ref: 006AA293
                                                        • Part of subcall function 006AA250: LocalFree.KERNEL32(7FFFFFFF,?,?), ref: 006AA339
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: LocalLockitstd::_$AllocFreeH_prolog3H_prolog3_Lockit::_Lockit::~_
                                                      • String ID: 0123456789ABCDEFabcdef-+Xx$tLk
                                                      • API String ID: 1009823702-4131611741
                                                      • Opcode ID: 2e258b4b1e1e6b61b7ae742f84787326823a73bbd9dde2ee269351ccfc0bb5b5
                                                      • Instruction ID: 83cced20fc675295e1a0cb78dddbd84f405656f8b79ac6839b3ef9e91bbc8ada
                                                      • Opcode Fuzzy Hash: 2e258b4b1e1e6b61b7ae742f84787326823a73bbd9dde2ee269351ccfc0bb5b5
                                                      • Instruction Fuzzy Hash: B9D18FB0E042989EDF15EFA8C5807ECBBB3AF55300F24405AE5856B383DB319E86CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 006D853D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: a584257d9960cd79a164d54abe8128e57d224157b96dddc71ced6e7739e27640
                                                      • Instruction ID: 4cd3789ca624effc5fe4232f193a08c83782c81ac67608e3646a2f7a2ec42552
                                                      • Opcode Fuzzy Hash: a584257d9960cd79a164d54abe8128e57d224157b96dddc71ced6e7739e27640
                                                      • Instruction Fuzzy Hash: 79518B61D0A3429EEB51B719DD053FA2BA79B50710F308D6AE0D1433A9EF748CD1CB4A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: __aulldiv
                                                      • String ID: -$0123456789abcdefghijklmnopqrstuvwxyz
                                                      • API String ID: 3732870572-1956417402
                                                      • Opcode ID: df2b03ca7a9eb741470842d9d7326fdc67d02e6a14b154b95578805e59baac0b
                                                      • Instruction ID: 6dd41a3e38a6ed6b125a4a5e6249d77f17c0e4d12d41d071c7048e377a2f1ece
                                                      • Opcode Fuzzy Hash: df2b03ca7a9eb741470842d9d7326fdc67d02e6a14b154b95578805e59baac0b
                                                      • Instruction Fuzzy Hash: FF51F330B0428A9EDB358E6D8851BFEBBFBEF55310F18806EE49197341CA7089478B64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • Concurrency::cancel_current_task.LIBCPMT ref: 006AF9DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Concurrency::cancel_current_task
                                                      • String ID: false$true
                                                      • API String ID: 118556049-2658103896
                                                      • Opcode ID: aa74f28fdd5ad967691bd957fa49b98d7f323238cd01c33bef2598e21549253f
                                                      • Instruction ID: 468308ba50e2f481b223e6c66565e3b7308d3f05a7f11ec606c556336ac83db3
                                                      • Opcode Fuzzy Hash: aa74f28fdd5ad967691bd957fa49b98d7f323238cd01c33bef2598e21549253f
                                                      • Instruction Fuzzy Hash: 165184B1D003489FDB10DFA4C941BEEB7B9FF05314F14826EE845AB281E775AA45CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006C313A
                                                      • _swprintf.LIBCMT ref: 006C31B2
                                                        • Part of subcall function 006B7BBE: __EH_prolog3.LIBCMT ref: 006B7BC5
                                                        • Part of subcall function 006B7BBE: std::_Lockit::_Lockit.LIBCPMT ref: 006B7BCF
                                                        • Part of subcall function 006B7BBE: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7C40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3H_prolog3_Lockit::_Lockit::~__swprintf
                                                      • String ID: %.0Lf
                                                      • API String ID: 2348759532-1402515088
                                                      • Opcode ID: 71128a7f7db921afc733997d6a034a9aba757f94f85b40f01c0c312f0b1385db
                                                      • Instruction ID: 436e0b41bbe8679c22fcc05d554796700362ba7b494997176359bd4fc8b6a543
                                                      • Opcode Fuzzy Hash: 71128a7f7db921afc733997d6a034a9aba757f94f85b40f01c0c312f0b1385db
                                                      • Instruction Fuzzy Hash: B4513971D00218AFDF05EFE4D845AEDBBBAFB08300F108459E506AB2A5DB359A55CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006C3433
                                                      • _swprintf.LIBCMT ref: 006C34AB
                                                        • Part of subcall function 006AB4A0: std::_Lockit::_Lockit.LIBCPMT ref: 006AB4CD
                                                        • Part of subcall function 006AB4A0: std::_Lockit::_Lockit.LIBCPMT ref: 006AB4F0
                                                        • Part of subcall function 006AB4A0: std::_Lockit::~_Lockit.LIBCPMT ref: 006AB518
                                                        • Part of subcall function 006AB4A0: std::_Lockit::~_Lockit.LIBCPMT ref: 006AB5B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                      • String ID: %.0Lf
                                                      • API String ID: 1487807907-1402515088
                                                      • Opcode ID: cc6cbfaf79fe72a06db8d2d03f3eabe79b3254ef42dd1297773b1033d9047054
                                                      • Instruction ID: f47ec9751718e980713d1a398f71b7b028ae8dd095819f5e67eef392a04e3c93
                                                      • Opcode Fuzzy Hash: cc6cbfaf79fe72a06db8d2d03f3eabe79b3254ef42dd1297773b1033d9047054
                                                      • Instruction Fuzzy Hash: 6E513A71D00218AFCF09EFE4D845AEDBBBAFF09300F108459E506AB2A5DB359A55CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006C7A05
                                                      • _swprintf.LIBCMT ref: 006C7A7D
                                                        • Part of subcall function 006AC530: std::_Lockit::_Lockit.LIBCPMT ref: 006AC55D
                                                        • Part of subcall function 006AC530: std::_Lockit::_Lockit.LIBCPMT ref: 006AC580
                                                        • Part of subcall function 006AC530: std::_Lockit::~_Lockit.LIBCPMT ref: 006AC5A8
                                                        • Part of subcall function 006AC530: std::_Lockit::~_Lockit.LIBCPMT ref: 006AC647
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3__swprintf
                                                      • String ID: %.0Lf
                                                      • API String ID: 1487807907-1402515088
                                                      • Opcode ID: 4d74f2c4704eed6adc8ce7305b3669536910095727143d17c0dfe5769812fc37
                                                      • Instruction ID: 079aee4ce78ae9cc3cca884abc20d8dfd16101069d3ab989748a2b1917c0830e
                                                      • Opcode Fuzzy Hash: 4d74f2c4704eed6adc8ce7305b3669536910095727143d17c0dfe5769812fc37
                                                      • Instruction Fuzzy Hash: D9514771D14208AFCF09EFE4D845AEEBBBAFB48300F10845DE506AB2A5DB359A15CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: \\?\$\\?\UNC\
                                                      • API String ID: 0-3019864461
                                                      • Opcode ID: 374bf96e1542e06189d4ef86fc2e54b1961aa4477107ce031a559f1ff7518341
                                                      • Instruction ID: 4e533058a8a2a51f4aeac42963a8ae7950c88e4cca737ca55eee41f634a98560
                                                      • Opcode Fuzzy Hash: 374bf96e1542e06189d4ef86fc2e54b1961aa4477107ce031a559f1ff7518341
                                                      • Instruction Fuzzy Hash: 8E519070E002049BDB14DF64C995BAEB7F6FF9A314F20951DE502A7280DB75AD84CFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CertGetNameStringW.CRYPT32(00000000,00000004,00000000,00000000,00000000,00000000), ref: 006A3D23
                                                      • CertGetNameStringW.CRYPT32(000000FF,00000004,00000000,00000000,00000010,000000FF), ref: 006A3DBF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CertNameString
                                                      • String ID: x-j
                                                      • API String ID: 149855834-686699091
                                                      • Opcode ID: a692ddca48a008cca76571eee12a446d7b4c763ef38b592049b7fb8573726664
                                                      • Instruction ID: 51c30afef5674cc1a35e9efcfc17cb25876e3bddbab5a76d2905655a9d3563b7
                                                      • Opcode Fuzzy Hash: a692ddca48a008cca76571eee12a446d7b4c763ef38b592049b7fb8573726664
                                                      • Instruction Fuzzy Hash: 6A41A070A006469FD714EF68CC05BAAFBB5FF85314F20422EE915E7790E7B5AA40CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EncodePointer.KERNEL32(00000000,?), ref: 006CCA06
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: EncodePointer
                                                      • String ID: MOC$RCC
                                                      • API String ID: 2118026453-2084237596
                                                      • Opcode ID: 48b6c8766eea3d80a7c4c0bdecb3d101d289897d9de7a63fbbf3e71ee90562a0
                                                      • Instruction ID: a77a2cf35036b0fa7cd8b1f0880dbe0b081c0eac331a246cd385e02ef1cb2953
                                                      • Opcode Fuzzy Hash: 48b6c8766eea3d80a7c4c0bdecb3d101d289897d9de7a63fbbf3e71ee90562a0
                                                      • Instruction Fuzzy Hash: 2941347290024DAFCF15DFD8C986EEEBBB6EF48320F18809DF908A6211D735A950DB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006C300C
                                                        • Part of subcall function 006B7BBE: __EH_prolog3.LIBCMT ref: 006B7BC5
                                                        • Part of subcall function 006B7BBE: std::_Lockit::_Lockit.LIBCPMT ref: 006B7BCF
                                                        • Part of subcall function 006B7BBE: std::_Lockit::~_Lockit.LIBCPMT ref: 006B7C40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$H_prolog3H_prolog3_Lockit::_Lockit::~_
                                                      • String ID: %.0Lf$0123456789-
                                                      • API String ID: 2728201062-3094241602
                                                      • Opcode ID: 31b83f30e4a9226e8d4693a50b3573eb85b3d3af512784988bd50c418bbe99e7
                                                      • Instruction ID: 2c7aefd5ab59931bd6ef614e60e7a70735cdfeaee04d0655e49eef0b1b3564e6
                                                      • Opcode Fuzzy Hash: 31b83f30e4a9226e8d4693a50b3573eb85b3d3af512784988bd50c418bbe99e7
                                                      • Instruction Fuzzy Hash: AF413B72A00228DFCF05EFA4D981EEEBBB6FF08310F10405DE901AB251DB319A55CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006C3305
                                                        • Part of subcall function 006AB4A0: std::_Lockit::_Lockit.LIBCPMT ref: 006AB4CD
                                                        • Part of subcall function 006AB4A0: std::_Lockit::_Lockit.LIBCPMT ref: 006AB4F0
                                                        • Part of subcall function 006AB4A0: std::_Lockit::~_Lockit.LIBCPMT ref: 006AB518
                                                        • Part of subcall function 006AB4A0: std::_Lockit::~_Lockit.LIBCPMT ref: 006AB5B7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                                      • String ID: 0123456789-$0123456789-
                                                      • API String ID: 2088892359-2494171821
                                                      • Opcode ID: ce3adf5af0cac09e9b0944a21e56e5dd07abada95197e6a9b1e032f2d9b9f025
                                                      • Instruction ID: 79af2b16c999b9f937eb22419f7f94ff8a81b25aa7ca1652e98e4915576eb0b2
                                                      • Opcode Fuzzy Hash: ce3adf5af0cac09e9b0944a21e56e5dd07abada95197e6a9b1e032f2d9b9f025
                                                      • Instruction Fuzzy Hash: 19414931900268DFCF45EFA8C881AEDBBB6FF09310F10405EE905AB252DB309E55CB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 006C78D9
                                                        • Part of subcall function 006AC530: std::_Lockit::_Lockit.LIBCPMT ref: 006AC55D
                                                        • Part of subcall function 006AC530: std::_Lockit::_Lockit.LIBCPMT ref: 006AC580
                                                        • Part of subcall function 006AC530: std::_Lockit::~_Lockit.LIBCPMT ref: 006AC5A8
                                                        • Part of subcall function 006AC530: std::_Lockit::~_Lockit.LIBCPMT ref: 006AC647
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Lockitstd::_$Lockit::_Lockit::~_$H_prolog3_
                                                      • String ID: 0123456789-$0123456789-
                                                      • API String ID: 2088892359-2494171821
                                                      • Opcode ID: 464a1eace2226748ac710dc65bda39d38dabbca5dcf239ea1f0d59987fbb49bc
                                                      • Instruction ID: d5ebf49663c437cca43fcf002dab04feb9243ddb01d383c1d9d1acf1b1addc11
                                                      • Opcode Fuzzy Hash: 464a1eace2226748ac710dc65bda39d38dabbca5dcf239ea1f0d59987fbb49bc
                                                      • Instruction Fuzzy Hash: 94414A31904219AFCF45EFA4D991EEEBBB6EF09310F10405EF911A7252DB319A15CF58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3___cftoe
                                                      • String ID: !%x
                                                      • API String ID: 855520168-1893981228
                                                      • Opcode ID: 66bddb62aef2c3f4f4a75a39c7dba20d72af861ed88acbd7c1aff18051030f5b
                                                      • Instruction ID: b1f4da6b1f12548a668077691cd6d2539b33e53d6bc413f01b2403234fa41dba
                                                      • Opcode Fuzzy Hash: 66bddb62aef2c3f4f4a75a39c7dba20d72af861ed88acbd7c1aff18051030f5b
                                                      • Instruction Fuzzy Hash: 8C410274A1425AAFEF45DFA8D881EEEBBB2FF18300F404429F855A7342D6319A05CF64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3___cftoe
                                                      • String ID: !%x
                                                      • API String ID: 855520168-1893981228
                                                      • Opcode ID: ba9f2fef852afdb1ce4f42bd2b278a40e23558944642d6aba5ccb801b7aecfe3
                                                      • Instruction ID: 54fbb195c2941debd15478bfbb571a9be694540f1da82d30de193840905956bb
                                                      • Opcode Fuzzy Hash: ba9f2fef852afdb1ce4f42bd2b278a40e23558944642d6aba5ccb801b7aecfe3
                                                      • Instruction Fuzzy Hash: 3B310771A01219ABDF14DFA8D841AEEB7B2EF48304F10846DF905AB351E775AE05CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _swprintf
                                                      • String ID: %$+
                                                      • API String ID: 589789837-2626897407
                                                      • Opcode ID: 24d40ad652de8dff02271c549131e0334aa42f3b6827b70e8b0148ebd52238b7
                                                      • Instruction ID: 31f7e13a439ef63cc4f3ab59b707de45a83b5af35c603dac680bfb9acb39d9d9
                                                      • Opcode Fuzzy Hash: 24d40ad652de8dff02271c549131e0334aa42f3b6827b70e8b0148ebd52238b7
                                                      • Instruction Fuzzy Hash: 5E21F6711083849FD711DF18C845B9B7BEAAF8A304F04851DF9958B292D634DD18CBA3
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _swprintf
                                                      • String ID: %$+
                                                      • API String ID: 589789837-2626897407
                                                      • Opcode ID: c42968ec6a27f1bcca1ee2e96a5e3982ff16c97eb25ebdd5422514e2baf8545e
                                                      • Instruction ID: 77410506d0c000143b850f04f77db907f07823a11bc1e89068cfa93b5f366094
                                                      • Opcode Fuzzy Hash: c42968ec6a27f1bcca1ee2e96a5e3982ff16c97eb25ebdd5422514e2baf8545e
                                                      • Instruction Fuzzy Hash: 5421D6712087459FD711DF14C845B9BBBEAEF8A310F04881DF99587292C734D919CBA7
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: _swprintf
                                                      • String ID: %$+
                                                      • API String ID: 589789837-2626897407
                                                      • Opcode ID: d7731278f90bf3fbef5fa2c390805f6f7e0650b1ce1c192e040e244dcd6d8423
                                                      • Instruction ID: 01c1643966638a70ebed837c910190f0cbe3925bf3341e1306a41d795caed7ea
                                                      • Opcode Fuzzy Hash: d7731278f90bf3fbef5fa2c390805f6f7e0650b1ce1c192e040e244dcd6d8423
                                                      • Instruction Fuzzy Hash: B121C4712083459FE715DF14C845B9BBBEAEB86310F04881DF99587292CB34D919CBA7
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006B1E64: EnterCriticalSection.KERNEL32(00706844,?,?,?,006A1CE7,00000000,210DFF48,?,?,?,?,-00000010,006EA740,000000FF,?,006A202C), ref: 006B1E6F
                                                        • Part of subcall function 006B1E64: LeaveCriticalSection.KERNEL32(00706844,?,?,006A1CE7,00000000,210DFF48,?,?,?,?,-00000010,006EA740,000000FF,?,006A202C), ref: 006B1E9B
                                                      • FindResourceExW.KERNEL32(00000000,00000006,?,00000000,00000000,210DFF48,?,?,?,?,-00000010,006EA740,000000FF,?,006A202C), ref: 006A1D06
                                                        • Part of subcall function 006A1D70: LoadResource.KERNEL32(00000000,00000000,210DFF48,00000001,00000000,?,00000000,006EA760,000000FF,?,006A1D1C,00000010,?,?,?,-00000010), ref: 006A1D9B
                                                        • Part of subcall function 006A1D70: LockResource.KERNEL32(00000000,?,006A1D1C,00000010,?,?,?,-00000010,006EA740,000000FF,?,006A202C,?,00000000,006EA78D,000000FF), ref: 006A1DA6
                                                        • Part of subcall function 006A1D70: SizeofResource.KERNEL32(00000000,00000000,?,006A1D1C,00000010,?,?,?,-00000010,006EA740,000000FF,?,006A202C,?,00000000,006EA78D), ref: 006A1DB4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Resource$CriticalSection$EnterFindLeaveLoadLockSizeof
                                                      • String ID: 0hp$0hp
                                                      • API String ID: 529824247-3730856638
                                                      • Opcode ID: 328ff59bb14d993be1a5cd0047f80d77eb0e911689744009600a7f5ed453256a
                                                      • Instruction ID: aab7fca8da8c9ad643b96d0cc9f235a4e29a4e5132822a89bd37039fe43dba0d
                                                      • Opcode Fuzzy Hash: 328ff59bb14d993be1a5cd0047f80d77eb0e911689744009600a7f5ed453256a
                                                      • Instruction Fuzzy Hash: 1B113A36B04614ABD7249B599C51BBAF3EAEB4AB60F00423EED06DB3C0DB359C018794
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ConvertSidToStringSidW.ADVAPI32(?,00000000), ref: 006A8096
                                                      • LocalFree.KERNEL32(00000000,Invalid SID,0000000B,?,00000000,210DFF48), ref: 006A8105
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: ConvertFreeLocalString
                                                      • String ID: Invalid SID
                                                      • API String ID: 3201929900-130637731
                                                      • Opcode ID: 05035a9a50f7c4a56fa3c0c978625303f263fdfe1e23a69da9a7f4e0f09cce04
                                                      • Instruction ID: 4e4ff12b37f98537bc023d7bc0184fa3ab59e862c651085958d43d7ccf7d17d2
                                                      • Opcode Fuzzy Hash: 05035a9a50f7c4a56fa3c0c978625303f263fdfe1e23a69da9a7f4e0f09cce04
                                                      • Instruction Fuzzy Hash: 7121A1B0A003159BDB10DF58C815BAFBBBAEF45704F14861DE902A7380DBB56A448BD0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 006AC10B
                                                      • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 006AC16E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: std::_$Locinfo::_Locinfo_ctorLockitLockit::_
                                                      • String ID: bad locale name
                                                      • API String ID: 3988782225-1405518554
                                                      • Opcode ID: cd578b2793e5d4ecc8a925d2f1a4c04c507407719dc6aaa2ea92c19c392fc126
                                                      • Instruction ID: 870a1dd1d4371633250d99974432ae0e1501fabfcf943c5d4b2725e80b56190e
                                                      • Opcode Fuzzy Hash: cd578b2793e5d4ecc8a925d2f1a4c04c507407719dc6aaa2ea92c19c392fc126
                                                      • Instruction Fuzzy Hash: 7821E4B0909784DED721CF68C90478BBFF4EF15710F10869EE49597781D3B9AA04CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006C8FDE
                                                      • ___raise_securityfailure.LIBCMT ref: 006C90C6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                                      • String ID: @kp
                                                      • API String ID: 3761405300-1507301250
                                                      • Opcode ID: b32f000a872dbf16ea1227099602e6e57b0715d54dbadbb4208159580f4e4522
                                                      • Instruction ID: 8d37ad76241bc27d767dae73d80ae7e2aa560814856fe039b78db9194e10aa52
                                                      • Opcode Fuzzy Hash: b32f000a872dbf16ea1227099602e6e57b0715d54dbadbb4208159580f4e4522
                                                      • Instruction Fuzzy Hash: 8121E5B4501204DBE714CF18ED65B567BE6FB08310F10C62AEA44CB3A0DFB864A18F6C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_
                                                      • String ID: false$true
                                                      • API String ID: 2427045233-2658103896
                                                      • Opcode ID: af3129ea8bbcc11bc7b07148b6934df82b65c5e79817c591bd60acc17c70e681
                                                      • Instruction ID: 327f669605308f6f3a1353a76c19a139375974ef8399f472f486af79e97761d6
                                                      • Opcode Fuzzy Hash: af3129ea8bbcc11bc7b07148b6934df82b65c5e79817c591bd60acc17c70e681
                                                      • Instruction Fuzzy Hash: 1511D3B1D007449EC761EFB4C441BDABBF5AF05300F00851EF1968B342EA70E904CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 006C90E4
                                                      • ___raise_securityfailure.LIBCMT ref: 006C91A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                                      • String ID: @kp
                                                      • API String ID: 3761405300-1507301250
                                                      • Opcode ID: 6bbf2c592707451201a2e860ce262adc2b9dedcd97be797a66fc4eb17df6d909
                                                      • Instruction ID: 003fc8826913e3f34420c72797933c038cefb615f63b9422629cdf445dc52da1
                                                      • Opcode Fuzzy Hash: 6bbf2c592707451201a2e860ce262adc2b9dedcd97be797a66fc4eb17df6d909
                                                      • Instruction Fuzzy Hash: 5811D7B4511208DBE314DF19EDA16527BE5FB08310B10D21AE98887360DFB8A5A58F6D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 006B0AA0: InitializeCriticalSectionEx.KERNEL32(?,00000000,00000000,210DFF48,?,006EA7B0,000000FF), ref: 006B0AC7
                                                        • Part of subcall function 006B0AA0: GetLastError.KERNEL32(?,00000000,00000000,210DFF48,?,006EA7B0,000000FF), ref: 006B0AD1
                                                      • IsDebuggerPresent.KERNEL32(?,?,00701AD8), ref: 006B1DE8
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,00701AD8), ref: 006B1DF7
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006B1DF2
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: CriticalDebugDebuggerErrorInitializeLastOutputPresentSectionString
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 3511171328-631824599
                                                      • Opcode ID: b072719afcd04cba4708ff1cc4fe721cbcee42a7d36a9178bd7661de524aca9a
                                                      • Instruction ID: a0b58f139302bbead7cbace036d813a3b01b4f5c3393aa97d5244c16016c1de5
                                                      • Opcode Fuzzy Hash: b072719afcd04cba4708ff1cc4fe721cbcee42a7d36a9178bd7661de524aca9a
                                                      • Instruction Fuzzy Hash: 56E06DB0600781CFD3609F29D9187867BE2AF05300F80C82DE892CA741DBB5E884CFA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LocalAlloc.KERNEL32(00000040,40000022,210DFF48,?,00000000,?,?,?,?,006EB1A0,000000FF,?,006A63B2,00000000,?), ref: 006A6C44
                                                      • LocalAlloc.KERNEL32(00000040,3FFFFFFF,210DFF48,?,00000000,?,?,?,?,006EB1A0,000000FF,?,006A63B2,00000000,?), ref: 006A6C67
                                                      • LocalFree.KERNEL32(?,?,?,?,?,00000000,?,?,?,?,006EB1A0,000000FF,?,006A63B2,00000000), ref: 006A6D07
                                                      • LocalFree.KERNEL32(?,210DFF48,00000000,006EA7B0,000000FF,?,00000000,00000000,006EB1A0,000000FF,210DFF48), ref: 006A6D8D
                                                      Memory Dump Source
                                                      • Source File: 00000005.00000002.2028554727.00000000006A1000.00000020.00000001.01000000.00000008.sdmp, Offset: 006A0000, based on PE: true
                                                      • Associated: 00000005.00000002.2028531216.00000000006A0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028646328.00000000006EF000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028673060.0000000000705000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                      • Associated: 00000005.00000002.2028696413.0000000000709000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_5_2_6a0000_MSIA311.jbxd
                                                      Similarity
                                                      • API ID: Local$AllocFree
                                                      • String ID:
                                                      • API String ID: 2012307162-0
                                                      • Opcode ID: 265e18ceaf5484fe34502e745630437f067520e8dfb9cf1b45ebaf3f0ea0811c
                                                      • Instruction ID: ee5d09a52dde1ea652782c4ed8041762e9c6c1e19bdde3e8b1507a2a9b902255
                                                      • Opcode Fuzzy Hash: 265e18ceaf5484fe34502e745630437f067520e8dfb9cf1b45ebaf3f0ea0811c
                                                      • Instruction Fuzzy Hash: 40518FB5A006099FDB18EF68C985AAEB7B6FB49354F14462DF816E7380D730AD00CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:1.5%
                                                      Dynamic/Decrypted Code Coverage:31.4%
                                                      Signature Coverage:6.7%
                                                      Total number of Nodes:1164
                                                      Total number of Limit Nodes:28
                                                      execution_graph 115389 79bc58 115428 79e524 115389->115428 115391 79bc64 GetStartupInfoA 115393 79bc87 115391->115393 115429 79d87f HeapCreate 115393->115429 115395 79bcd7 115431 79d045 GetModuleHandleW 115395->115431 115399 79bce8 __RTC_Initialize 115465 7a0f13 115399->115465 115402 79bcf6 115403 79bd02 GetCommandLineA 115402->115403 115577 79e73c 67 API calls 3 library calls 115402->115577 115480 7a0ddc 115403->115480 115406 79bd01 115406->115403 115410 79bd27 115519 7a0aa9 115410->115519 115414 79bd38 115534 79e7fb 115414->115534 115417 79bd3f 115418 79bd4a 115417->115418 115580 79e73c 67 API calls 3 library calls 115417->115580 115540 7a0a4a 115418->115540 115424 79bd79 115582 79e9d8 67 API calls _doexit 115424->115582 115427 79bd7e _setlocale 115428->115391 115430 79bccb 115429->115430 115430->115395 115575 79bc2f 67 API calls 3 library calls 115430->115575 115432 79d059 115431->115432 115433 79d060 115431->115433 115583 79e70c Sleep GetModuleHandleW 115432->115583 115435 79d1c8 115433->115435 115436 79d06a GetProcAddress GetProcAddress GetProcAddress GetProcAddress 115433->115436 115605 79cd5e 70 API calls 2 library calls 115435->115605 115439 79d0b3 TlsAlloc 115436->115439 115438 79d05f 115438->115433 115441 79bcdd 115439->115441 115442 79d101 TlsSetValue 115439->115442 115441->115399 115576 79bc2f 67 API calls 3 library calls 115441->115576 115442->115441 115443 79d112 115442->115443 115584 79e9f6 6 API calls 4 library calls 115443->115584 115445 79d117 115585 79cc34 TlsGetValue 115445->115585 115448 79cc34 __encode_pointer 6 API calls 115449 79d132 115448->115449 115450 79cc34 __encode_pointer 6 API calls 115449->115450 115451 79d142 115450->115451 115452 79cc34 __encode_pointer 6 API calls 115451->115452 115453 79d152 115452->115453 115595 79d8af InitializeCriticalSectionAndSpinCount __ioinit 115453->115595 115455 79d15f 115455->115435 115596 79ccaf 6 API calls __crt_waiting_on_module_handle 115455->115596 115457 79d173 115457->115435 115597 79ea91 115457->115597 115461 79d1a6 115461->115435 115462 79d1ad 115461->115462 115604 79cd9b 67 API calls 5 library calls 115462->115604 115464 79d1b5 GetCurrentThreadId 115464->115441 115626 79e524 115465->115626 115467 7a0f1f GetStartupInfoA 115468 79ea91 __calloc_crt 67 API calls 115467->115468 115476 7a0f40 115468->115476 115469 7a115e _setlocale 115469->115402 115470 7a10db GetStdHandle 115475 7a10a5 115470->115475 115471 79ea91 __calloc_crt 67 API calls 115471->115476 115472 7a1140 SetHandleCount 115472->115469 115473 7a10ed GetFileType 115473->115475 115474 7a1028 115474->115469 115474->115475 115477 7a1051 GetFileType 115474->115477 115627 7a2d8e InitializeCriticalSectionAndSpinCount _setlocale 115474->115627 115475->115469 115475->115470 115475->115472 115475->115473 115628 7a2d8e InitializeCriticalSectionAndSpinCount _setlocale 115475->115628 115476->115469 115476->115471 115476->115474 115476->115475 115477->115474 115481 7a0dfa GetEnvironmentStringsW 115480->115481 115482 7a0e19 115480->115482 115483 7a0e0e GetLastError 115481->115483 115484 7a0e02 115481->115484 115482->115484 115485 7a0eb2 115482->115485 115483->115482 115487 7a0e44 WideCharToMultiByte 115484->115487 115488 7a0e35 GetEnvironmentStringsW 115484->115488 115486 7a0ebb GetEnvironmentStrings 115485->115486 115490 79bd12 115485->115490 115489 7a0ecb 115486->115489 115486->115490 115493 7a0e78 115487->115493 115494 7a0ea7 FreeEnvironmentStringsW 115487->115494 115488->115487 115488->115490 115631 79ea4c 67 API calls _malloc 115489->115631 115506 7a0d21 115490->115506 115629 79ea4c 67 API calls _malloc 115493->115629 115494->115490 115497 7a0ee5 115499 7a0ef8 ___crtGetEnvironmentStringsA 115497->115499 115500 7a0eec FreeEnvironmentStringsA 115497->115500 115498 7a0e7e 115498->115494 115501 7a0e86 WideCharToMultiByte 115498->115501 115504 7a0f02 FreeEnvironmentStringsA 115499->115504 115500->115490 115502 7a0e98 115501->115502 115503 7a0ea0 115501->115503 115630 79b615 67 API calls 7 library calls 115502->115630 115503->115494 115504->115490 115507 7a0d3b GetModuleFileNameA 115506->115507 115508 7a0d36 115506->115508 115510 7a0d62 115507->115510 115638 79f2e5 111 API calls __setmbcp 115508->115638 115632 7a0b87 115510->115632 115513 79bd1c 115513->115410 115578 79e73c 67 API calls 3 library calls 115513->115578 115514 7a0d9e 115639 79ea4c 67 API calls _malloc 115514->115639 115516 7a0da4 115516->115513 115517 7a0b87 _parse_cmdline 77 API calls 115516->115517 115518 7a0dbe 115517->115518 115518->115513 115520 7a0ab2 115519->115520 115521 7a0ab7 _strlen 115519->115521 115641 79f2e5 111 API calls __setmbcp 115520->115641 115523 79bd2d 115521->115523 115524 79ea91 __calloc_crt 67 API calls 115521->115524 115523->115414 115579 79e73c 67 API calls 3 library calls 115523->115579 115528 7a0aec _strlen 115524->115528 115525 7a0b4a 115644 79b615 67 API calls 7 library calls 115525->115644 115527 79ea91 __calloc_crt 67 API calls 115527->115528 115528->115523 115528->115525 115528->115527 115529 7a0b70 115528->115529 115532 7a0b31 115528->115532 115642 79c8b0 67 API calls __wcslwr 115528->115642 115645 79b615 67 API calls 7 library calls 115529->115645 115532->115528 115643 79b7cb 10 API calls 3 library calls 115532->115643 115536 79e809 __IsNonwritableInCurrentImage 115534->115536 115646 7a2f3d 115536->115646 115537 79e827 __initterm_e 115539 79e846 __IsNonwritableInCurrentImage __initterm 115537->115539 115650 79ba50 74 API calls __cinit 115537->115650 115539->115417 115541 7a0a58 115540->115541 115543 7a0a5d 115540->115543 115651 79f2e5 111 API calls __setmbcp 115541->115651 115544 79bd50 115543->115544 115652 7a67ef 77 API calls x_ismbbtype_l 115543->115652 115546 7445b0 115544->115546 115547 7445d6 GetModuleHandleW 115546->115547 115548 7445df LoadIconW 115546->115548 115547->115548 115653 7440d0 115548->115653 115553 74462d CreateEventW 115668 79d360 115553->115668 115554 7445fa FindWindowW IsWindow 115555 744794 115554->115555 115556 744618 ShowWindow SetForegroundWindow 115554->115556 115679 79b1f0 115555->115679 115556->115555 115558 74464f WSAStartup curl_global_init 115670 798ab7 GetCommandLineW CommandLineToArgvW 115558->115670 115561 7447a7 115561->115424 115581 79e9ac 67 API calls _doexit 115561->115581 115562 74467d 115673 7442c0 110 API calls 2 library calls 115562->115673 115564 744691 115565 744722 ctype 115564->115565 115674 781bcc 76 API calls 2 library calls 115564->115674 115677 744460 160 API calls 2 library calls 115565->115677 115567 744751 ctype 115678 7447c0 75 API calls ctype 115567->115678 115569 7446f1 115675 7452f0 75 API calls 2 library calls 115569->115675 115572 744700 115572->115565 115573 74471d 115572->115573 115676 79b919 6 API calls __wcslwr 115573->115676 115575->115395 115576->115399 115577->115406 115578->115410 115579->115414 115580->115418 115581->115424 115582->115427 115583->115438 115584->115445 115586 79cc6d GetModuleHandleW 115585->115586 115587 79cc4c 115585->115587 115589 79cc88 GetProcAddress 115586->115589 115590 79cc7d 115586->115590 115587->115586 115588 79cc56 TlsGetValue 115587->115588 115592 79cc61 115588->115592 115594 79cc65 115589->115594 115606 79e70c Sleep GetModuleHandleW 115590->115606 115592->115586 115592->115594 115593 79cc83 115593->115589 115593->115594 115594->115448 115595->115455 115596->115457 115599 79ea9a 115597->115599 115600 79d18c 115599->115600 115601 79eab8 Sleep 115599->115601 115607 7a2f6d 115599->115607 115600->115435 115603 79ccaf 6 API calls __crt_waiting_on_module_handle 115600->115603 115602 79eacd 115601->115602 115602->115599 115602->115600 115603->115461 115604->115464 115605->115441 115606->115593 115608 7a2f79 _setlocale 115607->115608 115609 7a2f91 115608->115609 115617 7a2fb0 _memset 115608->115617 115620 79c867 67 API calls __getptd_noexit 115609->115620 115611 7a2f96 115621 79b8f3 6 API calls 2 library calls 115611->115621 115613 7a3022 HeapAlloc 115613->115617 115614 7a2fa6 _setlocale 115614->115599 115617->115613 115617->115614 115622 79da2b 67 API calls 2 library calls 115617->115622 115623 79e23d 5 API calls 2 library calls 115617->115623 115624 7a3069 LeaveCriticalSection _doexit 115617->115624 115625 79d857 6 API calls __decode_pointer 115617->115625 115620->115611 115622->115617 115623->115617 115624->115617 115625->115617 115626->115467 115627->115474 115628->115475 115629->115498 115630->115503 115631->115497 115634 7a0ba6 115632->115634 115636 7a0c13 115634->115636 115640 7a67ef 77 API calls x_ismbbtype_l 115634->115640 115635 7a0d11 115635->115513 115635->115514 115636->115635 115637 7a67ef 77 API calls __wincmdln 115636->115637 115637->115636 115638->115507 115639->115516 115640->115634 115641->115521 115642->115528 115643->115532 115644->115523 115645->115523 115647 7a2f43 115646->115647 115648 79cc34 __encode_pointer 6 API calls 115647->115648 115649 7a2f5b 115647->115649 115648->115647 115649->115537 115650->115539 115651->115543 115652->115543 115654 744135 115653->115654 115655 7440da 115653->115655 115662 781117 SetLastError OpenEventW 115654->115662 115656 7440e5 CreateThread 115655->115656 115657 7440de GetModuleHandleW 115655->115657 115658 744125 115656->115658 115659 74410b 115656->115659 115687 7441d0 115656->115687 115657->115656 115658->115654 115661 74412e CloseHandle 115658->115661 115659->115654 115660 744110 WaitForSingleObject TerminateThread 115659->115660 115660->115658 115661->115654 115663 78113d 115662->115663 115664 781152 GetLastError 115662->115664 115663->115664 115665 781142 115663->115665 115664->115665 115721 7440b0 115665->115721 115669 79d36c __VEC_memzero 115668->115669 115669->115558 115725 79894c 111 API calls __EH_prolog3_GS 115670->115725 115672 798ae5 LocalFree 115672->115562 115673->115564 115674->115569 115675->115572 115676->115565 115677->115567 115678->115555 115680 79b1f8 115679->115680 115681 79b1fa IsDebuggerPresent 115679->115681 115680->115561 115726 79ea44 115681->115726 115684 79c478 SetUnhandledExceptionFilter UnhandledExceptionFilter 115685 79c49d GetCurrentProcess TerminateProcess 115684->115685 115686 79c495 __invoke_watson 115684->115686 115685->115561 115686->115685 115697 798671 CreateStreamOnHGlobal 115687->115697 115690 744220 CreateDialogIndirectParamW UpdateWindow GetMessageW 115692 7442a3 115690->115692 115693 744268 115690->115693 115691 7441fd GetHGlobalFromStream GlobalLock 115691->115690 115694 744270 IsDialogMessageW 115693->115694 115695 744292 GetMessageW 115694->115695 115696 74427c TranslateMessage DispatchMessageW 115694->115696 115695->115692 115695->115694 115696->115695 115698 7986cd 115697->115698 115713 7988af 115698->115713 115701 7988af 5 API calls 115702 7986f8 115701->115702 115717 798926 115702->115717 115704 798701 115705 7988af 5 API calls 115704->115705 115706 798707 115705->115706 115707 7988af 5 API calls 115706->115707 115708 79871b 115707->115708 115709 798926 lstrlenW 115708->115709 115710 798726 115709->115710 115711 7988af 5 API calls 115710->115711 115712 7441f3 115711->115712 115712->115690 115712->115691 115715 7988d3 __aullrem 115713->115715 115714 79b1f0 __ehhandler$?_Init@?$_Mpunct@D@std@@IAEXABV_Locinfo@2@_N@Z 5 API calls 115716 7986d6 115714->115716 115715->115714 115716->115701 115718 79892d 115717->115718 115719 798932 lstrlenW 115717->115719 115718->115719 115720 798948 115719->115720 115720->115704 115722 7440bd 115721->115722 115723 7440c8 115721->115723 115722->115723 115724 7440c1 CloseHandle 115722->115724 115723->115553 115723->115554 115724->115723 115725->115672 115726->115684 115727 6c4d678c 115728 6c4d679c 115727->115728 115729 6c4d6797 115727->115729 115733 6c4d6696 115728->115733 115741 6c4dc2cf GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 115729->115741 115732 6c4d67aa 115734 6c4d66a2 ___BuildCatchObjectHelper 115733->115734 115735 6c4d673f ___BuildCatchObjectHelper 115734->115735 115739 6c4d66ef ___DllMainCRTStartup 115734->115739 115742 6c4d6532 115734->115742 115735->115732 115737 6c4d671f 115737->115735 115738 6c4d6532 __CRT_INIT@12 147 API calls 115737->115738 115738->115735 115739->115735 115739->115737 115740 6c4d6532 __CRT_INIT@12 147 API calls 115739->115740 115740->115737 115741->115728 115743 6c4d653e ___BuildCatchObjectHelper 115742->115743 115744 6c4d6546 115743->115744 115745 6c4d65c0 115743->115745 115794 6c4d9809 HeapCreate 115744->115794 115747 6c4d65c6 115745->115747 115748 6c4d6621 115745->115748 115754 6c4d65e4 115747->115754 115761 6c4d654f ___BuildCatchObjectHelper 115747->115761 115804 6c4da731 66 API calls _doexit 115747->115804 115749 6c4d667f 115748->115749 115750 6c4d6626 115748->115750 115749->115761 115812 6c4dbb65 79 API calls __freefls@4 115749->115812 115808 6c4db87e TlsGetValue DecodePointer TlsSetValue 115750->115808 115751 6c4d654b 115753 6c4d6556 115751->115753 115751->115761 115795 6c4dbbd3 84 API calls 5 library calls 115753->115795 115759 6c4d65f8 115754->115759 115805 6c4d9fe6 67 API calls _free 115754->115805 115756 6c4d662b 115809 6c4d85c8 66 API calls __calloc_crt 115756->115809 115807 6c4d660b DecodePointer TlsFree __mtterm 115759->115807 115761->115739 115764 6c4d6637 115764->115761 115766 6c4d6643 DecodePointer 115764->115766 115765 6c4d65ee 115806 6c4db8b2 DecodePointer TlsFree 115765->115806 115773 6c4d6658 115766->115773 115769 6c4d655b __RTC_Initialize 115772 6c4d656b GetCommandLineA 115769->115772 115787 6c4d655f 115769->115787 115770 6c4d6564 115770->115761 115797 6c4dc082 71 API calls 2 library calls 115772->115797 115776 6c4d665c 115773->115776 115777 6c4d6673 115773->115777 115810 6c4db8ef 66 API calls 4 library calls 115776->115810 115811 6c4d5286 66 API calls 2 library calls 115777->115811 115778 6c4d657b 115798 6c4d9da1 73 API calls __calloc_crt 115778->115798 115782 6c4d6585 115784 6c4d6589 115782->115784 115800 6c4dbfc7 95 API calls 3 library calls 115782->115800 115783 6c4d6663 GetCurrentThreadId 115783->115761 115799 6c4db8b2 DecodePointer TlsFree 115784->115799 115796 6c4d9827 HeapDestroy 115787->115796 115788 6c4d6595 115789 6c4d65a9 115788->115789 115801 6c4dbd4e 94 API calls 6 library calls 115788->115801 115789->115770 115803 6c4d9fe6 67 API calls _free 115789->115803 115792 6c4d659e 115792->115789 115802 6c4da544 77 API calls 4 library calls 115792->115802 115794->115751 115795->115769 115796->115770 115797->115778 115798->115782 115800->115788 115801->115792 115802->115789 115803->115784 115804->115754 115805->115765 115807->115761 115808->115756 115809->115764 115810->115783 115811->115770 115812->115761 115813 2f16de3 115818 2f16ded 115813->115818 115817 2f16e0f 115822 2f17045 115818->115822 115821 2f26278 _onexit 115821->115817 115825 2f1742d ??2@YAPAXI 115822->115825 115824 2f16de8 115824->115821 115826 2f17459 115825->115826 115827 2f17491 ??2@YAPAXI 115826->115827 115828 2f17488 ??3@YAXPAX 115826->115828 115827->115824 115828->115827 115829 2e10032 115846 2e10ae4 GetPEB 115829->115846 115832 2e10ae4 GetPEB 115836 2e102a7 115832->115836 115833 2e10a9c 115834 2e104a6 GetNativeSystemInfo 115834->115833 115835 2e104d3 VirtualAlloc 115834->115835 115837 2e104ec VirtualAlloc 115835->115837 115839 2e104ff 115835->115839 115836->115833 115836->115834 115837->115839 115838 2e10860 115848 2f26410 115838->115848 115839->115838 115840 2e1080f LdrGetProcedureAddress 115839->115840 115840->115839 115841 2e10a02 115841->115833 115854 2f19038 115841->115854 115857 2f1a2f8 115841->115857 115861 2f193d6 115841->115861 115847 2e1029b 115846->115847 115847->115832 115849 2f26418 115848->115849 115850 2f26439 malloc 115849->115850 115851 2f2644e 115849->115851 115852 2f26478 115849->115852 115850->115851 115851->115841 115852->115851 115853 2f264a5 ??3@YAXPAX 115852->115853 115853->115851 115915 2f204c9 CreateEventA _beginthreadex WaitForSingleObject CloseHandle 115854->115915 115856 2f1904b WaitForSingleObject CloseHandle 115856->115833 115858 2f1a301 115857->115858 115859 2f1a305 LoadLibraryA 115857->115859 115858->115833 115859->115833 115916 2f262a0 115861->115916 115864 2f1a2f8 LoadLibraryA 115865 2f19415 memset GetModuleFileNameA CreateMutexA 115864->115865 115866 2f19461 115865->115866 115867 2f1944d GetLastError 115865->115867 115918 2f13011 115866->115918 115867->115866 115868 2f1945a exit 115867->115868 115868->115866 115870 2f1946c 115871 2f19474 115870->115871 115872 2f1949c 115870->115872 115927 2f165b1 CreateEventA 115871->115927 115874 2f194a4 SetUnhandledExceptionFilter 115872->115874 115875 2f194af 115872->115875 115874->115875 115877 2f19628 sprintf 115875->115877 115878 2f194bc 115875->115878 115876 2f19486 115928 2f165d0 CreateEventA _beginthreadex WaitForSingleObject CloseHandle 115876->115928 115921 2f19a16 memset memset wsprintfA 115877->115921 115879 2f194c0 115878->115879 115880 2f19535 115878->115880 115930 2f199ab _mbscpy _mbscat RegOpenKeyExA 115879->115930 115885 2f196d8 115880->115885 115886 2f1953d 115880->115886 115884 2f19491 115929 2f16550 TerminateThread CloseHandle CloseHandle __EH_prolog ctype 115884->115929 115932 2f130d1 10 API calls 2 library calls 115885->115932 115892 2f18364 9 API calls 115886->115892 115888 2f196b9 115924 2f18364 115888->115924 115889 2f194c5 115894 2f194c9 StartServiceCtrlDispatcherA WSAStartup 115889->115894 115895 2f1950b 115889->115895 115898 2f1954d SHGetSpecialFolderPathA 115892->115898 115900 2f19038 6 API calls 115894->115900 115931 2f196ea 29 API calls 115895->115931 115896 2f19038 6 API calls 115901 2f196cb Sleep 115896->115901 115897 2f196e3 115897->115833 115903 2f19572 GetFileAttributesA 115898->115903 115899 2f196c4 115899->115896 115904 2f194fe Sleep 115900->115904 115901->115901 115909 2f195a6 DefineDosDeviceA 115903->115909 115910 2f1961a 115903->115910 115904->115904 115905 2f19520 115906 2f18364 9 API calls 115905->115906 115908 2f1952b ExitProcess 115906->115908 115914 2f195da CopyFileA MoveFileExA SetFileAttributesA CreateDirectoryA 115909->115914 115911 2f19038 6 API calls 115910->115911 115913 2f1961f 115911->115913 115914->115910 115915->115856 115917 2f193e3 GetInputState GetCurrentThreadId PostThreadMessageA GetMessageA 115916->115917 115917->115864 115919 2f1301b __EH_prolog 115918->115919 115920 2f13055 WSAStartup CreateEventA memcpy 115919->115920 115920->115870 115933 2f20c2f memset memset memset LoadLibraryA 115921->115933 115946 2f1822b memset wsprintfA lstrlen 115924->115946 115927->115876 115928->115884 115929->115872 115930->115889 115931->115905 115932->115897 115934 2f20cac RegOpenKeyExA 115933->115934 115936 2f20d09 115934->115936 115938 2f20d12 115934->115938 115939 2f196a5 lstrlen 115936->115939 115940 2f20e6a FreeLibrary 115936->115940 115937 2f20dac 115937->115936 115942 2f20e48 lstrcpy 115937->115942 115938->115936 115938->115937 115941 2f20d3f 115938->115941 115943 2f20db7 115938->115943 115939->115888 115939->115899 115940->115939 115941->115936 115941->115937 115945 2f20d9c strchr 115941->115945 115942->115936 115943->115936 115944 2f20e11 wsprintfA 115943->115944 115944->115936 115945->115941 115949 2f20ea0 LoadLibraryA 115946->115949 115950 2f20ee6 115949->115950 115951 2f20f86 RegCreateKeyExA 115950->115951 115952 2f20f2a 115950->115952 115953 2f20fa4 RegOpenKeyExA 115951->115953 115960 2f20f2d 115951->115960 115952->115953 115952->115960 115958 2f20fbb 115953->115958 115953->115960 115954 2f20fdd lstrlen 115959 2f20fec RegSetValueExA 115954->115959 115955 2f18331 115955->115899 115956 2f2100e FreeLibrary 115956->115955 115957 2f20fd3 115957->115959 115958->115954 115958->115957 115958->115960 115959->115960 115960->115955 115960->115956 115961 744140 115962 744161 GetWindowLongW 115961->115962 115963 744153 SetWindowLongW 115961->115963 115964 744170 115962->115964 115965 7441ba 115962->115965 115963->115962 115966 744177 115964->115966 115967 7441b2 PostQuitMessage 115964->115967 115968 7441a3 DestroyWindow 115966->115968 115969 74417c 115966->115969 115967->115965 115969->115965 115970 744183 KiUserCallbackDispatcher KiUserCallbackDispatcher 115969->115970 115971 2f20465 115980 2f26220 115971->115980 115973 2f2046f memcpy SetEvent 115974 2f204a6 115973->115974 115975 2f2049f 115973->115975 115981 2f18d76 115974->115981 116015 2f2076b FreeLibrary FreeLibrary LoadLibraryA FreeLibrary 115975->116015 115977 2f204a5 115977->115974 115980->115973 115982 2f18d80 __EH_prolog 115981->115982 115983 2f18d93 wsprintfA CreateMutexA 115982->115983 115984 2f18def 115982->115984 115983->115984 115986 2f18dcd GetLastError 115983->115986 115985 2f13011 3 API calls 115984->115985 115997 2f18df8 115985->115997 115986->115984 115987 2f18dda ReleaseMutex CloseHandle 115986->115987 115988 2f1902a 115987->115988 115989 2f18e0a rand Sleep 115989->115997 115990 2f18ffa 116031 2f13534 setsockopt CancelIo InterlockedExchange closesocket SetEvent 115990->116031 115991 2f18e51 strstr 115994 2f18f06 strcmp 115991->115994 115991->115997 115992 2f18eec lstrcat 115992->115994 115996 2f18f27 GetTickCount 115994->115996 115994->115997 115995 2f19002 116034 2f130d1 10 API calls 2 library calls 115995->116034 116016 2f13160 115996->116016 115997->115989 115997->115990 115997->115991 115997->115992 115999 2f18e9b strncpy 115997->115999 116002 2f18f45 GetTickCount 115997->116002 116003 2f18eb1 _mbscpy lstrcat atoi 115999->116003 116001 2f19027 116001->115988 116026 2f164c9 lstrcpy lstrcpy CreateEventA 116002->116026 116003->115994 116008 2f18fcf WaitForSingleObject Sleep 116011 2f18f73 116008->116011 116010 2f19004 116032 2f13534 setsockopt CancelIo InterlockedExchange closesocket SetEvent 116010->116032 116011->115997 116011->116008 116011->116010 116027 2f19f72 75 API calls 116011->116027 116028 2f13534 setsockopt CancelIo InterlockedExchange closesocket SetEvent 116011->116028 116029 2f16550 TerminateThread CloseHandle CloseHandle __EH_prolog ctype 116011->116029 116030 2f204c9 CreateEventA _beginthreadex WaitForSingleObject CloseHandle 116011->116030 116013 2f1900c 116033 2f16550 TerminateThread CloseHandle CloseHandle __EH_prolog ctype 116013->116033 116015->115977 116035 2f13534 setsockopt CancelIo InterlockedExchange closesocket SetEvent 116016->116035 116018 2f13170 ResetEvent socket 116019 2f13192 gethostbyname 116018->116019 116025 2f131d2 116018->116025 116020 2f131a1 htons connect 116019->116020 116019->116025 116021 2f131d6 setsockopt 116020->116021 116020->116025 116022 2f13223 116021->116022 116023 2f131f6 WSAIoctl 116021->116023 116036 2f204c9 CreateEventA _beginthreadex WaitForSingleObject CloseHandle 116022->116036 116023->116022 116025->115997 116026->116011 116027->116011 116028->116011 116029->116011 116030->116011 116031->115995 116032->116013 116033->115995 116034->116001 116035->116018 116036->116025 116037 2a90032 116049 2a90ae4 GetPEB 116037->116049 116040 2a90ae4 GetPEB 116041 2a902a7 116040->116041 116042 2a904a6 GetNativeSystemInfo 116041->116042 116044 2a90a9c 116041->116044 116043 2a904d3 VirtualAlloc 116042->116043 116042->116044 116045 2a904ec 116043->116045 116051 1000340f 116045->116051 116050 2a9029b 116049->116050 116050->116040 116052 10003418 116051->116052 116053 1000341d 116051->116053 116075 10008319 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 116052->116075 116067 10003432 116053->116067 116056 2a90a02 116056->116044 116057 10001ca0 116056->116057 116189 10001b50 LoadLibraryA GetProcAddress 116057->116189 116061 10001cb0 116205 10001730 116061->116205 116063 10001cb8 116065 10001cd0 116063->116065 116218 1000302f 68 API calls 7 library calls 116063->116218 116065->116044 116066 10001cc9 116066->116044 116068 1000343e __initptd 116067->116068 116069 100034e9 __initptd 116068->116069 116072 1000348c ___DllMainCRTStartup 116068->116072 116076 1000329d 116068->116076 116069->116056 116071 100034c6 116071->116069 116073 1000329d ___DllXcptFilter 85 API calls 116071->116073 116072->116069 116072->116071 116074 1000329d ___DllXcptFilter 85 API calls 116072->116074 116073->116069 116074->116071 116075->116053 116077 100032a9 __initptd 116076->116077 116078 100032b1 116077->116078 116079 1000332b 116077->116079 116127 10004566 GetProcessHeap 116078->116127 116080 10003394 116079->116080 116081 1000332f 116079->116081 116083 100033f7 116080->116083 116084 10003399 116080->116084 116087 10003350 116081->116087 116118 100032ba __initptd ___DllXcptFilter 116081->116118 116168 10004729 41 API calls _doexit 116081->116168 116083->116118 116178 100078c5 41 API calls 2 library calls 116083->116178 116173 10004bf8 TlsGetValue 116084->116173 116085 100032b6 116085->116118 116128 10007a35 116085->116128 116169 10004600 43 API calls ___free_lconv_num 116087->116169 116089 100033a4 116089->116118 116174 10005267 41 API calls 2 library calls 116089->116174 116093 100032c6 __RTC_Initialize 116100 100032d6 GetCommandLineA 116093->116100 116093->116118 116094 10003355 116096 10003366 ___DllXcptFilter 116094->116096 116170 10007fb7 42 API calls ___free_lconv_num 116094->116170 116172 1000337f 44 API calls __mtterm 116096->116172 116097 100033b5 116097->116118 116175 10004c17 TlsSetValue 116097->116175 116149 100083b5 GetEnvironmentStringsW 116100->116149 116101 10003361 116171 10007aab 44 API calls 2 library calls 116101->116171 116105 100033cd 116107 100033d3 116105->116107 116108 100033eb 116105->116108 116176 10007982 41 API calls 3 library calls 116107->116176 116177 10002655 41 API calls 2 library calls 116108->116177 116112 100032f0 116114 100032f4 116112->116114 116115 100032fb 116112->116115 116113 100033db GetCurrentThreadId 116113->116118 116163 10007aab 44 API calls 2 library calls 116114->116163 116164 10008009 54 API calls 3 library calls 116115->116164 116118->116072 116119 10003300 116120 10003314 116119->116120 116165 10008238 53 API calls 5 library calls 116119->116165 116126 10003319 116120->116126 116167 10007fb7 42 API calls ___free_lconv_num 116120->116167 116123 10003309 116123->116120 116166 10004738 49 API calls 5 library calls 116123->116166 116124 10003329 116124->116114 116126->116118 116127->116085 116179 100047d0 RtlEncodePointer GetModuleHandleW RtlEncodePointer __init_pointers __initp_misc_winsig 116128->116179 116130 10007a3a 116180 1000a4ec InitializeCriticalSectionAndSpinCount __ioinit 116130->116180 116132 10007a3f 116133 10007a43 116132->116133 116182 10004bbb TlsAlloc 116132->116182 116181 10007aab 44 API calls 2 library calls 116133->116181 116136 10007a48 116136->116093 116137 10007a55 116137->116133 116138 10007a60 116137->116138 116183 10005267 41 API calls 2 library calls 116138->116183 116140 10007a6d 116141 10007aa2 116140->116141 116184 10004c17 TlsSetValue 116140->116184 116186 10007aab 44 API calls 2 library calls 116141->116186 116144 10007aa7 116144->116093 116145 10007a81 116145->116141 116146 10007a87 116145->116146 116185 10007982 41 API calls 3 library calls 116146->116185 116148 10007a8f GetCurrentThreadId 116148->116093 116150 100083c8 WideCharToMultiByte 116149->116150 116154 100032e6 116149->116154 116152 10008432 FreeEnvironmentStringsW 116150->116152 116153 100083fb 116150->116153 116152->116154 116187 100052af 41 API calls 2 library calls 116153->116187 116162 10007d02 45 API calls 5 library calls 116154->116162 116156 10008401 116156->116152 116157 10008408 WideCharToMultiByte 116156->116157 116158 10008427 FreeEnvironmentStringsW 116157->116158 116159 1000841e 116157->116159 116158->116154 116188 10002655 41 API calls 2 library calls 116159->116188 116161 10008424 116161->116158 116162->116112 116163->116118 116164->116119 116165->116123 116166->116120 116167->116124 116168->116087 116169->116094 116170->116101 116171->116096 116172->116118 116173->116089 116174->116097 116175->116105 116176->116113 116177->116118 116178->116118 116179->116130 116180->116132 116181->116136 116182->116137 116183->116140 116184->116145 116185->116148 116186->116144 116187->116156 116188->116161 116219 10001ab0 116189->116219 116191 10001bb1 OpenProcess 116192 10001bcb OpenProcessToken 116191->116192 116193 10001bdc LookupPrivilegeValueA AdjustTokenPrivileges LoadLibraryA GetProcAddress 116191->116193 116192->116193 116194 10001c80 116193->116194 116195 10001560 CoInitialize 116194->116195 116196 100015b4 116195->116196 116229 10002fc9 116196->116229 116200 1000169c _com_util::ConvertStringToBSTR 116201 100016d3 InterlockedDecrement 116200->116201 116202 100016e1 116201->116202 116203 100016f4 Mailbox 116201->116203 116202->116203 116204 100016e7 SysFreeString 116202->116204 116203->116061 116204->116203 116206 10001768 116205->116206 116207 1000176c 116206->116207 116292 10001150 VariantClear 116206->116292 116207->116063 116210 10001150 45 API calls 116211 10001909 116210->116211 116212 10001150 45 API calls 116211->116212 116213 10001913 116212->116213 116214 10001150 45 API calls 116213->116214 116217 100018e3 116213->116217 116215 10001989 116214->116215 116216 10002250 _com_util::ConvertStringToBSTR 47 API calls 116215->116216 116216->116217 116217->116063 116218->116066 116226 10003570 116219->116226 116222 10001b24 FindCloseChangeNotification 116222->116191 116224 10001afc 116224->116222 116225 10001b32 CloseHandle 116224->116225 116228 1000319f 48 API calls 2 library calls 116224->116228 116225->116191 116227 10001ad1 CreateToolhelp32Snapshot Process32First 116226->116227 116227->116222 116227->116224 116228->116224 116231 10002fd1 116229->116231 116232 10001671 116231->116232 116234 10002fef std::exception::exception 116231->116234 116255 1000268d 116231->116255 116272 10004583 RtlDecodePointer 116231->116272 116232->116200 116237 10002250 116232->116237 116273 10003bc4 RaiseException 116234->116273 116236 10003019 116238 10002294 lstrlen MultiByteToWideChar 116237->116238 116249 1000228d _com_util::ConvertStringToBSTR 116237->116249 116239 100022b8 GetLastError 116238->116239 116240 100022c2 _com_util::ConvertStringToBSTR 116238->116240 116239->116240 116243 1000268d _malloc 41 API calls 116240->116243 116245 100022e2 _com_util::ConvertStringToBSTR 116240->116245 116242 100023bb 116242->116200 116243->116245 116244 1000233b MultiByteToWideChar 116246 10002376 SysAllocString 116244->116246 116247 1000234d 116244->116247 116245->116244 116246->116249 116250 10002387 116246->116250 116248 1000235e GetLastError 116247->116248 116289 10002655 41 API calls 2 library calls 116247->116289 116252 10002368 _com_util::ConvertStringToBSTR 116248->116252 116282 10003600 116249->116282 116290 10002655 41 API calls 2 library calls 116250->116290 116252->116246 116254 1000235b 116254->116248 116256 10002708 116255->116256 116264 10002699 116255->116264 116280 10004583 RtlDecodePointer 116256->116280 116258 1000270e 116281 10004512 41 API calls __getptd_noexit 116258->116281 116261 100026cc RtlAllocateHeap 116261->116264 116271 10002700 116261->116271 116263 100026f4 116278 10004512 41 API calls __getptd_noexit 116263->116278 116264->116261 116264->116263 116268 100026a4 116264->116268 116269 100026f2 116264->116269 116277 10004583 RtlDecodePointer 116264->116277 116268->116264 116274 100049a1 41 API calls __NMSG_WRITE 116268->116274 116275 100049fe 41 API calls 5 library calls 116268->116275 116276 100045ea GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 116268->116276 116279 10004512 41 API calls __getptd_noexit 116269->116279 116271->116231 116272->116231 116273->116236 116274->116268 116275->116268 116277->116264 116278->116269 116279->116271 116280->116258 116281->116271 116283 10003608 116282->116283 116284 1000360a IsProcessorFeaturePresent 116282->116284 116283->116242 116286 10008646 116284->116286 116291 100085f5 5 API calls 2 library calls 116286->116291 116288 10008729 116288->116242 116289->116254 116290->116249 116291->116288 116293 10001183 116292->116293 116302 10001189 116292->116302 116309 100010f0 RaiseException __CxxThrowException@8 116293->116309 116295 10001249 116296 1000124e SysAllocString 116295->116296 116297 10001279 116296->116297 116298 1000125c 116296->116298 116299 1000128f 116297->116299 116312 10002655 41 API calls 2 library calls 116297->116312 116298->116297 116311 100010f0 RaiseException __CxxThrowException@8 116298->116311 116299->116210 116299->116217 116302->116295 116303 100011f9 116302->116303 116304 1000123f 116302->116304 116307 100011e1 _com_util::ConvertStringToBSTR 116302->116307 116305 1000268d _malloc 41 API calls 116303->116305 116310 100010f0 RaiseException __CxxThrowException@8 116304->116310 116305->116307 116307->116295 116308 1000121e MultiByteToWideChar 116307->116308 116308->116296 116312->116297 116313 6c4d1e00 116316 6c4d1d50 116313->116316 116315 6c4d1e05 ExitProcess 116329 6c4d3b30 116316->116329 116318 6c4d1d93 116343 6c4d1ca0 116318->116343 116321 6c4d1dac DeleteFileA 116324 6c4d1dc8 116321->116324 116322 6c4d1db9 116350 6c4d1a10 116322->116350 116326 6c4d1960 5 API calls 116324->116326 116325 6c4d1dbe 116379 6c4d1960 116325->116379 116328 6c4d1dd5 ctype 116326->116328 116328->116315 116330 6c4d3b97 116329->116330 116333 6c4d3b3e 116329->116333 116331 6c4d3baa 116330->116331 116388 6c4d4fbf 67 API calls 2 library calls 116330->116388 116336 6c4d3bbd _memmove 116331->116336 116389 6c4d3f00 77 API calls 5 library calls 116331->116389 116333->116330 116335 6c4d3b64 116333->116335 116337 6c4d3b69 116335->116337 116338 6c4d3b80 116335->116338 116336->116318 116386 6c4d3e10 77 API calls 2 library calls 116337->116386 116387 6c4d3e10 77 API calls 2 library calls 116338->116387 116341 6c4d3b7a 116341->116318 116342 6c4d3b91 116342->116318 116390 6c4d2ee0 116343->116390 116349 6c4d1d32 116349->116321 116349->116322 116865 6c4d2400 116350->116865 116353 6c4d1a4d 116355 6c4d4280 110 API calls 116353->116355 116354 6c4d1b1c 116356 6c4d3640 113 API calls 116354->116356 116357 6c4d1a57 116355->116357 116360 6c4d1b27 116356->116360 116888 6c4d1ec0 67 API calls 116357->116888 116359 6c4d1b56 116878 6c4d4280 116359->116878 116360->116359 116890 6c4d1530 67 API calls 2 library calls 116360->116890 116365 6c4d1aad 116366 6c4d2550 116 API calls 116365->116366 116369 6c4d1ad9 116366->116369 116367 6c4d1a65 116367->116365 116889 6c4d1530 67 API calls 2 library calls 116367->116889 116370 6c4d4f5f std::ios_base::_Ios_base_dtor 2 API calls 116369->116370 116372 6c4d1b04 116370->116372 116371 6c4d1bb6 116374 6c4d2550 116 API calls 116371->116374 116372->116325 116373 6c4d1b6e 116373->116371 116892 6c4d1530 67 API calls 2 library calls 116373->116892 116376 6c4d1be2 116374->116376 116377 6c4d4f5f std::ios_base::_Ios_base_dtor 2 API calls 116376->116377 116378 6c4d1c0d 116377->116378 116378->116325 116970 6c4e1de0 116379->116970 116382 6c4d19c0 116382->116382 116383 6c4d19d0 VirtualAlloc 116382->116383 116972 6c4d5450 116383->116972 116386->116341 116387->116342 116388->116331 116389->116336 116417 6c4d1670 116390->116417 116392 6c4d2f3d 116429 6c4d4060 116392->116429 116395 6c4d2f6f 116438 6c4d3cc0 116395->116438 116400 6c4d3001 116401 6c4d1ccf 116400->116401 116463 6c4d1530 67 API calls 2 library calls 116400->116463 116403 6c4d2550 116401->116403 116404 6c4d2584 116403->116404 116407 6c4d25af 116404->116407 116847 6c4d3640 116404->116847 116408 6c4d25f9 ctype 116407->116408 116410 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116407->116410 116844 6c4d50e9 116408->116844 116409 6c4d1d07 116413 6c4d4f5f 116409->116413 116411 6c4d25d7 116410->116411 116412 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116411->116412 116412->116408 116414 6c4d4f6e std::ios_base::_Tidy 116413->116414 116416 6c4d4f93 ctype 116414->116416 116864 6c4d1250 EnterCriticalSection LeaveCriticalSection std::ios_base::_Addstd std::_Lockit::_Lockit 116414->116864 116416->116349 116464 6c4d1530 67 API calls 2 library calls 116417->116464 116419 6c4d16aa 116465 6c4d5882 116419->116465 116422 6c4d16f3 116422->116392 116424 6c4d16bf 116478 6c4d478d 116424->116478 116517 6c4d1630 116429->116517 116434 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116436 6c4d40b0 116434->116436 116435 6c4d2f53 116435->116395 116462 6c4d1530 67 API calls 2 library calls 116435->116462 116437 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116436->116437 116437->116435 116547 6c4d50cf 116438->116547 116441 6c4d5882 std::locale::facet::_Facet_Register 77 API calls 116442 6c4d3cfe 116441->116442 116448 6c4d2f89 116442->116448 116552 6c4d4a99 82 API calls 9 library calls 116442->116552 116444 6c4d3d0d 116445 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116444->116445 116446 6c4d3d20 116445->116446 116447 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116446->116447 116447->116448 116449 6c4d3560 116448->116449 116450 6c4d3623 116449->116450 116451 6c4d3583 116449->116451 116450->116400 116554 6c4d51d9 116451->116554 116453 6c4d358f 116453->116450 116564 6c4d3db0 EnterCriticalSection LeaveCriticalSection std::ios_base::_Addstd std::_Lockit::_Lockit 116453->116564 116455 6c4d35af 116565 6c4d4540 114 API calls 5 library calls 116455->116565 116457 6c4d35bc 116458 6c4d3601 116457->116458 116459 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116457->116459 116458->116400 116460 6c4d35df 116459->116460 116461 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116460->116461 116461->116458 116462->116395 116463->116401 116464->116419 116467 6c4d588c 116465->116467 116468 6c4d16b1 116467->116468 116470 6c4d58a8 std::exception::exception 116467->116470 116486 6c4d7d01 116467->116486 116503 6c4d9c57 DecodePointer 116467->116503 116468->116422 116477 6c4d4a99 82 API calls 9 library calls 116468->116477 116471 6c4d58e6 116470->116471 116504 6c4d68d2 76 API calls __cinit 116470->116504 116505 6c4d53cd 66 API calls std::exception::operator= 116471->116505 116473 6c4d58f0 116506 6c4d871b RaiseException 116473->116506 116476 6c4d5901 116477->116424 116479 6c4d479f 116478->116479 116480 6c4d16d2 116478->116480 116515 6c4d5209 EnterCriticalSection 116479->116515 116482 6c4d47b5 116480->116482 116483 6c4d47bc 116482->116483 116484 6c4d16e9 116482->116484 116516 6c4d5219 LeaveCriticalSection 116483->116516 116484->116392 116487 6c4d7d7e 116486->116487 116492 6c4d7d0f 116486->116492 116513 6c4d9c57 DecodePointer 116487->116513 116489 6c4d7d84 116514 6c4d97c0 66 API calls __getptd_noexit 116489->116514 116493 6c4d7d3d RtlAllocateHeap 116492->116493 116495 6c4d7d1a 116492->116495 116497 6c4d7d6a 116492->116497 116501 6c4d7d68 116492->116501 116510 6c4d9c57 DecodePointer 116492->116510 116493->116492 116494 6c4d7d76 116493->116494 116494->116467 116495->116492 116507 6c4e04a5 66 API calls 2 library calls 116495->116507 116508 6c4e02f6 66 API calls 6 library calls 116495->116508 116509 6c4da4c3 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 116495->116509 116511 6c4d97c0 66 API calls __getptd_noexit 116497->116511 116512 6c4d97c0 66 API calls __getptd_noexit 116501->116512 116503->116467 116504->116471 116505->116473 116506->116476 116507->116495 116508->116495 116510->116492 116511->116501 116512->116494 116513->116489 116514->116494 116515->116480 116516->116484 116518 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116517->116518 116519 6c4d1649 116518->116519 116520 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116519->116520 116521 6c4d165d 116520->116521 116522 6c4d4150 116521->116522 116523 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116522->116523 116524 6c4d4178 116523->116524 116525 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116524->116525 116527 6c4d41bc 116524->116527 116526 6c4d419b 116525->116526 116529 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116526->116529 116528 6c4d41fc 116527->116528 116543 6c4d12f0 114 API calls 2 library calls 116527->116543 116530 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116528->116530 116529->116527 116532 6c4d4093 116530->116532 116532->116434 116532->116435 116533 6c4d420a 116534 6c4d422d 116533->116534 116544 6c4d53a4 66 API calls std::exception::exception 116533->116544 116535 6c4d478d std::_Lockit::_Lockit EnterCriticalSection 116534->116535 116537 6c4d4240 116535->116537 116540 6c4d47b5 std::ios_base::_Addstd LeaveCriticalSection 116537->116540 116538 6c4d421f 116545 6c4d871b RaiseException 116538->116545 116541 6c4d4254 116540->116541 116546 6c4d47e1 77 API calls std::locale::facet::_Facet_Register 116541->116546 116543->116533 116544->116538 116545->116534 116546->116528 116548 6c4d5882 std::locale::facet::_Facet_Register 77 API calls 116547->116548 116549 6c4d50db 116548->116549 116553 6c4d51e9 InitializeCriticalSection 116549->116553 116551 6c4d3cf0 116551->116441 116552->116444 116553->116551 116556 6c4d5131 116554->116556 116555 6c4d517c 116555->116453 116556->116555 116557 6c4d5196 116556->116557 116560 6c4d5112 std::_Xfsopen 143 API calls 116556->116560 116563 6c4d519d 116557->116563 116566 6c4d5112 116557->116566 116560->116557 116563->116555 116569 6c4d64be 116563->116569 116564->116455 116565->116457 116583 6c4d887a 116566->116583 116568 6c4d512c 116568->116555 116582 6c4d89c0 101 API calls 6 library calls 116568->116582 116570 6c4d64ca ___BuildCatchObjectHelper 116569->116570 116571 6c4d64dc 116570->116571 116572 6c4d64f1 116570->116572 116746 6c4d97c0 66 API calls __getptd_noexit 116571->116746 116579 6c4d64ec ___BuildCatchObjectHelper 116572->116579 116724 6c4d5d15 116572->116724 116574 6c4d64e1 116747 6c4d9b37 11 API calls __read 116574->116747 116579->116555 116582->116563 116585 6c4d8886 ___BuildCatchObjectHelper 116583->116585 116584 6c4d8899 116641 6c4d97c0 66 API calls __getptd_noexit 116584->116641 116585->116584 116587 6c4d88c6 116585->116587 116602 6c4e0c0b 116587->116602 116588 6c4d889e 116642 6c4d9b37 11 API calls __read 116588->116642 116591 6c4d88cb 116592 6c4d88df 116591->116592 116593 6c4d88d2 116591->116593 116595 6c4d8906 116592->116595 116596 6c4d88e6 116592->116596 116643 6c4d97c0 66 API calls __getptd_noexit 116593->116643 116619 6c4e0974 116595->116619 116644 6c4d97c0 66 API calls __getptd_noexit 116596->116644 116598 6c4d88a9 @_EH4_CallFilterFunc@8 ___BuildCatchObjectHelper 116598->116568 116603 6c4e0c17 ___BuildCatchObjectHelper 116602->116603 116646 6c4da8d8 116603->116646 116605 6c4e0c9a 116653 6c4e0d35 116605->116653 116606 6c4e0ca1 116685 6c4d8583 116606->116685 116610 6c4e0d2a ___BuildCatchObjectHelper 116610->116591 116611 6c4e0cb6 InitializeCriticalSectionAndSpinCount 116612 6c4e0ce9 EnterCriticalSection 116611->116612 116613 6c4e0cd6 116611->116613 116612->116605 116691 6c4d5286 66 API calls 2 library calls 116613->116691 116617 6c4e0c25 116617->116605 116617->116606 116656 6c4da816 116617->116656 116683 6c4d5d56 67 API calls __lock 116617->116683 116684 6c4d5dc4 LeaveCriticalSection LeaveCriticalSection _doexit 116617->116684 116620 6c4e0996 116619->116620 116621 6c4e09aa 116620->116621 116632 6c4e09c1 116620->116632 116705 6c4d97c0 66 API calls __getptd_noexit 116621->116705 116623 6c4e09af 116706 6c4d9b37 11 API calls __read 116623->116706 116624 6c4e0bc4 116702 6c4e336d 116624->116702 116625 6c4e0bb2 116711 6c4d97c0 66 API calls __getptd_noexit 116625->116711 116629 6c4e0bb7 116712 6c4d9b37 11 API calls __read 116629->116712 116630 6c4d8911 116645 6c4d892c LeaveCriticalSection LeaveCriticalSection _fseek 116630->116645 116632->116625 116640 6c4e0b5e 116632->116640 116707 6c4e36f7 76 API calls __fassign 116632->116707 116634 6c4e0b2d 116634->116625 116634->116634 116708 6c4e3591 85 API calls __mbsnbicmp_l 116634->116708 116636 6c4e0b57 116636->116640 116709 6c4e3591 85 API calls __mbsnbicmp_l 116636->116709 116638 6c4e0b76 116638->116640 116710 6c4e3591 85 API calls __mbsnbicmp_l 116638->116710 116640->116624 116640->116625 116641->116588 116642->116598 116643->116598 116644->116598 116645->116598 116647 6c4da8ed 116646->116647 116648 6c4da900 EnterCriticalSection 116646->116648 116649 6c4da816 __mtinitlocknum 65 API calls 116647->116649 116648->116617 116650 6c4da8f3 116649->116650 116650->116648 116692 6c4da740 66 API calls 3 library calls 116650->116692 116693 6c4da7ff LeaveCriticalSection 116653->116693 116655 6c4e0d3c 116655->116610 116657 6c4da822 ___BuildCatchObjectHelper 116656->116657 116658 6c4da84a 116657->116658 116659 6c4da832 116657->116659 116661 6c4d8583 __malloc_crt 65 API calls 116658->116661 116668 6c4da858 ___BuildCatchObjectHelper 116658->116668 116694 6c4e04a5 66 API calls 2 library calls 116659->116694 116663 6c4da863 116661->116663 116662 6c4da837 116695 6c4e02f6 66 API calls 6 library calls 116662->116695 116666 6c4da879 116663->116666 116667 6c4da86a 116663->116667 116665 6c4da83e 116696 6c4da4c3 GetModuleHandleW GetProcAddress ExitProcess ___crtCorExitProcess 116665->116696 116671 6c4da8d8 __lock 65 API calls 116666->116671 116697 6c4d97c0 66 API calls __getptd_noexit 116667->116697 116668->116617 116673 6c4da880 116671->116673 116674 6c4da888 InitializeCriticalSectionAndSpinCount 116673->116674 116675 6c4da8b3 116673->116675 116677 6c4da898 116674->116677 116679 6c4da8a4 116674->116679 116700 6c4d5286 66 API calls 2 library calls 116675->116700 116698 6c4d5286 66 API calls 2 library calls 116677->116698 116701 6c4da8cf LeaveCriticalSection _doexit 116679->116701 116680 6c4da89e 116699 6c4d97c0 66 API calls __getptd_noexit 116680->116699 116683->116617 116684->116617 116687 6c4d858c 116685->116687 116686 6c4d7d01 _malloc 65 API calls 116686->116687 116687->116686 116688 6c4d85c2 116687->116688 116689 6c4d85a3 Sleep 116687->116689 116688->116605 116688->116611 116690 6c4d85b8 116689->116690 116690->116687 116690->116688 116691->116605 116693->116655 116694->116662 116695->116665 116697->116668 116698->116680 116699->116679 116700->116679 116701->116668 116713 6c4e32a9 116702->116713 116704 6c4e3388 116704->116630 116705->116623 116706->116630 116707->116634 116708->116636 116709->116638 116710->116640 116711->116629 116712->116630 116715 6c4e32b5 ___BuildCatchObjectHelper 116713->116715 116714 6c4e32c8 116716 6c4d97c0 __fseeki64_nolock 66 API calls 116714->116716 116715->116714 116717 6c4e32fe 116715->116717 116718 6c4e32cd 116716->116718 116720 6c4e2b75 __tsopen_nolock 129 API calls 116717->116720 116719 6c4d9b37 __read 11 API calls 116718->116719 116723 6c4e32d7 ___BuildCatchObjectHelper 116719->116723 116721 6c4e3318 116720->116721 116722 6c4e333f __wsopen_helper LeaveCriticalSection 116721->116722 116722->116723 116723->116704 116725 6c4d5d49 EnterCriticalSection 116724->116725 116726 6c4d5d27 116724->116726 116729 6c4d5d3f 116725->116729 116726->116725 116727 6c4d5d2f 116726->116727 116728 6c4da8d8 __lock 66 API calls 116727->116728 116728->116729 116730 6c4d6451 116729->116730 116731 6c4d6476 116730->116731 116732 6c4d6462 116730->116732 116733 6c4d6472 116731->116733 116749 6c4d626b 116731->116749 116789 6c4d97c0 66 API calls __getptd_noexit 116732->116789 116748 6c4d652a LeaveCriticalSection LeaveCriticalSection _fseek 116733->116748 116735 6c4d6467 116790 6c4d9b37 11 API calls __read 116735->116790 116742 6c4d6490 116766 6c4db7a8 116742->116766 116744 6c4d6496 116744->116733 116791 6c4d5286 66 API calls 2 library calls 116744->116791 116746->116574 116747->116579 116748->116579 116750 6c4d6284 116749->116750 116754 6c4d62a6 116749->116754 116751 6c4da039 __fseeki64_nolock 66 API calls 116750->116751 116750->116754 116752 6c4d629f 116751->116752 116792 6c4db008 97 API calls 6 library calls 116752->116792 116755 6c4db602 116754->116755 116756 6c4d648a 116755->116756 116757 6c4db612 116755->116757 116759 6c4da039 116756->116759 116757->116756 116793 6c4d5286 66 API calls 2 library calls 116757->116793 116760 6c4da05a 116759->116760 116761 6c4da045 116759->116761 116760->116742 116794 6c4d97c0 66 API calls __getptd_noexit 116761->116794 116763 6c4da04a 116795 6c4d9b37 11 API calls __read 116763->116795 116765 6c4da055 116765->116742 116767 6c4db7b4 ___BuildCatchObjectHelper 116766->116767 116768 6c4db7bc 116767->116768 116769 6c4db7d7 116767->116769 116821 6c4d97d3 66 API calls __getptd_noexit 116768->116821 116771 6c4db7e3 116769->116771 116774 6c4db81d 116769->116774 116823 6c4d97d3 66 API calls __getptd_noexit 116771->116823 116772 6c4db7c1 116822 6c4d97c0 66 API calls __getptd_noexit 116772->116822 116796 6c4e1f7c 116774->116796 116776 6c4db7e8 116824 6c4d97c0 66 API calls __getptd_noexit 116776->116824 116779 6c4db823 116782 6c4db83d 116779->116782 116783 6c4db831 116779->116783 116780 6c4db7f0 116825 6c4d9b37 11 API calls __read 116780->116825 116826 6c4d97c0 66 API calls __getptd_noexit 116782->116826 116806 6c4db70c 116783->116806 116784 6c4db7c9 ___BuildCatchObjectHelper 116784->116744 116787 6c4db837 116827 6c4db864 LeaveCriticalSection __unlock_fhandle 116787->116827 116789->116735 116790->116733 116791->116733 116792->116754 116793->116756 116794->116763 116795->116765 116797 6c4e1f88 ___BuildCatchObjectHelper 116796->116797 116798 6c4e1fe2 116797->116798 116800 6c4da8d8 __lock 66 API calls 116797->116800 116799 6c4e1fe7 EnterCriticalSection 116798->116799 116804 6c4e2004 ___BuildCatchObjectHelper 116798->116804 116799->116804 116801 6c4e1fb4 116800->116801 116802 6c4e1fbd InitializeCriticalSectionAndSpinCount 116801->116802 116803 6c4e1fd0 116801->116803 116802->116803 116828 6c4e2012 LeaveCriticalSection _doexit 116803->116828 116804->116779 116829 6c4e1f12 116806->116829 116808 6c4db772 116842 6c4e1e8c 67 API calls 2 library calls 116808->116842 116809 6c4db71c 116809->116808 116811 6c4db750 116809->116811 116812 6c4e1f12 __chsize_nolock 66 API calls 116809->116812 116811->116808 116813 6c4e1f12 __chsize_nolock 66 API calls 116811->116813 116815 6c4db747 116812->116815 116816 6c4db75c FindCloseChangeNotification 116813->116816 116814 6c4db77a 116817 6c4db79c 116814->116817 116843 6c4d97e6 66 API calls 3 library calls 116814->116843 116818 6c4e1f12 __chsize_nolock 66 API calls 116815->116818 116816->116808 116819 6c4db768 GetLastError 116816->116819 116817->116787 116818->116811 116819->116808 116821->116772 116822->116784 116823->116776 116824->116780 116825->116784 116826->116787 116827->116784 116828->116798 116830 6c4e1f1f 116829->116830 116832 6c4e1f37 116829->116832 116831 6c4d97d3 __read 66 API calls 116830->116831 116834 6c4e1f24 116831->116834 116833 6c4d97d3 __read 66 API calls 116832->116833 116836 6c4e1f76 116832->116836 116835 6c4e1f48 116833->116835 116837 6c4d97c0 __fseeki64_nolock 66 API calls 116834->116837 116838 6c4d97c0 __fseeki64_nolock 66 API calls 116835->116838 116836->116809 116839 6c4e1f2c 116837->116839 116840 6c4e1f50 116838->116840 116839->116809 116841 6c4d9b37 __read 11 API calls 116840->116841 116841->116839 116842->116814 116843->116817 116853 6c4d51f9 DeleteCriticalSection 116844->116853 116846 6c4d50f5 ctype 116846->116409 116848 6c4d364e 116847->116848 116852 6c4d3662 116847->116852 116854 6c4d3770 116848->116854 116850 6c4d3653 116851 6c4d64be __fcloseall 102 API calls 116850->116851 116851->116852 116852->116407 116853->116846 116855 6c4d37b0 116854->116855 116859 6c4d3798 116854->116859 116855->116850 116857 6c4d393a 116863 6c4d4fbf 67 API calls 2 library calls 116857->116863 116859->116855 116859->116857 116861 6c4d5f4a 99 API calls 4 library calls 116859->116861 116862 6c4d3f00 77 API calls 5 library calls 116859->116862 116861->116859 116862->116859 116863->116855 116864->116416 116866 6c4d1670 82 API calls 116865->116866 116867 6c4d2455 116866->116867 116868 6c4d4060 114 API calls 116867->116868 116869 6c4d246b 116868->116869 116870 6c4d2487 116869->116870 116893 6c4d1530 67 API calls 2 library calls 116869->116893 116871 6c4d3cc0 83 API calls 116870->116871 116873 6c4d24a1 116871->116873 116874 6c4d3560 173 API calls 116873->116874 116875 6c4d2511 116874->116875 116876 6c4d1a3c 116875->116876 116894 6c4d1530 67 API calls 2 library calls 116875->116894 116876->116353 116876->116354 116879 6c4d42b4 116878->116879 116882 6c4d433d 116879->116882 116899 6c4d2030 67 API calls 116879->116899 116886 6c4d435e 116882->116886 116895 6c4d2290 116882->116895 116883 6c4d1b60 116891 6c4d1ec0 67 API calls 116883->116891 116884 6c4d4443 116884->116883 116901 6c4d3c30 67 API calls 116884->116901 116886->116884 116900 6c4d1530 67 API calls 2 library calls 116886->116900 116888->116367 116889->116365 116890->116359 116891->116373 116892->116371 116893->116870 116894->116876 116896 6c4d235c 116895->116896 116897 6c4d22b1 _memmove 116895->116897 116896->116886 116897->116896 116902 6c4d2660 116897->116902 116899->116882 116900->116884 116901->116883 116903 6c4d268d 116902->116903 116906 6c4d26a2 116902->116906 116904 6c4d26f1 116903->116904 116903->116906 116907 6c4d271f 116903->116907 116913 6c4d59f6 116904->116913 116906->116897 116907->116906 116908 6c4d27f7 116907->116908 116932 6c4d5f4a 99 API calls 4 library calls 116907->116932 116933 6c4d32f0 77 API calls 2 library calls 116907->116933 116908->116906 116934 6c4d17a0 99 API calls _fputc 116908->116934 116910 6c4d2809 116910->116897 116914 6c4d5a02 ___BuildCatchObjectHelper 116913->116914 116915 6c4d5a2d 116914->116915 116916 6c4d5a15 116914->116916 116918 6c4d5d15 __lock_file 67 API calls 116915->116918 116956 6c4d97c0 66 API calls __getptd_noexit 116916->116956 116920 6c4d5a33 116918->116920 116919 6c4d5a1a 116957 6c4d9b37 11 API calls __read 116919->116957 116922 6c4d5aa8 116920->116922 116924 6c4da039 __fseeki64_nolock 66 API calls 116920->116924 116923 6c4d5ab6 116922->116923 116935 6c4da24f 116922->116935 116960 6c4d5aea LeaveCriticalSection LeaveCriticalSection _fseek 116923->116960 116928 6c4d5a43 116924->116928 116927 6c4d5a25 ___BuildCatchObjectHelper 116927->116906 116928->116922 116958 6c4d97c0 66 API calls __getptd_noexit 116928->116958 116930 6c4d5a9d 116959 6c4d9b37 11 API calls __read 116930->116959 116932->116907 116933->116907 116934->116910 116936 6c4da039 __fseeki64_nolock 66 API calls 116935->116936 116937 6c4da25f 116936->116937 116938 6c4da26a 116937->116938 116939 6c4da281 116937->116939 116964 6c4d97c0 66 API calls __getptd_noexit 116938->116964 116940 6c4da285 116939->116940 116951 6c4da292 __flsbuf 116939->116951 116965 6c4d97c0 66 API calls __getptd_noexit 116940->116965 116943 6c4da2f3 116944 6c4da382 116943->116944 116945 6c4da302 116943->116945 116969 6c4db008 97 API calls 6 library calls 116944->116969 116947 6c4da319 116945->116947 116952 6c4da336 116945->116952 116967 6c4db008 97 API calls 6 library calls 116947->116967 116950 6c4da26f 116950->116923 116951->116943 116951->116950 116953 6c4da2e8 116951->116953 116966 6c4e1b8c 66 API calls 2 library calls 116951->116966 116952->116950 116968 6c4db161 71 API calls 6 library calls 116952->116968 116953->116943 116961 6c4da3b3 116953->116961 116956->116919 116957->116927 116958->116930 116959->116922 116960->116927 116962 6c4d8583 __malloc_crt 66 API calls 116961->116962 116963 6c4da3c8 116962->116963 116963->116943 116964->116950 116965->116950 116966->116953 116967->116950 116968->116950 116969->116950 116971 6c4d196d CreateFileA GetFileSize ReadFile 116970->116971 116971->116382 116973 6c4d19f4 ImmEnumInputContext 116972->116973 116973->116324
                                                      APIs
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 02E104AE
                                                      • VirtualAlloc.KERNEL32(?,?,00003000,00000004), ref: 02E104DE
                                                      • VirtualAlloc.KERNEL32(00000000,?,00003000,00000004), ref: 02E104F5
                                                      • LdrGetProcedureAddress.NTDLL(00000000,?,00000000,?), ref: 02E10810
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224774705.0000000002E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 02E10000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2e10000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AllocVirtual$AddressInfoNativeProcedureSystem
                                                      • String ID: A$A$Cach$F$Fu$G$Li$Lo$P$Rt$S$Syst$Ta$Vi$Via$a$a$a$a$b$b$ctio$ee$fo$iv$mI$o$oc$otec$p$st$t$tNat$tu$tu$ucti$ushI$yA
                                                      • API String ID: 1766404756-2899676511
                                                      • Opcode ID: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                      • Instruction ID: c3d9b45b8132815cd0df0274517326095c08188561525e2c616f1b913d80498e
                                                      • Opcode Fuzzy Hash: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                      • Instruction Fuzzy Hash: E8629C715483858FD730CF24C840BABBBE5FF94718F04982DE9C99B291E7749988CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 02A904AE
                                                      • VirtualAlloc.KERNEL32(?,?,00003000,00000004), ref: 02A904DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224637381.0000000002A90000.00000040.00001000.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2a90000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AllocInfoNativeSystemVirtual
                                                      • String ID: A$A$Cach$F$Fu$G$Li$Lo$P$Rt$S$Syst$Ta$Vi$Via$a$a$a$a$b$b$ctio$ee$fo$iv$mI$o$oc$otec$p$st$t$tNat$tu$tu$ucti$ushI$yA
                                                      • API String ID: 2032221330-2899676511
                                                      • Opcode ID: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                      • Instruction ID: 5a67a5e0bd2ba73a48b4b33cefe44e60a05a1300d7e7d8b8f430ca96cfab4e59
                                                      • Opcode Fuzzy Hash: 82ef88a58992c726dca534e4f3eff6f5ce2a19202078a525a2214f4ed1b422dd
                                                      • Instruction Fuzzy Hash: 82628C71508385CFDB20CF25C880BABBBE5FF94744F04482DE9C99B251EB709988CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetInputState.USER32 ref: 02F193E6
                                                      • GetCurrentThreadId.KERNEL32 ref: 02F193F1
                                                      • PostThreadMessageA.USER32(00000000), ref: 02F193F8
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 02F19405
                                                      • memset.MSVCRT ref: 02F19423
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 02F19434
                                                      • CreateMutexA.KERNEL32(00000000,00000000,?), ref: 02F19443
                                                      • GetLastError.KERNEL32 ref: 02F1944D
                                                      • exit.MSVCRT ref: 02F1945B
                                                        • Part of subcall function 02F19A16: memset.MSVCRT ref: 02F19A42
                                                        • Part of subcall function 02F19A16: memset.MSVCRT ref: 02F19A54
                                                        • Part of subcall function 02F19A16: wsprintfA.USER32 ref: 02F19AFA
                                                      • SetUnhandledExceptionFilter.KERNEL32(02F19065), ref: 02F194A9
                                                      • StartServiceCtrlDispatcherA.ADVAPI32(?), ref: 02F194E1
                                                      • WSAStartup.WS2_32(00000202,?), ref: 02F194F3
                                                      • Sleep.KERNEL32(000F4240), ref: 02F19503
                                                      • ExitProcess.KERNEL32 ref: 02F1952F
                                                      • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000007,00000000), ref: 02F1955A
                                                      • GetFileAttributesA.KERNEL32(?), ref: 02F19595
                                                      • DefineDosDeviceA.KERNEL32(00000001,02FEC848,?), ref: 02F195D0
                                                      • CopyFileA.KERNEL32(?,02FEC83C,00000000), ref: 02F195E7
                                                      • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 02F195F7
                                                      • SetFileAttributesA.KERNEL32(?,00000002), ref: 02F19606
                                                      • CreateDirectoryA.KERNEL32(?,00000000), ref: 02F19614
                                                      • sprintf.MSVCRT ref: 02F19656
                                                      • lstrlen.KERNEL32(?), ref: 02F196AF
                                                      • Sleep.KERNEL32(000F4240), ref: 02F196D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$memset$AttributesCreateMessageSleepThread$CopyCtrlCurrentDefineDeviceDirectoryDispatcherErrorExceptionExitFilterFolderInputLastModuleMoveMutexNamePathPostProcessServiceSpecialStartStartupStateUnhandledexitlstrlensprintfwsprintf
                                                      • String ID: %$C$G$SRDSL$c$e$n$n$o$o$p$r$s$t$u
                                                      • API String ID: 1744223243-2739207428
                                                      • Opcode ID: 785978e0b3b5bcf08a301ab9666d49f3d0ee75951d7e55875da97557862dbe54
                                                      • Instruction ID: 28933d24d0f0017fe4ed0be8a5bc7833a554492d7aa13dc8aa893f9ce45312d3
                                                      • Opcode Fuzzy Hash: 785978e0b3b5bcf08a301ab9666d49f3d0ee75951d7e55875da97557862dbe54
                                                      • Instruction Fuzzy Hash: 4681C4B1D4025CAEEB11DBA4DD98EEEBBBCAF147C4F400496F705A2141DBB49B448FA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 10001B99
                                                      • GetProcAddress.KERNEL32(00000000), ref: 10001BA0
                                                        • Part of subcall function 10001AB0: _memset.LIBCMT ref: 10001ACC
                                                        • Part of subcall function 10001AB0: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10001AE2
                                                        • Part of subcall function 10001AB0: Process32First.KERNEL32(00000000,00000128), ref: 10001AF2
                                                        • Part of subcall function 10001AB0: FindCloseChangeNotification.KERNEL32(00000000), ref: 10001B25
                                                      • OpenProcess.KERNEL32(00001000,00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 10001BC1
                                                      • OpenProcessToken.ADVAPI32(00000000,000F01FF,?,?,?,?,?,?,?,?,?,?), ref: 10001BD6
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,10016908,FFFFFFFF), ref: 10001BE8
                                                      • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,00000001,?,00000010,00000000,00000000), ref: 10001C1F
                                                      • LoadLibraryA.KERNEL32(1001692C,1001691C,?,?,?,?,00000001,?,00000010,00000000,00000000), ref: 10001C6C
                                                      • GetProcAddress.KERNEL32(00000000), ref: 10001C73
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225205779.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10001000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadOpenProcProcessToken$AdjustChangeCloseCreateFindFirstLookupNotificationPrivilegePrivilegesProcess32SnapshotToolhelp32Value_memset
                                                      • String ID: $.dll$360t$ADVA$PI32$exe$ray.
                                                      • API String ID: 1948653106-2325242662
                                                      • Opcode ID: db1aac61bfbfbedb3c40a891b87708fe5dd75bbf99c62c778880aa74b7f4357a
                                                      • Instruction ID: 5d9db8125b9bd70de7a63b933078c3cd19c530e595b49123e5552fe6a39f8101
                                                      • Opcode Fuzzy Hash: db1aac61bfbfbedb3c40a891b87708fe5dd75bbf99c62c778880aa74b7f4357a
                                                      • Instruction Fuzzy Hash: AB314BB0518385AFE300CF60CD89B9BBBE8FF88755F004A0CF6A496290D7B5D5488B56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(?), ref: 007445D7
                                                      • LoadIconW.USER32(?,00000065), ref: 007445E2
                                                      • FindWindowW.USER32(OneClientWnd,00000000), ref: 00744601
                                                      • IsWindow.USER32(00000000), ref: 0074460A
                                                      • ShowWindow.USER32(00000000,00000005), ref: 0074461B
                                                      • SetForegroundWindow.USER32(00000000), ref: 00744622
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000000,{51908485-3D48-408a-AC9A-8DA4361CCC61}), ref: 00744638
                                                      • _memset.LIBCMT ref: 0074464A
                                                      • WSAStartup.WS2_32(00000202,?), ref: 0074465C
                                                      • curl_global_init.LIBCURL32(00000003), ref: 00744663
                                                        • Part of subcall function 00798AB7: GetCommandLineW.KERNEL32(00000000,?,?,?,?,0074467D), ref: 00798AC9
                                                        • Part of subcall function 00798AB7: CommandLineToArgvW.SHELL32(00000000,?,?,?,0074467D), ref: 00798AD0
                                                        • Part of subcall function 00798AB7: LocalFree.KERNEL32(00000000,?,?,?,0074467D), ref: 00798AE8
                                                      Strings
                                                      • OneClientWnd, xrefs: 007445FC
                                                      • {51908485-3D48-408a-AC9A-8DA4361CCC61}, xrefs: 0074462D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$CommandLine$ArgvCreateEventFindForegroundFreeHandleIconLoadLocalModuleShowStartup_memsetcurl_global_init
                                                      • String ID: OneClientWnd${51908485-3D48-408a-AC9A-8DA4361CCC61}
                                                      • API String ID: 2477215625-659767991
                                                      • Opcode ID: f705c17f1b9f679891385e97db6e1e1679c1abbab665b6262a4802c80da63b14
                                                      • Instruction ID: c4e544ca9ac8ff6b7a0c8e3d7c7be75e6d9b534a7f9b5585408d96860780c247
                                                      • Opcode Fuzzy Hash: f705c17f1b9f679891385e97db6e1e1679c1abbab665b6262a4802c80da63b14
                                                      • Instruction Fuzzy Hash: 1C51F5B1504300DBD720EF64AC4EB5FB7E8AF85304F008A2DF65997292E778A905C797
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 374 2f1822b-2f1832c memset wsprintfA lstrlen call 2f20ea0 376 2f18331-2f18336 374->376
                                                      APIs
                                                      • memset.MSVCRT ref: 02F1825C
                                                      • wsprintfA.USER32 ref: 02F18303
                                                      • lstrlen.KERNEL32(\Services\%s,00000000), ref: 02F18311
                                                        • Part of subcall function 02F20EA0: LoadLibraryA.KERNEL32(02FECA90,?,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s,02F18331,80000002,?,00000076,00000001,0000005C,00000000), ref: 02F20ECD
                                                        • Part of subcall function 02F20EA0: FreeLibrary.KERNEL32(00000000,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s,02F18331,80000002,?,00000076,00000001,0000005C), ref: 02F2100F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Library$FreeLoadlstrlenmemsetwsprintf
                                                      • String ID: %$C$C$E$M$S$S$S$S$T$Y$\$\$\$\Services\%s$c$e$e$e$e$i$l$n$n$o$o$r$r$r$r$s$s$t$t$t$u$v
                                                      • API String ID: 273645122-2457757079
                                                      • Opcode ID: 42c5c46862f751cbc67d4c707e6aa396825b689d1ee725c19c4e17d1a7f0d84c
                                                      • Instruction ID: 0efa39412d7f6d8cfc6b6286d937243bd5e151dfb8af44b26a604fa8071c401b
                                                      • Opcode Fuzzy Hash: 42c5c46862f751cbc67d4c707e6aa396825b689d1ee725c19c4e17d1a7f0d84c
                                                      • Instruction Fuzzy Hash: EF31FC50D0C6C9D9EF02C6A8C8087DEBFB51B26749F0840D8D6843A282C6FE5758C7BA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CountMutexSleepTicklstrcat$CloseCreateErrorH_prologHandleLastObjectReleaseSingleWait_mbscpyatoirandstrcmpstrncpystrstrwsprintf
                                                      • String ID: SRDSL
                                                      • API String ID: 2889383824-1106944799
                                                      • Opcode ID: cc90962cadc22ee2f40b6247911318f30debcc5cf6ba8b52acb53d5c1297d304
                                                      • Instruction ID: debeba7d51e7b9c6a1ea9d72d146ff7147551017aa4416d131e639a07b1eec4f
                                                      • Opcode Fuzzy Hash: cc90962cadc22ee2f40b6247911318f30debcc5cf6ba8b52acb53d5c1297d304
                                                      • Instruction Fuzzy Hash: E571B272D0425DABEF11DBA4DD48BDEBB7DAF447C4F504496E20AE6080DB709A44CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • __RTC_Initialize.LIBCMT ref: 100032D1
                                                      • GetCommandLineA.KERNEL32(10017030,00000008,1000348C,?,00000001,?,10017050,0000000C,1000342B,?,00000001,?), ref: 100032D6
                                                      • ___crtGetEnvironmentStringsA.LIBCMT ref: 100032E1
                                                        • Part of subcall function 100083B5: GetEnvironmentStringsW.KERNEL32(?,?,?,100032E6), ref: 100083BA
                                                        • Part of subcall function 100083B5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000001,?,?,?,100032E6), ref: 100083EE
                                                        • Part of subcall function 100083B5: __malloc_crt.LIBCMT ref: 100083FC
                                                        • Part of subcall function 100083B5: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000000,?,00000001,?,?,?,100032E6), ref: 10008414
                                                        • Part of subcall function 100083B5: FreeEnvironmentStringsW.KERNEL32(00000000,?,00000001,?,?,?,100032E6), ref: 10008428
                                                      • __ioinit.LIBCMT ref: 100032EB
                                                        • Part of subcall function 10007D02: __lock.LIBCMT ref: 10007D10
                                                        • Part of subcall function 10007D02: __calloc_crt.LIBCMT ref: 10007D21
                                                        • Part of subcall function 10007D02: @_EH4_CallFilterFunc@8.LIBCMT ref: 10007D3C
                                                      • __ioterm.LIBCMT ref: 10003324
                                                        • Part of subcall function 10007FB7: RtlDeleteCriticalSection.NTDLL ref: 10007FD8
                                                      • __mtterm.LIBCMT ref: 100032F4
                                                        • Part of subcall function 10007AAB: RtlDeleteCriticalSection.NTDLL ref: 1000A406
                                                        • Part of subcall function 10007AAB: RtlDeleteCriticalSection.NTDLL(10018D48), ref: 1000A42F
                                                      • __setargv.LIBCMT ref: 100032FB
                                                      • __setenvp.LIBCMT ref: 10003304
                                                      • __cinit.LIBCMT ref: 1000330F
                                                      • __ioterm.LIBCMT ref: 1000335C
                                                      • __mtterm.LIBCMT ref: 10003361
                                                        • Part of subcall function 10004566: GetProcessHeap.KERNEL32(100032B6,10017030,00000008,1000348C,?,00000001,?,10017050,0000000C,1000342B,?,00000001,?), ref: 10004566
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225205779.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10001000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CriticalDeleteEnvironmentSectionStrings$ByteCharMultiWide__ioterm__mtterm$CallCommandFilterFreeFunc@8HeapInitializeLineProcess___crt__calloc_crt__cinit__ioinit__lock__malloc_crt__setargv__setenvp
                                                      • String ID:
                                                      • API String ID: 2078768449-0
                                                      • Opcode ID: 1ff07e01df41c51f43bc9036101a27d537823a682085b93ab876569799a418f3
                                                      • Instruction ID: c9926372871ac720ecac5337bd8bd83f916cd25f6754a275e0084185fc4e90cb
                                                      • Opcode Fuzzy Hash: 1ff07e01df41c51f43bc9036101a27d537823a682085b93ab876569799a418f3
                                                      • Instruction Fuzzy Hash: 7531A479A046129AF316EB719C8270F77D8FF052E5F22C025F904CA19EDF30F6418666
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00798671: CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007441F3,007BC15C,00000001,00000001), ref: 0079868E
                                                      • GetHGlobalFromStream.OLE32(00000001,00000001,007BC15C,00000001,00000001), ref: 0074420B
                                                      • GlobalLock.KERNEL32(?), ref: 00744216
                                                      • CreateDialogIndirectParamW.USER32(?,007BC15C,00000000,00744140,?), ref: 00744245
                                                      • UpdateWindow.USER32(00000000), ref: 0074424E
                                                      • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00744262
                                                      • IsDialogMessageW.USER32(00000000,?), ref: 00744276
                                                      • TranslateMessage.USER32(?), ref: 00744281
                                                      • DispatchMessageW.USER32(?), ref: 0074428C
                                                      • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0074429D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Message$Global$CreateDialogStream$DispatchFromIndirectLockParamTranslateUpdateWindow
                                                      • String ID: @At
                                                      • API String ID: 2943712338-835821491
                                                      • Opcode ID: ed1d80b02f7e91fad9e5f903726c41b9c5cdf6a86e0b4a5a7f0ca99124ac53b8
                                                      • Instruction ID: 16297ef42e52c2175798d41b815db983bd4a4b2cc2c11befd03bc75294a64ab8
                                                      • Opcode Fuzzy Hash: ed1d80b02f7e91fad9e5f903726c41b9c5cdf6a86e0b4a5a7f0ca99124ac53b8
                                                      • Instruction Fuzzy Hash: 8A217AB2104306ABC310DF64DC84F6BBBA8FBC8750F008A1DFA5587260E774D906CBA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 577 2f20c2f-2f20d07 memset * 3 LoadLibraryA RegOpenKeyExA 583 2f20d12-2f20d15 577->583 584 2f20d09-2f20d0d 577->584 585 2f20e59-2f20e68 call 2f20e8a 583->585 586 2f20d1b-2f20d20 583->586 584->585 592 2f20e76-2f20e87 585->592 593 2f20e6a-2f20e70 FreeLibrary 585->593 586->585 588 2f20d26-2f20d29 586->588 590 2f20e1f-2f20e40 588->590 591 2f20d2f-2f20d32 588->591 590->585 599 2f20e42 590->599 594 2f20de7-2f20e07 591->594 595 2f20d38-2f20d3d 591->595 593->592 594->585 602 2f20e09-2f20e0c 594->602 597 2f20db7-2f20dd8 595->597 598 2f20d3f-2f20d42 595->598 597->585 608 2f20dda-2f20de5 597->608 598->585 600 2f20d48-2f20d69 598->600 603 2f20e48-2f20e4c lstrcpy 599->603 600->585 609 2f20d6f 600->609 606 2f20e11-2f20e1d wsprintfA 602->606 607 2f20e52 603->607 606->607 607->585 608->606 610 2f20d75-2f20d7a 609->610 611 2f20dac-2f20db2 610->611 612 2f20d7c-2f20daa call 2f20bf6 * 2 strchr 610->612 611->603 612->610
                                                      APIs
                                                      • memset.MSVCRT ref: 02F20C64
                                                      • memset.MSVCRT ref: 02F20C77
                                                      • memset.MSVCRT ref: 02F20C85
                                                      • LoadLibraryA.KERNEL32(02FECA90,?,?,?,?,?,?,?,00000104,00000000), ref: 02F20C92
                                                      • RegOpenKeyExA.KERNEL32(?,00000001,00000000,00020019,?,?,?,?,?,?,?,?,00000104,00000000), ref: 02F20D02
                                                      • strchr.MSVCRT ref: 02F20D9E
                                                      • lstrcpy.KERNEL32(80000000,?), ref: 02F20E4C
                                                      • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,00000104,00000000), ref: 02F20E70
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: memset$Library$FreeLoadOpenlstrcpystrchr
                                                      • String ID:
                                                      • API String ID: 3614705559-0
                                                      • Opcode ID: f36cf6ea1ae1107ded49093c18672c60087b679093fb9733f5a0a46c0d209669
                                                      • Instruction ID: 51e6208cd1ac96063cb386af7b7158377d3cf5b0433cb6c0700b4f068da7215e
                                                      • Opcode Fuzzy Hash: f36cf6ea1ae1107ded49093c18672c60087b679093fb9733f5a0a46c0d209669
                                                      • Instruction Fuzzy Hash: 9B61BAB2D0022DAFDF219F90DC85AEEBBB9FB19784F00056AF616A1150DB359A54CF60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 617 2f20ea0-2f20f28 LoadLibraryA 624 2f20f86-2f20fa2 RegCreateKeyExA 617->624 625 2f20f2a-2f20f2b 617->625 626 2f21001-2f21005 call 2f2102c 624->626 627 2f20fa4-2f20fb9 RegOpenKeyExA 624->627 625->627 628 2f20f2d-2f20f2e 625->628 635 2f2100a-2f2100c 626->635 627->626 629 2f20fbb-2f20fc0 627->629 630 2f20f60-2f20f75 628->630 631 2f20f30-2f20f31 628->631 629->626 633 2f20fc2-2f20fc5 629->633 630->626 645 2f20f7b-2f20f84 630->645 631->626 634 2f20f37-2f20f4c 631->634 636 2f20fc7-2f20fca 633->636 637 2f20fdd-2f20feb lstrlen 633->637 634->626 647 2f20f52-2f20f5b 634->647 639 2f21015-2f21026 635->639 640 2f2100e-2f2100f FreeLibrary 635->640 641 2f20fd3-2f20fdb 636->641 642 2f20fcc-2f20fcf 636->642 644 2f20fec-2f20ff3 RegSetValueExA 637->644 640->639 641->644 642->637 646 2f20fd1 642->646 648 2f20ff6-2f20ff8 644->648 645->648 646->626 647->648 648->626 649 2f20ffa 648->649 649->626
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(02FECA90,?,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s,02F18331,80000002,?,00000076,00000001,0000005C,00000000), ref: 02F20ECD
                                                      • RegCreateKeyExA.KERNEL32(0000005C,00000001,00000000,00000000,00000000,000F003F,00000000,000000FF,000000FF,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s), ref: 02F20F9D
                                                      • RegOpenKeyExA.KERNEL32(0000005C,00000001,00000000,0002001F,?,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s,02F18331,80000002,?,00000076), ref: 02F20FB4
                                                      • RegSetValueExA.KERNEL32(00000001,00000076,00000000,?,80000002,00000001,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s,02F18331,80000002,?), ref: 02F20FF3
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,02F262F2,02FAC6F8,000000FF,\Services\%s,02F18331,80000002,?,00000076,00000001,0000005C), ref: 02F2100F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Library$CreateFreeLoadOpenValue
                                                      • String ID: \Services\%s
                                                      • API String ID: 141387270-3692262031
                                                      • Opcode ID: 3d0a3f9c5bd2eecb977f8793132c209b9fa2e3906c424e974ef135c459ea15af
                                                      • Instruction ID: 1e96b76b0fcf0430385764001c79cf4375b1077d7ea8e412f44f06d6c42b4b7c
                                                      • Opcode Fuzzy Hash: 3d0a3f9c5bd2eecb977f8793132c209b9fa2e3906c424e974ef135c459ea15af
                                                      • Instruction Fuzzy Hash: 79417F72E4012CBFEF119F94CC84EBEBB7DEB05A84F00402AFA25B2150DB318C449B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 652 6c4d1a10-6c4d1a47 call 6c4d2400 655 6c4d1a4d-6c4d1a73 call 6c4d4280 call 6c4d1ec0 652->655 656 6c4d1b1c-6c4d1b29 call 6c4d3640 652->656 669 6c4d1a8c-6c4d1a95 655->669 670 6c4d1a75-6c4d1a85 655->670 662 6c4d1b2b-6c4d1b49 656->662 663 6c4d1b56-6c4d1b5b call 6c4d4280 656->663 665 6c4d1b4e-6c4d1b51 call 6c4d1530 662->665 666 6c4d1b4b 662->666 668 6c4d1b60-6c4d1b7c call 6c4d1ec0 663->668 665->663 666->665 681 6c4d1b7e-6c4d1b8e 668->681 682 6c4d1b95-6c4d1b9e 668->682 673 6c4d1aad-6c4d1b1b call 6c4d2550 call 6c4d4f5f 669->673 674 6c4d1a97-6c4d1aa0 669->674 670->669 684 6c4d1a87 670->684 678 6c4d1aa5-6c4d1aa8 call 6c4d1530 674->678 679 6c4d1aa2 674->679 678->673 679->678 681->682 693 6c4d1b90 681->693 686 6c4d1bb6-6c4d1c21 call 6c4d2550 call 6c4d4f5f 682->686 687 6c4d1ba0-6c4d1ba9 682->687 684->669 690 6c4d1bae-6c4d1bb1 call 6c4d1530 687->690 691 6c4d1bab 687->691 690->686 691->690 693->682
                                                      APIs
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C4D1AFF
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C4D1C08
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Ios_base_dtorstd::ios_base::_
                                                      • String ID: Failed to create file.$File created successfully.$RNl$RNl
                                                      • API String ID: 323602529-3141791845
                                                      • Opcode ID: ac39d55717d1636bcc6027f0a9e53bedbf52f47630d669c3ef8c7ebd479a5743
                                                      • Instruction ID: b8ec04347027964ac4fe0a660f7943280b16c264b1847f88c261a494aac37039
                                                      • Opcode Fuzzy Hash: ac39d55717d1636bcc6027f0a9e53bedbf52f47630d669c3ef8c7ebd479a5743
                                                      • Instruction Fuzzy Hash: 7551A171A003448FDB50DF98C861F99B7B6EF48338F12869CD81A5BB91DB31E945CB81
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 698 2f13160-2f13190 call 2f13534 ResetEvent socket 701 2f131d2-2f131d4 698->701 702 2f13192-2f1319f gethostbyname 698->702 704 2f1323f-2f13243 701->704 702->701 703 2f131a1-2f131d0 htons connect 702->703 703->701 705 2f131d6-2f131f4 setsockopt 703->705 706 2f13223-2f1323d call 2f204c9 705->706 707 2f131f6-2f1321d WSAIoctl 705->707 706->704 707->706
                                                      APIs
                                                        • Part of subcall function 02F13534: setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 02F13559
                                                        • Part of subcall function 02F13534: CancelIo.KERNEL32(?,?,?,?,02F13170), ref: 02F13562
                                                        • Part of subcall function 02F13534: InterlockedExchange.KERNEL32(?,00000000), ref: 02F1356E
                                                        • Part of subcall function 02F13534: closesocket.WS2_32(?), ref: 02F13577
                                                        • Part of subcall function 02F13534: SetEvent.KERNEL32(?,?,?,?,02F13170), ref: 02F13580
                                                      • ResetEvent.KERNEL32(?), ref: 02F13173
                                                      • socket.WS2_32(00000002,00000001,00000006), ref: 02F13184
                                                      • gethostbyname.WS2_32(?), ref: 02F13195
                                                      • htons.WS2_32(?), ref: 02F131AA
                                                      • connect.WS2_32(?,00000002,00000010), ref: 02F131C7
                                                      • setsockopt.WS2_32(?,0000FFFF,00000008,?,00000004), ref: 02F131EC
                                                      • WSAIoctl.WS2_32(0000000C,98000004,?,0000000C,00000000,00000000,?,00000000,00000000), ref: 02F1321D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Eventsetsockopt$CancelExchangeInterlockedIoctlResetclosesocketconnectgethostbynamehtonssocket
                                                      • String ID:
                                                      • API String ID: 4281462294-0
                                                      • Opcode ID: 3366ed01becd35d389905439753cf1ef9023ac1953f82ae00d40c8cde3291bc1
                                                      • Instruction ID: f02e8f3b7bd8f82e5607110292af3d447ce2bfdc03e30efd98c336a4a92a75e0
                                                      • Opcode Fuzzy Hash: 3366ed01becd35d389905439753cf1ef9023ac1953f82ae00d40c8cde3291bc1
                                                      • Instruction Fuzzy Hash: C9218FB2940348BFE7109FA5DC89EABBBBDEF043A4F004559F701A6290C7B19D14DB20
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 710 744140-744151 711 744161-74416e GetWindowLongW 710->711 712 744153-74415b SetWindowLongW 710->712 713 744170-744175 711->713 714 7441ba-7441bf 711->714 712->711 715 744177-74417a 713->715 716 7441b2-7441b4 PostQuitMessage 713->716 717 7441a3-7441af DestroyWindow 715->717 718 74417c-744181 715->718 716->714 718->714 719 744183-7441a0 KiUserCallbackDispatcher * 2 718->719
                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB,?), ref: 0074415B
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00744164
                                                      • KiUserCallbackDispatcher.NTDLL(?,000000F2,?), ref: 0074418C
                                                      • KiUserCallbackDispatcher.NTDLL ref: 00744195
                                                      • DestroyWindow.USER32(?), ref: 007441A4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$CallbackDispatcherLongUser$Destroy
                                                      • String ID:
                                                      • API String ID: 1893564397-0
                                                      • Opcode ID: 408fab732008b4a313e4e72451d89f8b231bd28cb99966fb8c7b14a98c17dfad
                                                      • Instruction ID: 047038dbdd3f4d7764177e00cbd7c14bb9d7a1fde37789efb2e31e9e132c6371
                                                      • Opcode Fuzzy Hash: 408fab732008b4a313e4e72451d89f8b231bd28cb99966fb8c7b14a98c17dfad
                                                      • Instruction Fuzzy Hash: AB014836204115ABD3219F68DC8CFAB77A9EBD5731F10CB1AF761D21D0C7689851D760
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateFileA.KERNEL32(6C4D1DC8,80000000,00000000,00000000,00000003,00000080,00000000,?,?,6C4D1DC8,C:\Program Files (x86)\IOPL\kl.had,00000015), ref: 6C4D1984
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,6C4D1DC8,C:\Program Files (x86)\IOPL\kl.had,00000015), ref: 6C4D198F
                                                      • ReadFile.KERNEL32(00000000,?,00000000,?,00000000,?,?,6C4D1DC8), ref: 6C4D19AB
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040,?,?,6C4D1DC8), ref: 6C4D19DA
                                                      • _memmove.LIBCMT ref: 6C4D19EF
                                                      • ImmEnumInputContext.IMM32(00000000,00000000,00000000,?,6C4D1DC8), ref: 6C4D19FC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$AllocContextCreateEnumInputReadSizeVirtual_memmove
                                                      • String ID:
                                                      • API String ID: 2308737697-0
                                                      • Opcode ID: d9c72d026f9355017a0f882ad1761901804ead265484850c902977968c981482
                                                      • Instruction ID: 3cf5b37be065397e72fb164aceae8dd60927b4cc86225317452e8fe023ba31f7
                                                      • Opcode Fuzzy Hash: d9c72d026f9355017a0f882ad1761901804ead265484850c902977968c981482
                                                      • Instruction Fuzzy Hash: D201B5716443187AE760F7948C0AFEA367CEB09B1AF110584FB05AA5C1D6A17604C7E5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 727 2f19a16-2f19b24 memset * 2 wsprintfA call 2f20c2f
                                                      APIs
                                                      • memset.MSVCRT ref: 02F19A42
                                                      • memset.MSVCRT ref: 02F19A54
                                                      • wsprintfA.USER32 ref: 02F19AFA
                                                        • Part of subcall function 02F20C2F: memset.MSVCRT ref: 02F20C64
                                                        • Part of subcall function 02F20C2F: memset.MSVCRT ref: 02F20C77
                                                        • Part of subcall function 02F20C2F: memset.MSVCRT ref: 02F20C85
                                                        • Part of subcall function 02F20C2F: LoadLibraryA.KERNEL32(02FECA90,?,?,?,?,?,?,?,00000104,00000000), ref: 02F20C92
                                                        • Part of subcall function 02F20C2F: RegOpenKeyExA.KERNEL32(?,00000001,00000000,00020019,?,?,?,?,?,?,?,?,00000104,00000000), ref: 02F20D02
                                                        • Part of subcall function 02F20C2F: FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,00000104,00000000), ref: 02F20E70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: memset$Library$FreeLoadOpenwsprintf
                                                      • String ID: ConnectGroup$urrentControlSet\Services\%s%s
                                                      • API String ID: 3064224090-2179679831
                                                      • Opcode ID: 5ae7e620b1398e46d738539d0cfac5a9f4be704cda78d06891b50fffd9d3dfa0
                                                      • Instruction ID: 67625231bebc396e2687ecad275bbe2ec14ff237967a294dbe512aed575a8d48
                                                      • Opcode Fuzzy Hash: 5ae7e620b1398e46d738539d0cfac5a9f4be704cda78d06891b50fffd9d3dfa0
                                                      • Instruction Fuzzy Hash: 0D41D250D0C6CDDDEF02C6A8C8487DEBFB55B26349F0840D8D6847A292C6FE575887B6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 10001ACC
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 10001AE2
                                                      • Process32First.KERNEL32(00000000,00000128), ref: 10001AF2
                                                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 10001B25
                                                      • CloseHandle.KERNEL32(00000000), ref: 10001B33
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225205779.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10001000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Close$ChangeCreateFindFirstHandleNotificationProcess32SnapshotToolhelp32_memset
                                                      • String ID:
                                                      • API String ID: 1719118602-0
                                                      • Opcode ID: b25bede1868f6f85b4e914f9e5e9c357d8a014039af851461dd1b57e13ef586e
                                                      • Instruction ID: 58c9c295e5a55647de9048997836f21c034e6ded7aeedff1474f029740eee39c
                                                      • Opcode Fuzzy Hash: b25bede1868f6f85b4e914f9e5e9c357d8a014039af851461dd1b57e13ef586e
                                                      • Instruction Fuzzy Hash: 8E018D75E0112867F7119B559C89FDB77ECDB4D392F0041A1F908D2140F774DE958AA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(?,?), ref: 007440DF
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_000141D0,00000000,00000000,00000000), ref: 007440FF
                                                      • WaitForSingleObject.KERNEL32(00000000,000001F4), ref: 00744116
                                                      • TerminateThread.KERNEL32(00000000,00000000), ref: 0074411F
                                                      • CloseHandle.KERNEL32(00000000), ref: 0074412F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: HandleThread$CloseCreateModuleObjectSingleTerminateWait
                                                      • String ID:
                                                      • API String ID: 3884762193-0
                                                      • Opcode ID: 9f50fd67adf4ba99300d2a1a7ac63f99f929c15b3ab4559955729d6ba58735f9
                                                      • Instruction ID: 2be6c282476aafda594efdc555e3b10944934c218434eef10851361457dd62bc
                                                      • Opcode Fuzzy Hash: 9f50fd67adf4ba99300d2a1a7ac63f99f929c15b3ab4559955729d6ba58735f9
                                                      • Instruction Fuzzy Hash: 74F0F03284263AA7E6212B1C5C0DF9BB654AB21F21F108315FF71B61D0E77C894166D9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • setsockopt.WS2_32(?,0000FFFF,00000080,?,00000004), ref: 02F13559
                                                      • CancelIo.KERNEL32(?,?,?,?,02F13170), ref: 02F13562
                                                      • InterlockedExchange.KERNEL32(?,00000000), ref: 02F1356E
                                                      • closesocket.WS2_32(?), ref: 02F13577
                                                      • SetEvent.KERNEL32(?,?,?,?,02F13170), ref: 02F13580
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CancelEventExchangeInterlockedclosesocketsetsockopt
                                                      • String ID:
                                                      • API String ID: 1486965892-0
                                                      • Opcode ID: 2c66b6398db05cf698308b6b7120520df77ead3a88984f2ebffa46fc22a6f82b
                                                      • Instruction ID: 0937e73b0d8aa573eb94834a5323d027c4657b4e5597142493b699430c8ef81e
                                                      • Opcode Fuzzy Hash: 2c66b6398db05cf698308b6b7120520df77ead3a88984f2ebffa46fc22a6f82b
                                                      • Instruction Fuzzy Hash: 92F03072540719AFDB209B95DC0AA4ABBBCFF04354F104928E382955A0DBB1A954DB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 6C4D1CA0: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C4D1D2D
                                                      • DeleteFileA.KERNEL32(C:\Program Files (x86)\IOPL\kl.had,00000015), ref: 6C4D1DB1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: DeleteFileIos_base_dtorstd::ios_base::_
                                                      • String ID: C:\Program Files (x86)\IOPL\kl.had$C:\Program Files (x86)\IOPL\xz.had$C:\ProgramData\vb.txt
                                                      • API String ID: 1428711500-2858683103
                                                      • Opcode ID: 5c79ecbdd024b22a6d03a1aaa5df56f7d39884888c32eb5d7f3785eef404c885
                                                      • Instruction ID: ed1f0a969c32d4876165fb1f6b7c5e60c70336899144548a79f98d813fa99ae6
                                                      • Opcode Fuzzy Hash: 5c79ecbdd024b22a6d03a1aaa5df56f7d39884888c32eb5d7f3785eef404c885
                                                      • Instruction Fuzzy Hash: 3E01F9B54087809BD604FF949850F46B3E4AB4972AF060A6CFC9A12BC2D735F508CBD3
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 10001595
                                                        • Part of subcall function 10002FC9: _malloc.LIBCMT ref: 10002FE1
                                                      • _com_util::ConvertStringToBSTR.COMSUPP ref: 10001697
                                                      • InterlockedDecrement.KERNEL32(00000008), ref: 100016D7
                                                      • SysFreeString.OLEAUT32(00000000), ref: 100016E8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225205779.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10001000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: String$ConvertDecrementFreeInitializeInterlocked_com_util::_malloc
                                                      • String ID:
                                                      • API String ID: 2535435469-0
                                                      • Opcode ID: b73bb679f5d072da733965cc4b63a5fa5d1046bc435166cc34f03a89613c6429
                                                      • Instruction ID: d996a079971bd67c922b86a1bfa6acac18ee27ea0d097be1e74d043a57693aa1
                                                      • Opcode Fuzzy Hash: b73bb679f5d072da733965cc4b63a5fa5d1046bc435166cc34f03a89613c6429
                                                      • Instruction Fuzzy Hash: E951D5B1C00769EBEB11DFACCC45B9EBBB8FF49710F104619E990A7240EB749A44CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 02F204E2
                                                      • _beginthreadex.MSVCRT ref: 02F20500
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 02F20510
                                                      • CloseHandle.KERNEL32(?), ref: 02F20519
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateEventHandleObjectSingleWait_beginthreadex
                                                      • String ID:
                                                      • API String ID: 92035984-0
                                                      • Opcode ID: 8037fdf9c5cad71e96d6fe2d1b085d5c804cbc711e2c1a5e17d155abde2a1b0a
                                                      • Instruction ID: af16ba9dd5b511895d1b6f0cc56fcfed4f37c7e3f937c4f1d04e7d22fd4d3561
                                                      • Opcode Fuzzy Hash: 8037fdf9c5cad71e96d6fe2d1b085d5c804cbc711e2c1a5e17d155abde2a1b0a
                                                      • Instruction Fuzzy Hash: 2EF0BDB6D0011DFFDF019FA8DD058EEBBB9FB04251B008556FD21E2250E7318E209BA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Xfsopenstd::_$_fseek
                                                      • String ID:
                                                      • API String ID: 1675860589-0
                                                      • Opcode ID: 8bdc07a0eb3a3a7600f37e084f181f83da16c342b04b669b0d046122297f4c93
                                                      • Instruction ID: 6895f7047bab4c1671fcefaafd8adfd4a164e9ef0e0e122955eb1e67a408d835
                                                      • Opcode Fuzzy Hash: 8bdc07a0eb3a3a7600f37e084f181f83da16c342b04b669b0d046122297f4c93
                                                      • Instruction Fuzzy Hash: B71108A2E4220567EB11F5549C31FAF3796DB0639AF270024AE64C1F81DE24F402C280
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ??2@$??3@
                                                      • String ID:
                                                      • API String ID: 1245774677-0
                                                      • Opcode ID: 5dabfb546e616d69a54bc86f4f6721239987bcea9cc5490cfcbdcac44bb036b6
                                                      • Instruction ID: a9b5ac9375326c081752af126fed147257cb48411cf798e99dbb73101842917b
                                                      • Opcode Fuzzy Hash: 5dabfb546e616d69a54bc86f4f6721239987bcea9cc5490cfcbdcac44bb036b6
                                                      • Instruction Fuzzy Hash: 231115B1C41218EFD700DF89E589899FBF8FF08790B50C46EE20997251D770AA14DF90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog.LIBCMT ref: 02F2046A
                                                      • memcpy.MSVCRT ref: 02F20489
                                                      • SetEvent.KERNEL32(?), ref: 02F20494
                                                        • Part of subcall function 02F2076B: LoadLibraryA.KERNEL32(02FED6D4), ref: 02F20793
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: EventH_prologLibraryLoadmemcpy
                                                      • String ID:
                                                      • API String ID: 3518138586-0
                                                      • Opcode ID: bb35768bf5be9c65cc0f38792cbd823de3575de59d6a482112be9b232998f124
                                                      • Instruction ID: d653ea99023cf9aba913e6ec9b8b49a282540f0abe25ef718c60056f8f607bf8
                                                      • Opcode Fuzzy Hash: bb35768bf5be9c65cc0f38792cbd823de3575de59d6a482112be9b232998f124
                                                      • Instruction Fuzzy Hash: A8F0F9B2D00218AFDB01EFA8DE859EEBFB9EF19790F10442AE501B2251D7755A148EA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00000001,00003000,00000040,?,?,6C4D1DC8), ref: 6C4D19DA
                                                      • _memmove.LIBCMT ref: 6C4D19EF
                                                      • ImmEnumInputContext.IMM32(00000000,00000000,00000000,?,6C4D1DC8), ref: 6C4D19FC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AllocContextEnumInputVirtual_memmove
                                                      • String ID:
                                                      • API String ID: 3976186603-0
                                                      • Opcode ID: e4dfab72050ad13f7073ab8df1c6fcfe09acd9e963937dcd5d71f396b90c7aa4
                                                      • Instruction ID: c0cfaab3ad19560b55dbe829282ded3fdfaa230a051d31409b47db7a5b7c1322
                                                      • Opcode Fuzzy Hash: e4dfab72050ad13f7073ab8df1c6fcfe09acd9e963937dcd5d71f396b90c7aa4
                                                      • Instruction Fuzzy Hash: EAE02230A483082AD720F7104C0AFBA37A8EB09B2EF010584FF1C965C1D262211486D2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _fputc
                                                      • String ID:
                                                      • API String ID: 4236582747-3916222277
                                                      • Opcode ID: d8eeac8ec00e4db613c7292946e3b46e0fce47859498cb9fcbad418bd7cd0149
                                                      • Instruction ID: 80cb4152e13ee82945c9ba207baf53f9f012c949a395232e34580936f00ccb94
                                                      • Opcode Fuzzy Hash: d8eeac8ec00e4db613c7292946e3b46e0fce47859498cb9fcbad418bd7cd0149
                                                      • Instruction Fuzzy Hash: 23718032A016099FCB24DF98D990E9EF7B5FB48715F114A6EE81593B40DB31BD44CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,007441F3,007BC15C,00000001,00000001), ref: 0079868E
                                                        • Part of subcall function 007988AF: __aullrem.LIBCMT ref: 007988F9
                                                        • Part of subcall function 00798926: lstrlenW.KERNEL32(00000008,?,00798701,?,00000002,?,?,?,?,007441F3,007BC15C,00000001,00000001), ref: 00798933
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CreateGlobalStream__aullremlstrlen
                                                      • String ID: MS SHELL DLG
                                                      • API String ID: 287796976-1522538486
                                                      • Opcode ID: a752b8dace7724bc3ae0f6e3a3d1cdf02d4006a2f95a78d22583da3b20155504
                                                      • Instruction ID: 462556b90ec61dab67d9ee29349a445debaad3a5ca59c2ff20f536ca088efafb
                                                      • Opcode Fuzzy Hash: a752b8dace7724bc3ae0f6e3a3d1cdf02d4006a2f95a78d22583da3b20155504
                                                      • Instruction Fuzzy Hash: 60212AB5910208AFDB10EFA8DC89EBEB7BCFF8A744B10845DF115DB240DB7499018B61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 6C4D2550: std::_Lockit::_Lockit.LIBCPMT ref: 6C4D25D2
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 6C4D1D2D
                                                        • Part of subcall function 6C4D4F5F: std::ios_base::_Tidy.LIBCPMT ref: 6C4D4F80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: std::ios_base::_$Ios_base_dtorLockitLockit::_Tidystd::_
                                                      • String ID: RNl
                                                      • API String ID: 3925221016-1855566928
                                                      • Opcode ID: 33dbe3a5b4c562d38a88a1c382c9be5582419b7d54d75ec36e114e4b2b5c2387
                                                      • Instruction ID: 8569a1775632d59d231eb6d528220a136cafe7aa3ac9ba52f8195e42bc3a1b32
                                                      • Opcode Fuzzy Hash: 33dbe3a5b4c562d38a88a1c382c9be5582419b7d54d75ec36e114e4b2b5c2387
                                                      • Instruction Fuzzy Hash: 90115BB19016499BDB14DF88D965FD9B7B4FB08310F10439DE92957BC0DB30AA09CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ??3@malloc
                                                      • String ID:
                                                      • API String ID: 3530088491-0
                                                      • Opcode ID: c7b40a89799137a04bdc428f207c7e7bf526b987e2f5367944476573b76949fe
                                                      • Instruction ID: e474d2b88a2d805049e55b967f3791a0571898183e71d35f907f26960b3307be
                                                      • Opcode Fuzzy Hash: c7b40a89799137a04bdc428f207c7e7bf526b987e2f5367944476573b76949fe
                                                      • Instruction Fuzzy Hash: E311E332E152158FE724EF24EA557217BE8F715785F21442EEA82C614CEB38A804CF04
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 6C4D97C0: __getptd_noexit.LIBCMT ref: 6C4D97C0
                                                      • __lock_file.LIBCMT ref: 6C4D6505
                                                        • Part of subcall function 6C4D5D15: __lock.LIBCMT ref: 6C4D5D3A
                                                      • __fclose_nolock.LIBCMT ref: 6C4D6510
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                      • String ID:
                                                      • API String ID: 2800547568-0
                                                      • Opcode ID: c1ccf2db6d413218f3dd3e5ec854f0e08e895726a74de6e87c4a43aec08c5975
                                                      • Instruction ID: 8268589ed36da649300aba94f94a75d186e48e12971ed8fbe9db19e63ed718e6
                                                      • Opcode Fuzzy Hash: c1ccf2db6d413218f3dd3e5ec854f0e08e895726a74de6e87c4a43aec08c5975
                                                      • Instruction Fuzzy Hash: 44F062308117159ADB10FF689824FDE7BB06F0133AF138A1D9464DAAC0CB78B5468AD9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 02F204C9: CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000), ref: 02F204E2
                                                        • Part of subcall function 02F204C9: _beginthreadex.MSVCRT ref: 02F20500
                                                        • Part of subcall function 02F204C9: WaitForSingleObject.KERNEL32(?,000000FF), ref: 02F20510
                                                        • Part of subcall function 02F204C9: CloseHandle.KERNEL32(?), ref: 02F20519
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?,?,?,02F1932B), ref: 02F19053
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,02F1932B), ref: 02F1905A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleObjectSingleWait$CreateEvent_beginthreadex
                                                      • String ID:
                                                      • API String ID: 1089044457-0
                                                      • Opcode ID: e37caede9a6ec690d7db6a52b329d63a30d1027f8d79518ea61ec212471d0e1c
                                                      • Instruction ID: b816f32eda383f5d0be77c3a0a5c4a140230e8397dcb9fe086562810f0cef699
                                                      • Opcode Fuzzy Hash: e37caede9a6ec690d7db6a52b329d63a30d1027f8d79518ea61ec212471d0e1c
                                                      • Instruction Fuzzy Hash: 02D0C9B294A6243EF55026A47D09EBB360CCF226F0B140A51FE19D6184E9545D514AB5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 6C4D1D50: DeleteFileA.KERNEL32(C:\Program Files (x86)\IOPL\kl.had,00000015), ref: 6C4D1DB1
                                                      • ExitProcess.KERNEL32 ref: 6C4D1E07
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: DeleteExitFileProcess
                                                      • String ID:
                                                      • API String ID: 347990711-0
                                                      • Opcode ID: 799d9c625f25715d7779009bf9a8c86ec680d6e54861193afb42877c425aa66c
                                                      • Instruction ID: 2f66480227ae62e664e84b74d109bebb8ea85e7b04817810539da787b0e556b9
                                                      • Opcode Fuzzy Hash: 799d9c625f25715d7779009bf9a8c86ec680d6e54861193afb42877c425aa66c
                                                      • Instruction Fuzzy Hash: 3990023025410056E990FEA0451DF4C36305B06756F020244F60B645954B50714895D6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225205779.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10001000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 81b4fb6500594eff6a013853db03c6ef7143a8f71c95312bb16587add7143239
                                                      • Instruction ID: a9ef87dee4ec13ce1e9a5cdf3c439bcb80fbf23240e4ff2530583432088a619a
                                                      • Opcode Fuzzy Hash: 81b4fb6500594eff6a013853db03c6ef7143a8f71c95312bb16587add7143239
                                                      • Instruction Fuzzy Hash: B0C1F771A00219AFDB50DFA8CC88FEEBBB9FF49304F104198E509EB250DB75A945CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3224951471.0000000002F11000.00000020.00001000.00020000.00000000.sdmp, Offset: 02F11000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_2f11000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 45499689494fcb9e5811dd326941926bd9784cd5b50696ca477517246bbd160f
                                                      • Instruction ID: 284c3456a3fa05d8e521997b7cd83a306d1204a44128c26826ccadfeec8472c6
                                                      • Opcode Fuzzy Hash: 45499689494fcb9e5811dd326941926bd9784cd5b50696ca477517246bbd160f
                                                      • Instruction Fuzzy Hash: DBB13170540B84AEFB32AF36DC05E6BBFE1EB80B40B01492EF6AB46520D771A855DF50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _memmove
                                                      • String ID:
                                                      • API String ID: 4104443479-0
                                                      • Opcode ID: 3d0b8c23d1b716bd78c2b2216eaa5b86c43b6e07cd4b42719cdb8e675e89483e
                                                      • Instruction ID: fb6ba3b3e3f5770084ebd5de42efa35632429040fd5be8c5506306907abe19b3
                                                      • Opcode Fuzzy Hash: 3d0b8c23d1b716bd78c2b2216eaa5b86c43b6e07cd4b42719cdb8e675e89483e
                                                      • Instruction Fuzzy Hash: CC317E355043159BCB10DE28C854E8A73A0FF45325F158A6EFC6887740DB70EE448BD2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 6C4D3DB0: std::_Lockit::_Lockit.LIBCPMT ref: 6C4D3DC1
                                                        • Part of subcall function 6C4D4540: std::_Lockit::_Lockit.LIBCPMT ref: 6C4D4563
                                                        • Part of subcall function 6C4D4540: std::_Lockit::_Lockit.LIBCPMT ref: 6C4D4586
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 6C4D35DA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225314704.000000006C4D1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 6C4D0000, based on PE: true
                                                      • Associated: 00000006.00000002.3225298659.000000006C4D0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225335252.000000006C4E5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225352542.000000006C4EB000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                      • Associated: 00000006.00000002.3225369423.000000006C4EF000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_6c4d0000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LockitLockit::_std::_
                                                      • String ID:
                                                      • API String ID: 3382485803-0
                                                      • Opcode ID: dbe79061a6a4436d188624a18c0e53c67d13a1f2b0c80809ef31fdf908ba9bdf
                                                      • Instruction ID: 446bf841c2388383238c399333bc9104ec89efeccea92b3bc5fa6ade8adbebbc
                                                      • Opcode Fuzzy Hash: dbe79061a6a4436d188624a18c0e53c67d13a1f2b0c80809ef31fdf908ba9bdf
                                                      • Instruction Fuzzy Hash: 6E2195B2A00504ABD710EF58DC50FA9B3B8EB45B24F12472DF82997BC0DB35B904C6D0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 10001B50: LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 10001B99
                                                        • Part of subcall function 10001B50: GetProcAddress.KERNEL32(00000000), ref: 10001BA0
                                                        • Part of subcall function 10001B50: OpenProcess.KERNEL32(00001000,00000000,00000000,?,?,?,?,?,?,?,?,?), ref: 10001BC1
                                                        • Part of subcall function 10001B50: OpenProcessToken.ADVAPI32(00000000,000F01FF,?,?,?,?,?,?,?,?,?,?), ref: 10001BD6
                                                        • Part of subcall function 10001B50: LookupPrivilegeValueA.ADVAPI32(00000000,10016908,FFFFFFFF), ref: 10001BE8
                                                        • Part of subcall function 10001B50: AdjustTokenPrivileges.KERNELBASE(?,?,?,?,00000001,?,00000010,00000000,00000000), ref: 10001C1F
                                                        • Part of subcall function 10001B50: LoadLibraryA.KERNEL32(1001692C,1001691C,?,?,?,?,00000001,?,00000010,00000000,00000000), ref: 10001C6C
                                                        • Part of subcall function 10001B50: GetProcAddress.KERNEL32(00000000), ref: 10001C73
                                                        • Part of subcall function 10001560: CoInitialize.OLE32(00000000), ref: 10001595
                                                        • Part of subcall function 10001560: _com_util::ConvertStringToBSTR.COMSUPP ref: 10001697
                                                      • _wprintf.LIBCMT ref: 10001CC4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3225205779.0000000010001000.00000020.00001000.00020000.00000000.sdmp, Offset: 10001000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_10001000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressLibraryLoadOpenProcProcessToken$AdjustConvertInitializeLookupPrivilegePrivilegesStringValue_com_util::_wprintf
                                                      • String ID:
                                                      • API String ID: 3474402026-0
                                                      • Opcode ID: b16fa08af9a59717ea8b9bb21d24edcea7d0cc9c98c9e52c2ce8b542fce83b8a
                                                      • Instruction ID: ef113caa98e82db254932f76eb1cecd2457d51a8269c6171abc01cd5d7c1cf58
                                                      • Opcode Fuzzy Hash: b16fa08af9a59717ea8b9bb21d24edcea7d0cc9c98c9e52c2ce8b542fce83b8a
                                                      • Instruction Fuzzy Hash: 6CF027786001044BF604EB749C4A9563398DF012C6B00026CFC198B666EB32E860C692
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • HeapCreate.KERNEL32(00000000,00001000,00000000), ref: 0079D894
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CreateHeap
                                                      • String ID:
                                                      • API String ID: 10892065-0
                                                      • Opcode ID: 9d03377dca24b8480585aecf951df0f10b8d4b0d9baa6d80ae8dac7056e8fa2b
                                                      • Instruction ID: 77821e2fe3303e0d987640d7d1a1b38a6aae72bc54009efd439aac1260b9fe82
                                                      • Opcode Fuzzy Hash: 9d03377dca24b8480585aecf951df0f10b8d4b0d9baa6d80ae8dac7056e8fa2b
                                                      • Instruction Fuzzy Hash: 4AD05E32591349AAEB105F74BC08B623BECA3C4395F00C476B90CC6150E6B8C9829508
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 007483F0
                                                      • IsIconic.USER32(?), ref: 007484AB
                                                      • ScreenToClient.USER32(?,?), ref: 00748513
                                                      • GetCursorPos.USER32(?), ref: 007485E7
                                                      • ScreenToClient.USER32(?,?), ref: 007485FA
                                                      • GetTickCount.KERNEL32 ref: 00748667
                                                      • GetTickCount.KERNEL32 ref: 007486BE
                                                      • GetActiveWindow.USER32 ref: 00748717
                                                      • GetWindow.USER32(?,00000004), ref: 00748724
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00748734
                                                      • GetParent.USER32(?), ref: 00748747
                                                      • SetFocus.USER32(00000000), ref: 00748754
                                                      • DestroyWindow.USER32(00000000), ref: 0074876B
                                                      • _memset.LIBCMT ref: 0074878D
                                                      • BeginPaint.USER32(?,?), ref: 0074879F
                                                      • EndPaint.USER32(?,?), ref: 007487C6
                                                      • GetClientRect.USER32(?,?), ref: 007487F1
                                                      • IsRectEmpty.USER32(?), ref: 0074882F
                                                      • _memset.LIBCMT ref: 0074884B
                                                      • BeginPaint.USER32(?,?), ref: 00748860
                                                      • GetUpdateRect.USER32(?,?,00000000), ref: 007488B5
                                                      • IsRectEmpty.USER32(?), ref: 0074890F
                                                      • DeleteDC.GDI32(?), ref: 0074894B
                                                      • DeleteDC.GDI32(?), ref: 0074895C
                                                      • DeleteObject.GDI32(?), ref: 0074896D
                                                      • DeleteObject.GDI32(?), ref: 00748980
                                                      • _memset.LIBCMT ref: 00748B37
                                                      • CreateCompatibleDC.GDI32(?), ref: 00748BA4
                                                      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 00748C09
                                                      • _memset.LIBCMT ref: 00748C25
                                                      • BeginPaint.USER32(?,?), ref: 00748C3A
                                                      • SelectObject.GDI32(?,?), ref: 00748C59
                                                      • SaveDC.GDI32(?), ref: 00748C6B
                                                      • IsWindow.USER32(00000000), ref: 00748D1F
                                                      • IsWindowVisible.USER32(00000000), ref: 00748D61
                                                      • IntersectRect.USER32(00000000,?,?), ref: 00748DA4
                                                      • CreateCompatibleDC.GDI32(?), ref: 00748DBF
                                                      • _memset.LIBCMT ref: 00748E1D
                                                      • SelectObject.GDI32(00000000,?), ref: 00748E2C
                                                      • SendMessageW.USER32(00000000,00000317,00000000,00000035), ref: 00748E41
                                                      • BitBlt.GDI32(?,?,?,?,?,00000000,00000000,00000000,00CC0020), ref: 00748EDC
                                                      • SelectObject.GDI32(00000000,?), ref: 00748EE9
                                                      • DeleteObject.GDI32(?), ref: 00748EF5
                                                      • DeleteDC.GDI32(00000000), ref: 00748EFC
                                                      • RestoreDC.GDI32(?,?), ref: 00748F53
                                                      • GetWindowRect.USER32(?,00000000), ref: 00748F85
                                                      • CreateCompatibleDC.GDI32(?), ref: 00749013
                                                      • _memset.LIBCMT ref: 00749057
                                                      • SelectObject.GDI32(?,?), ref: 0074906B
                                                        • Part of subcall function 0074B036: GetWindowRect.USER32(?,?), ref: 0074B042
                                                        • Part of subcall function 0074B036: ScreenToClient.USER32(?,?), ref: 0074B05B
                                                        • Part of subcall function 0074B036: ScreenToClient.USER32(?,?), ref: 0074B063
                                                      • _memset.LIBCMT ref: 0074909C
                                                      • BitBlt.GDI32(?,?,?,?,?,?,?,?,00CC0020), ref: 0074930A
                                                      • SelectObject.GDI32(?,?), ref: 00749322
                                                      • SelectObject.GDI32(?), ref: 0074934A
                                                      • GetStockObject.GDI32(00000005), ref: 00749350
                                                      • SelectObject.GDI32(?,00000000), ref: 0074935D
                                                      • Rectangle.GDI32(?,?,?,?,?), ref: 0074937D
                                                      • SelectObject.GDI32(?,00000000), ref: 0074938A
                                                      • EndPaint.USER32(?,?), ref: 007493D2
                                                        • Part of subcall function 00757B98: CreateDIBSection.GDI32(?,00000000,00000000,?,00000000,00000000), ref: 00757BEC
                                                      • SaveDC.GDI32(?), ref: 00749394
                                                      • RestoreDC.GDI32(?,00000000), ref: 007493BF
                                                      • GetFocus.USER32 ref: 00749407
                                                      • GetParent.USER32(00000000), ref: 00749423
                                                      • GetTickCount.KERNEL32 ref: 0074959F
                                                      • GetTickCount.KERNEL32 ref: 00749614
                                                      • GetTickCount.KERNEL32 ref: 00749694
                                                      • ScreenToClient.USER32(?,?), ref: 007496FC
                                                      • GetTickCount.KERNEL32 ref: 00749755
                                                      • SendMessageW.USER32(?,00002111,00000000,?), ref: 0074978D
                                                      • GetTickCount.KERNEL32 ref: 007494A2
                                                        • Part of subcall function 0074777C: GetKeyState.USER32(00000011), ref: 00747788
                                                        • Part of subcall function 0074777C: GetKeyState.USER32(00000002), ref: 00747794
                                                        • Part of subcall function 0074777C: GetKeyState.USER32(00000001), ref: 007477A0
                                                        • Part of subcall function 0074777C: GetKeyState.USER32(00000010), ref: 007477AC
                                                        • Part of subcall function 0074777C: GetKeyState.USER32(00000012), ref: 007477B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Object$SelectWindow$CountRectTick_memset$ClientDelete$CreatePaintScreenState$Compatible$Begin$EmptyFocusMessageParentRestoreSaveSend$ActiveBitmapCursorDestroyH_prolog3_IconicIntersectLongRectangleSectionStockUpdateVisible
                                                      • String ID: tooltips_class32$windowinit
                                                      • API String ID: 2442542815-1250824750
                                                      • Opcode ID: 6215948b81dd6d7f99ef1aa01840d75138b396766f0a67ae2e9eb9878899ea01
                                                      • Instruction ID: bf82ee0968337693092ef4ff0721ce606b51fba0397723a04d145336559ab200
                                                      • Opcode Fuzzy Hash: 6215948b81dd6d7f99ef1aa01840d75138b396766f0a67ae2e9eb9878899ea01
                                                      • Instruction Fuzzy Hash: B2232A71900219DFDF61CF68CD84BEAB7B5BF49300F0441A9EA09AB255DB399E84CF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ___getlocaleinfo
                                                      • String ID:
                                                      • API String ID: 1937885557-0
                                                      • Opcode ID: 660ecf63642404dad71e0016a8e6e9f3857923b07e439564f96fa1097a436cf5
                                                      • Instruction ID: 27c496b67cb9494e058949b6f29de2de8be9421a6e503741fb16f38a45c390fc
                                                      • Opcode Fuzzy Hash: 660ecf63642404dad71e0016a8e6e9f3857923b07e439564f96fa1097a436cf5
                                                      • Instruction Fuzzy Hash: 7BE1EFB394020DFEEF21DAE0CD85DFF77BEEB04744F05092AB665D2041EA74AA159760
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00785864: __EH_prolog3_GS.LIBCMT ref: 0078586E
                                                        • Part of subcall function 00785F48: __EH_prolog3.LIBCMT ref: 00785F4F
                                                        • Part of subcall function 00785F48: SHGetValueA.SHLWAPI(80000002,Software\projone\podlp\volatile\,upgraded,-00000020,-0000001C,-00000024,?,lblDepName,00000001,?), ref: 00785FE1
                                                      • SHGetValueW.SHLWAPI(80000002,Software\projone\podlp\,offlineMode,?,?,?,?,lblRuleUptime,00000001), ref: 00736613
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Value$H_prolog3H_prolog3_
                                                      • String ID: AllowModifyClientInfo$AllowModifyHardwareCustom$AllowViewRules$Software\projone\podlp\$Software\projone\podlp\volatile\$btnClearRules$btnHardwareCustomWnd$btnModifyDepAndName$btnViewRule$clearrule.png$lblClienId$lblClienName$lblClientVer$lblDepName$lblIp$lblMac$lblOnlineStatus$lblPcName$lblRuleUptime$offlineMode$ruleCleaned$updaterule.png
                                                      • API String ID: 948544424-3623742499
                                                      • Opcode ID: 125f1b92739dee9bce2f8655d343fe70c3089c0530fc16e929fb6aa1068add87
                                                      • Instruction ID: fea81759a5e0b65384b5101fb434861f98efb31fff2de09ecbb4f5e5cda5dbad
                                                      • Opcode Fuzzy Hash: 125f1b92739dee9bce2f8655d343fe70c3089c0530fc16e929fb6aa1068add87
                                                      • Instruction Fuzzy Hash: E1F1D4B1508340EFE725DB24C885BAFB7E5AFD8304F44892DF58997252EB78E904CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00781F0A: __EH_prolog3.LIBCMT ref: 00781F29
                                                        • Part of subcall function 00781F0A: _memset.LIBCMT ref: 00781F79
                                                        • Part of subcall function 00781F0A: SHGetValueW.SHLWAPI(80000002,?,?,?,00000000,00000000,?,?,0000001C), ref: 00781F9E
                                                        • Part of subcall function 00781F0A: _malloc.LIBCMT ref: 00781FBE
                                                        • Part of subcall function 00781F0A: _memset.LIBCMT ref: 00781FCF
                                                        • Part of subcall function 00781F0A: SHGetValueW.SHLWAPI(80000002,?,00000007,00000000,00000000,00000000,?,?,?,00000000,00000000,?,?,0000001C), ref: 00781FF0
                                                      • PathIsDirectoryW.SHLWAPI(?), ref: 0073F17F
                                                      • GetDiskFreeSpaceExW.KERNEL32(?,00000000,00000000,?), ref: 0073F1A8
                                                      • PathIsDirectoryW.SHLWAPI(?), ref: 0073F050
                                                        • Part of subcall function 00781DF9: wvnsprintfW.SHLWAPI(?,00002800,?,?), ref: 00781E33
                                                      • GetLogicalDrives.KERNEL32 ref: 0073F08D
                                                      • GetDriveTypeW.KERNEL32(?), ref: 0073F0F9
                                                      • lstrlenW.KERNEL32(?), ref: 0073F35B
                                                      • lstrlenW.KERNEL32(?), ref: 0073F368
                                                      • SHSetValueW.SHLWAPI(80000002,Software\projone\podlp\dlpcore\,bakpath,00000001,?,00000002), ref: 0073F389
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Value$DirectoryPath_memsetlstrlen$DiskDriveDrivesFreeH_prolog3LogicalSpaceType_mallocwvnsprintf
                                                      • String ID: %c:\$%c:\podlp_backup$Software\projone\podlp\dlpcore\$bakpath
                                                      • API String ID: 4032481001-2789667252
                                                      • Opcode ID: d380211109647c6267b9013583b49b32ed98685d87a2af890235abe3f55af01e
                                                      • Instruction ID: 924c21230ca20bda022c8a6f736b233cf4a010a354fa7610c8a807f2b6ae8533
                                                      • Opcode Fuzzy Hash: d380211109647c6267b9013583b49b32ed98685d87a2af890235abe3f55af01e
                                                      • Instruction Fuzzy Hash: 81B19C71908384DBEB20DF24D845BAFB7E9BF85B40F104A2DF59987292E738D904CB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 00780760
                                                      • GetCurrentDirectoryW.KERNEL32(00000208,?,?,00000000,00000000), ref: 00780774
                                                      • PathAppendW.SHLWAPI(?,00000000), ref: 00780782
                                                      • GetFileAttributesW.KERNEL32(00000000,?,00000000,00000000), ref: 0078078B
                                                      • lstrcpyW.KERNEL32(?,00000000), ref: 007807B0
                                                      • PathAppendW.SHLWAPI(?,007BFFE0), ref: 007807BE
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 007807CE
                                                      • lstrcmpW.KERNEL32(?,007C7D98), ref: 007807F9
                                                      • lstrcmpW.KERNEL32(?,007C7D9C), ref: 00780813
                                                      • lstrcpyW.KERNEL32(?,00000000), ref: 00780836
                                                      • PathAppendW.SHLWAPI(?,?), ref: 00780846
                                                      • FindNextFileW.KERNEL32(?,?), ref: 007808DA
                                                      • FindClose.KERNEL32(?), ref: 007808FA
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AppendFileFindPath$lstrcmplstrcpy$AttributesCloseCurrentDirectoryFirstNext_memset
                                                      • String ID:
                                                      • API String ID: 223570037-0
                                                      • Opcode ID: 01eedaf9fa56e46139f8684ac3c0c16078a3828821f36bd86797210f41989de1
                                                      • Instruction ID: 274aae2e1f5cee40cbf9e8b4300136d611942c8b00ae28ca1974081f519c9c66
                                                      • Opcode Fuzzy Hash: 01eedaf9fa56e46139f8684ac3c0c16078a3828821f36bd86797210f41989de1
                                                      • Instruction Fuzzy Hash: 31512072A4031D9BDFA0AB64DC48FD977B8BF05310F0085A9E619E2550DB789EC8DF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowRect.USER32(?,00000000), ref: 007467CB
                                                      • GetParent.USER32(?), ref: 007467E1
                                                      • GetWindow.USER32(?,00000004), ref: 007467EC
                                                      • MonitorFromWindow.USER32(?,00000002), ref: 00746813
                                                      • GetMonitorInfoW.USER32(00000000), ref: 0074681A
                                                      • IsIconic.USER32(00000000), ref: 00746833
                                                      • GetWindowRect.USER32(00000000,00000000), ref: 00746844
                                                      • SetWindowPos.USER32(?,00000000,?,?,000000FF,000000FF,00000015), ref: 007468D2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$MonitorRect$FromIconicInfoParent
                                                      • String ID: (
                                                      • API String ID: 1680950861-3887548279
                                                      • Opcode ID: acde1ab57701873b5407cabaab5133c12de640f41ac5d0f44bc9633727ff52a0
                                                      • Instruction ID: c1ec7497d1180b8352b5a82bf039b0f5a22252e2717ae4cc91332d584b2a6665
                                                      • Opcode Fuzzy Hash: acde1ab57701873b5407cabaab5133c12de640f41ac5d0f44bc9633727ff52a0
                                                      • Instruction Fuzzy Hash: 93416D32A00609AFDF01CFB8CC89AEEBBBAFB49315F158624E605F7190D774AD458B51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EmptyClipboard.USER32 ref: 00781594
                                                      • lstrlenW.KERNEL32(00000004,?,?,00737C8A), ref: 007815A8
                                                      • GlobalAlloc.KERNEL32(00000002,?,?,00737C8A), ref: 007815B5
                                                      • GlobalLock.KERNEL32(00000000,?,00737C8A), ref: 007815C2
                                                      • lstrcpyW.KERNEL32(00000000,00000004), ref: 007815CE
                                                      • GlobalUnlock.KERNEL32(00000000,?,00737C8A), ref: 007815D5
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 007815DE
                                                      • GlobalFree.KERNEL32(00000000), ref: 007815EC
                                                      • CloseClipboard.USER32 ref: 007815F3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Global$Clipboard$AllocCloseDataEmptyFreeLockUnlocklstrcpylstrlen
                                                      • String ID:
                                                      • API String ID: 423645850-0
                                                      • Opcode ID: 5710c3aae00e70ba41fa74e49c0664d4248f70bf2c1070997509605d0387fe94
                                                      • Instruction ID: 4b1cc746c113141a0188a4b888acfa174fac7cc4415123bc3325b5eb35082401
                                                      • Opcode Fuzzy Hash: 5710c3aae00e70ba41fa74e49c0664d4248f70bf2c1070997509605d0387fe94
                                                      • Instruction Fuzzy Hash: 3DF04F31641626ABD7112BB5AC4CF5B3A6CBF497027448214FB17C1251CF2CC916C769
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32 ref: 0079C466
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 0079C47B
                                                      • UnhandledExceptionFilter.KERNEL32(007B9820), ref: 0079C486
                                                      • GetCurrentProcess.KERNEL32(C0000409), ref: 0079C4A2
                                                      • TerminateProcess.KERNEL32(00000000), ref: 0079C4A9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                      • String ID:
                                                      • API String ID: 2579439406-0
                                                      • Opcode ID: 5b6f1d319a8d2325ea92432f45fbbfeac2477e0face45338ae7ca715caa51f88
                                                      • Instruction ID: 23093d9796d94114b0222cf92f30d50b880d93e9076da99c79454f7c9545f771
                                                      • Opcode Fuzzy Hash: 5b6f1d319a8d2325ea92432f45fbbfeac2477e0face45338ae7ca715caa51f88
                                                      • Instruction Fuzzy Hash: 3C21CFB65022089FDB00DF68FA49A443BB1FB48305F54C21BE71987270E7B99881DB09
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyState.USER32(00000011), ref: 00747788
                                                      • GetKeyState.USER32(00000002), ref: 00747794
                                                      • GetKeyState.USER32(00000001), ref: 007477A0
                                                      • GetKeyState.USER32(00000010), ref: 007477AC
                                                      • GetKeyState.USER32(00000012), ref: 007477B8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: State
                                                      • String ID:
                                                      • API String ID: 1649606143-0
                                                      • Opcode ID: 9428577f1cde27624cdac7298a58162273303164d0e97bd4a35c1c8c11ef8b7f
                                                      • Instruction ID: a8ecf9db214d8635127736f50da40074e128ff49afac5345ed6fdeea636092cf
                                                      • Opcode Fuzzy Hash: 9428577f1cde27624cdac7298a58162273303164d0e97bd4a35c1c8c11ef8b7f
                                                      • Instruction Fuzzy Hash: 7DE09A2AF476AA90FD5621A62E4AFFA0D554BD0FD4FC20062EB442B0C89FD4084396B1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00781E54: wvnsprintfA.SHLWAPI(?,00002800,?,?), ref: 00781E8C
                                                      • CreateFileA.KERNEL32(-00000004,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?), ref: 007811A8
                                                      • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00781211
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ControlCreateDeviceFilewvnsprintf
                                                      • String ID: \\?\%c:
                                                      • API String ID: 2159692393-379940513
                                                      • Opcode ID: f2a5f1622b57cbfa1e17b5da499fb4ac5a6d40c9f1d1e6b2c4a1cdd7f35d3ef6
                                                      • Instruction ID: 5484badb12d518a24a59b7dec9cce0fabbfb091c09ada08f40e26cc555a61499
                                                      • Opcode Fuzzy Hash: f2a5f1622b57cbfa1e17b5da499fb4ac5a6d40c9f1d1e6b2c4a1cdd7f35d3ef6
                                                      • Instruction Fuzzy Hash: 8D216072E4021CABDB14EBA5EC49EEEBBBCEB04720F504156F611A71D1DB74AE05CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __wcsicoll.LIBCMT ref: 0074C025
                                                      • __wcstoi64.LIBCMT ref: 0074C051
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000016,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 0074C089
                                                      • __wcstoi64.LIBCMT ref: 0074C03A
                                                        • Part of subcall function 007A88EE: wcstoxl.LIBCMT ref: 007A890F
                                                      • __wcsicoll.LIBCMT ref: 0074C09A
                                                      • __wcstoi64.LIBCMT ref: 0074C0B8
                                                      • __wcstoi64.LIBCMT ref: 0074C0CF
                                                      • __wcstoi64.LIBCMT ref: 0074C0E6
                                                      • __wcstoi64.LIBCMT ref: 0074C0FD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __wcstoi64$__wcsicoll$Windowwcstoxl
                                                      • String ID: caption$defaultfontcolor$disabledfontcolor$layeredimage$layeredopacity$linkfontcolor$linkhoverfontcolor$maxinfo$mininfo$noactivate$opacity$roundcorner$selectedcolor$showdirty$size$sizebox$true
                                                      • API String ID: 3742662505-519944345
                                                      • Opcode ID: 1a40cbd52746796bcbe28e39d6517071fe7d5ce7e9e0f74e550681751293b87e
                                                      • Instruction ID: 057cc75afbdba087ace54628f1055661d647016b27677823df9664fbb137b098
                                                      • Opcode Fuzzy Hash: 1a40cbd52746796bcbe28e39d6517071fe7d5ce7e9e0f74e550681751293b87e
                                                      • Instruction Fuzzy Hash: 3DE105B2901305BADB91AF38CC42FFB37ACAF96754F108529F905DA142EB7CDA408656
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __wcsicoll$__wcstoi64$__wcsicmp_l
                                                      • String ID: Default$Font$Image$MultiLanguage$Window$bold$default$italic$mask$name$restype$shared$size$true$underline$value
                                                      • API String ID: 4023467804-1487863511
                                                      • Opcode ID: 573715f01d75dbaa4210205dd5a57986c0e2bcf6309a3662be2d41a2b5fa5948
                                                      • Instruction ID: 3162a477b94bfb2da1f603a76240127f2b9dbbdbc05d85eef85a0228f4ec0b2c
                                                      • Opcode Fuzzy Hash: 573715f01d75dbaa4210205dd5a57986c0e2bcf6309a3662be2d41a2b5fa5948
                                                      • Instruction Fuzzy Hash: 57E19231509342EFD761AB248C46A6FB7E8AFD6B24F10092EF48092152EB7DDD058B93
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00788CC3
                                                      • curl_easy_init.LIBCURL32(00000000,?,000000DC,00789422,?,?), ref: 00788D08
                                                      • curl_formadd.LIBCURL32(?,?,0000000A,?,00000001,?,00000011,?,?,?,?,000000DC,00789422,?,?), ref: 00788DC9
                                                      • curl_formadd.LIBCURL32(?,?,0000000E,00000000,0000000C,00000010,0000000D,00000000,00000001,?,00000011,?,?,?,000000DC,00789422), ref: 00788E19
                                                      • curl_formadd.LIBCURL32(?,?,00000001,?,00000004,00000010,00000006,00000000,00000011,?,?,?,000000DC,00789422,?,?), ref: 00788E49
                                                      • curl_slist_append.LIBCURL32(00000000,Expect:,?,?,?,000000DC,00789422,?,?), ref: 00788E81
                                                      • curl_slist_append.LIBCURL32(?,-00000004), ref: 00788F11
                                                      • curl_slist_append.LIBCURL32(?,Content-Type: application/x-www-form-urlencoded,00000000,00789422,?,?), ref: 00788FAF
                                                        • Part of subcall function 00788B91: __EH_prolog3.LIBCMT ref: 00788B98
                                                      • curl_easy_reset.LIBCURL32(?,00000000,00000000,000000FF,00000000,00000000,00789422,?,?), ref: 00789049
                                                      • curl_easy_setopt.LIBCURL32(?,00002712,?), ref: 00789069
                                                      • curl_easy_setopt.LIBCURL32(?,0000004E,00000005), ref: 00789073
                                                      • curl_easy_setopt.LIBCURL32(?,00004E2B,00789252), ref: 00789083
                                                      • curl_easy_setopt.LIBCURL32(?,00002711,?), ref: 00789094
                                                      • curl_easy_setopt.LIBCURL32(?,00002728,?), ref: 007890A2
                                                      • curl_easy_setopt.LIBCURL32(?,00002727,?), ref: 007890B0
                                                      • curl_easy_setopt.LIBCURL32(?,00002776,007BC514), ref: 007890C0
                                                      • curl_easy_setopt.LIBCURL32(?,0000271F,?), ref: 007890DE
                                                      • PathFileExistsA.SHLWAPI(007DB648), ref: 007890F1
                                                      • curl_easy_setopt.LIBCURL32(?,0000272F,007DB648), ref: 00789106
                                                      • curl_easy_setopt.LIBCURL32(?,00002734,00000024), ref: 00789126
                                                      • curl_easy_setopt.LIBCURL32(?,00000034,00000001), ref: 00789130
                                                      • curl_easy_setopt.LIBCURL32(?,00000040,00000000), ref: 00789143
                                                      • curl_easy_setopt.LIBCURL32(?,00000051,00000000), ref: 0078914D
                                                        • Part of subcall function 0073CCE0: std::_String_base::_Xlen.LIBCPMT ref: 0073CD2F
                                                        • Part of subcall function 0073CCE0: _memcpy_s.LIBCMT ref: 0073CD9A
                                                      • curl_easy_setopt.LIBCURL32(?,00002751,00000000), ref: 00789175
                                                      • curl_easy_perform.LIBCURL32(?), ref: 007891A3
                                                      • curl_formfree.LIBCURL32(?), ref: 007891B4
                                                      • curl_slist_free_all.LIBCURL32(?), ref: 007891C3
                                                      • curl_easy_strerror.LIBCURL32(00000000), ref: 007891CF
                                                      • curl_easy_cleanup.LIBCURL32(?,00000000), ref: 007891E0
                                                      • curl_easy_getinfo.LIBCURL32(?,00200002,?), ref: 00789219
                                                      • curl_easy_cleanup.LIBCURL32(?), ref: 00789223
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: curl_easy_setopt$curl_formaddcurl_slist_append$curl_easy_cleanup$ExistsFileH_prolog3H_prolog3_PathString_base::_Xlen_memcpy_scurl_easy_getinfocurl_easy_initcurl_easy_performcurl_easy_resetcurl_easy_strerrorcurl_formfreecurl_slist_free_allstd::_
                                                      • String ID: Content-Type: application/x-www-form-urlencoded$Expect:$`$easy_init failed
                                                      • API String ID: 363877404-2120193120
                                                      • Opcode ID: b5ba21aaf8ffb7dc38246df206e97b24ca85f632bac4c3d59d7051bd24c287b3
                                                      • Instruction ID: cc6272602b9adaba5f544c4fab34e7da8d8d218d64702cba1720ae84baa5e9be
                                                      • Opcode Fuzzy Hash: b5ba21aaf8ffb7dc38246df206e97b24ca85f632bac4c3d59d7051bd24c287b3
                                                      • Instruction Fuzzy Hash: D002BD30D40218EFDF65EFA4DC89BEDBBB4BF04300F54415AE615AB182DB789A40DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 007884BC
                                                      • curl_easy_init.LIBCURL32 ref: 007884F8
                                                      • curl_slist_append.LIBCURL32(?,-00000004), ref: 0078858B
                                                      • curl_easy_reset.LIBCURL32(?,?,00000000,000000FF,00000000), ref: 00788661
                                                      • curl_easy_setopt.LIBCURL32(?,00002712,000000AC), ref: 00788681
                                                      • curl_easy_setopt.LIBCURL32(?,0000004E,00000005), ref: 0078868B
                                                      • curl_easy_setopt.LIBCURL32(?,00004E2B,007887D5), ref: 0078869B
                                                      • curl_easy_setopt.LIBCURL32(?,00002711,?), ref: 007886A9
                                                      • curl_easy_setopt.LIBCURL32(?,00002727,?), ref: 007886B7
                                                      • curl_easy_setopt.LIBCURL32(?,0000272F,007BC514), ref: 007886CB
                                                      • curl_easy_setopt.LIBCURL32(?,00002776,007BC514), ref: 007886DA
                                                      • curl_easy_setopt.LIBCURL32(?,00000034,00000001), ref: 007886E4
                                                      • curl_easy_setopt.LIBCURL32(?,00000040,00000000), ref: 007886F7
                                                      • curl_easy_setopt.LIBCURL32(?,00000051,00000000), ref: 00788701
                                                      • curl_easy_setopt.LIBCURL32(?,00002751,00000000), ref: 00788729
                                                      • PathFileExistsA.SHLWAPI(007DB648), ref: 0078873C
                                                      • curl_easy_setopt.LIBCURL32(?,0000272F,007DB648), ref: 0078874D
                                                      • curl_easy_perform.LIBCURL32(?), ref: 00788772
                                                      • curl_slist_free_all.LIBCURL32(00000000), ref: 00788784
                                                      • curl_easy_strerror.LIBCURL32(00000000), ref: 00788790
                                                      • curl_easy_cleanup.LIBCURL32(?), ref: 007887A3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: curl_easy_setopt$ExistsFileH_prolog3_Pathcurl_easy_cleanupcurl_easy_initcurl_easy_performcurl_easy_resetcurl_easy_strerrorcurl_slist_appendcurl_slist_free_all
                                                      • String ID: easy_init failed$invalid param 2
                                                      • API String ID: 3440280746-1662159081
                                                      • Opcode ID: acb5eeb33388f0ed79992c9d1337360bea04e740c2e6af03bf2b97fee61eb73c
                                                      • Instruction ID: ba72560acdf2ae215745644613d487451f05e65b94b4cd9eea0a11fc8a6d655c
                                                      • Opcode Fuzzy Hash: acb5eeb33388f0ed79992c9d1337360bea04e740c2e6af03bf2b97fee61eb73c
                                                      • Instruction Fuzzy Hash: 0891BE31D40208EBDB51EBA4DC89FEEBBB4EF04714F54401AF505A7292EB7C9944DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrcmpA.KERNEL32(?,PoLogInfoA,-000000FC,00796860), ref: 007965E7
                                                      • lstrcmpA.KERNEL32(?,PoLogInfoW), ref: 007965FA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: lstrcmp
                                                      • String ID: E7248970$E7248971$E7248972$E7248973$E7248974$E7248975$E7248976$E7248977$PoLogErrA$PoLogErrW$PoLogInfoA$PoLogInfoW$PoLogPrintA$PoLogPrintW$PoLogWarnA$PoLogWarnW
                                                      • API String ID: 1534048567-1828307511
                                                      • Opcode ID: fc68ca24fd1e1df1c4efe0a7528eba7ff6eefe8b170db5885fcf697111916d6e
                                                      • Instruction ID: 5a5f5750a630bbed093266b74cc22b56875f45fd5f2d30c71240c96b488093bd
                                                      • Opcode Fuzzy Hash: fc68ca24fd1e1df1c4efe0a7528eba7ff6eefe8b170db5885fcf697111916d6e
                                                      • Instruction Fuzzy Hash: 900196427456A6A11FD1212D3E49FFA0F698BD1F9930242BEFE04DA289E74CCC8365A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00785688: __EH_prolog3_GS.LIBCMT ref: 0078568F
                                                      • MessageBoxW.USER32(?,007BCED0,007BC428,00000010), ref: 00739496
                                                      • SHGetValueW.SHLWAPI(80000002,Software\projone\podlp\volatile\,ruleCleaned,?,?,?), ref: 007394DE
                                                      • SHDeleteValueW.SHLWAPI(80000002,Software\projone\podlp\volatile\,ruleCleaned), ref: 00739503
                                                        • Part of subcall function 00733CE0: OpenEventW.KERNEL32(00000002,00000000,-00000004,00000000,?,?,?,?,?,?,?,?,?,00000000,007B55A9,000000FF), ref: 00733D7D
                                                        • Part of subcall function 00733CE0: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,007B55A9,000000FF,0079650E,-00000094,-000000C4), ref: 00733D8F
                                                        • Part of subcall function 00733CE0: CloseHandle.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,00000000,007B55A9,000000FF,0079650E,-00000094,-000000C4), ref: 00733D98
                                                      • MessageBoxW.USER32(?,007BCF24,Oo`,00000040), ref: 00739523
                                                      • MessageBoxW.USER32(?,007BCF78,007BCF6C,00000040), ref: 00739707
                                                      • SHDeleteValueW.SHLWAPI(80000002,Software\projone\podlp\,ruleupt,cbe_type), ref: 0073973F
                                                      • _memset.LIBCMT ref: 007397B9
                                                      • ShellExecuteW.SHELL32(00000000,runas,?,/clearRules,00000000,00000001), ref: 007397F0
                                                      • MessageBoxW.USER32(?,007BCFF4,007BC428,00000010), ref: 00739813
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Message$Value$DeleteEvent$CloseExecuteH_prolog3_HandleOpenShell_memset
                                                      • String ID: /clearRules$Global\{B9A7C12B-AB68-49ff-9A08-080F1B1E0200}$Software\projone\podlp\$Software\projone\podlp\volatile\$cbe_details$cbe_type$clientstat.exe$ruleCleaned$ruleupt$runas$Oo`
                                                      • API String ID: 3873154455-629460141
                                                      • Opcode ID: 81a2b8f0a2b0e6c57d77fb1ca060d4ef74d9ffb2d85a2f535675ba6d0103c5c8
                                                      • Instruction ID: eb4be0233f29f806d4e6732c8bf7c5937b2ab649cf6506c2d64e016be0d74118
                                                      • Opcode Fuzzy Hash: 81a2b8f0a2b0e6c57d77fb1ca060d4ef74d9ffb2d85a2f535675ba6d0103c5c8
                                                      • Instruction Fuzzy Hash: C5B1A3B1548380DFE721EB64D84AB9FB7E5AB94700F10891DF28957293DBBD9804CB53
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetForegroundWindow.USER32(007BF3BC,007BC428,00000010,00000008), ref: 0073F7ED
                                                      • MessageBoxW.USER32(00000000), ref: 0073F7F4
                                                      • GetForegroundWindow.USER32(007BF3FC,007BC428,00000010,00000008), ref: 0073F82D
                                                      • MessageBoxW.USER32(00000000), ref: 0073F834
                                                        • Part of subcall function 00735140: SHGetValueW.SHLWAPI ref: 00735168
                                                      • _memset.LIBCMT ref: 0073F862
                                                      • GetModuleHandleW.KERNEL32(00000000,wfchost.exe,?,00000104,?,?,?,00000008), ref: 0073F87B
                                                      • PathFileExistsW.SHLWAPI(?,?,?,?,00000008), ref: 0073F88D
                                                      • GetForegroundWindow.USER32(007BF42C,007BC428,00000010,?,?,?,00000008), ref: 0073F8A3
                                                      • MessageBoxW.USER32(00000000), ref: 0073F8AA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ForegroundMessageWindow$ExistsFileHandleModulePathValue_memset
                                                      • String ID: "%s" %s$/decrypt$/decryptNoReq$/encrypt$AllowManualDecrypt$AllowManualEncrypt$DecryptNeedToApprove$wfchost.exe
                                                      • API String ID: 2305115084-3222097620
                                                      • Opcode ID: dec28cdb940222f583fb29c8e117bb3c06e8bb92c70e05959a3fe29b4edef66c
                                                      • Instruction ID: 9e0764832e86eec016642e3dc0f6a41c628e8c751f4f15a8b31c6726f2c6be9d
                                                      • Opcode Fuzzy Hash: dec28cdb940222f583fb29c8e117bb3c06e8bb92c70e05959a3fe29b4edef66c
                                                      • Instruction Fuzzy Hash: 184125B5A40340ABDA207BA4BC0FFEF7394AF58B04F408538F64A97193EB3C95048766
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?), ref: 00731648
                                                      • SetLastError.KERNEL32(00000002), ref: 00731655
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00731666
                                                      • DeleteFileW.KERNEL32(?), ref: 0073166D
                                                      • GetParent.USER32(?), ref: 00731679
                                                      • EnableWindow.USER32(00000000), ref: 00731680
                                                      • IsWindow.USER32(?), ref: 0073168A
                                                      • PostMessageW.USER32(?,00000010,00000002,00000000), ref: 007316A2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesWindow$DeleteEnableErrorLastMessageParentPost
                                                      • String ID: btnAddTool$btnClose$btnToolImage$btnToolPath$click$combToolType$edtWebToolUrl$itemselect$textchanged
                                                      • API String ID: 226735038-3089785121
                                                      • Opcode ID: 53447c4f912c7e62879eb105242d717d7f1b7df688441ec69e653d1fcbea10b8
                                                      • Instruction ID: a037be399895ef5539056806a9564801a37c50e551a825f9443b3b03a7464784
                                                      • Opcode Fuzzy Hash: 53447c4f912c7e62879eb105242d717d7f1b7df688441ec69e653d1fcbea10b8
                                                      • Instruction Fuzzy Hash: CEC1F377200201DBFB248B34CC45BE673A1BF65B64FD88A28E556AB2D2E739ED01C351
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CharNext__wcstoui64
                                                      • String ID: itemhottextcolor$itemminwidth$itemtextcolor$selitemhottextcolor$selitemtextcolor$true$visiblecheckbtn$visiblefolderbtn
                                                      • API String ID: 216335860-1882295018
                                                      • Opcode ID: b2bd4bd5e216d1284bb9e7005afb7304e26e16bee0515137cb5faa5787d8e3a2
                                                      • Instruction ID: e12f0d92811b9f2e5444fe3fe71299cbbae61dad93003f080827f35ef23fafb1
                                                      • Opcode Fuzzy Hash: b2bd4bd5e216d1284bb9e7005afb7304e26e16bee0515137cb5faa5787d8e3a2
                                                      • Instruction Fuzzy Hash: B89193212101129ADF14AF34CC55BB63376AF31BE4B54C668E82DCB296E77BDE82D350
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,000000C5,00000000,00000000), ref: 0076A313
                                                      • CharNextW.USER32(?), ref: 0076A51B
                                                      • __wcstoui64.LIBCMT ref: 0076A52B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CharMessageNextSend__wcstoui64
                                                      • String ID: autoselall$disabledimage$focusedimage$hotimage$maxchar$nativebkcolor$normalimage$numberonly$password$placeholder$readonly$true
                                                      • API String ID: 3741776718-2618076580
                                                      • Opcode ID: 0a9ebfa2ed8a97da9df39ac7e07903392760d04c373f2cc35374dd0af0f6739c
                                                      • Instruction ID: b7b9c4cb64f37ea2f00a0e0387ed5afeb1feaf744a0fe47a98545f67394711d8
                                                      • Opcode Fuzzy Hash: 0a9ebfa2ed8a97da9df39ac7e07903392760d04c373f2cc35374dd0af0f6739c
                                                      • Instruction Fuzzy Hash: 19D1B111250406AACB26AF28CC509B53363EF71B707E94665EC17AF299E72BCD81CB53
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrcmpiW.KERNEL32(?,addimage.png,?,?,?,btnToolImage,00000001), ref: 007321FB
                                                      • PathFileExistsW.SHLWAPI(?,?,?,?,?,B04868B4), ref: 0073229B
                                                      • PathFindFileNameW.SHLWAPI(?,00000000,?,00000000,000000FF), ref: 0073236A
                                                      • MessageBoxW.USER32(?,-00000004,007BC428,00000010), ref: 0073254E
                                                      • IsWindow.USER32(?), ref: 00732597
                                                      • PostMessageW.USER32(?,00000010,00000001,00000000), ref: 007325AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: FileMessagePath$ExistsFindNamePostWindowlstrcmpi
                                                      • String ID: addimage.png$btnToolImage$btnToolPath$btn_%s_%d$chkAdmin$edtStartParam$edtToolDesc$edtToolName$edtWebToolUrl
                                                      • API String ID: 3840965363-1781643441
                                                      • Opcode ID: d453dfed8f7c37f3504a648b1a530084db0cf5473f32af4bd6701229b9ea4d00
                                                      • Instruction ID: a176d1589b5e68380bd4159ae46b1872fcdb7f925d930a2a3761306d922bd241
                                                      • Opcode Fuzzy Hash: d453dfed8f7c37f3504a648b1a530084db0cf5473f32af4bd6701229b9ea4d00
                                                      • Instruction Fuzzy Hash: 4EE1E3B1604341DFE724DF14C885BAB77E9AF84300F048968FA899F293D779E945CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCaretBlinkTime.USER32(00000000), ref: 0076963A
                                                      • SetTimer.USER32(?,00000014,00000000), ref: 00769646
                                                      • GetClientRect.USER32(?,?), ref: 007696BA
                                                      • InvalidateRect.USER32(?,?,00000000), ref: 007696CA
                                                      • GetClientRect.USER32(?,?), ref: 007697A2
                                                      • GetCaretPos.USER32(?), ref: 007697AD
                                                      • GetClientRect.USER32(?,?), ref: 0076981C
                                                      • InvalidateRect.USER32(?,?,00000000), ref: 0076982C
                                                      • SetBkMode.GDI32(?,00000001), ref: 00769887
                                                      • SetTextColor.GDI32(?,?), ref: 007698B5
                                                      • DeleteObject.GDI32(?), ref: 007698CE
                                                      • CreatePatternBrush.GDI32(00000000), ref: 00769910
                                                      • DeleteObject.GDI32(00000000), ref: 0076991A
                                                      • CreateSolidBrush.GDI32(?), ref: 00769944
                                                        • Part of subcall function 007699B4: GetWindowTextLengthW.USER32(?), ref: 007699CF
                                                        • Part of subcall function 007699B4: GetWindowTextW.USER32(?,?,00000001), ref: 007699EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect$ClientText$BrushCaretCreateDeleteInvalidateObjectWindow$BlinkColorLengthModePatternSolidTimeTimer
                                                      • String ID: return
                                                      • API String ID: 1094564555-2812165903
                                                      • Opcode ID: 5a15ffd84c6085b8a425ed123c1f2346adedc16c775dd6ad8c302db309361173
                                                      • Instruction ID: 0d11f2146095480090f53a96d0af90d7d350911800331c273f7197cf7cb7a3af
                                                      • Opcode Fuzzy Hash: 5a15ffd84c6085b8a425ed123c1f2346adedc16c775dd6ad8c302db309361173
                                                      • Instruction Fuzzy Hash: 5FA17271504210EFDF14DF64C988BAA3BE9EF89314F0445A9FE568B2A2C739DD14CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetIconInfo.USER32(?,?), ref: 0073319C
                                                      • GetObjectW.GDI32(?,00000018,?), ref: 007331B9
                                                      • _memset.LIBCMT ref: 007331CF
                                                      • GetVersionExW.KERNEL32 ref: 007331EA
                                                      • GdipGetImageHeight.GDIPLUS(?,?,?,?,?,00000000), ref: 00733226
                                                      • GdipGetImageWidth.GDIPLUS(?,?,?,?,?,?,?,00000000), ref: 00733243
                                                      • GdipGetImagePixelFormat.GDIPLUS(?,?,?,?,?,?,?,?,?,00000000), ref: 0073326C
                                                      • GdipBitmapLockBits.GDIPLUS(?,?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0073328D
                                                      • GdipAlloc.GDIPLUS(00000010,?,?,00000001,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0073329B
                                                      • GdipSaveImageToFile.GDIPLUS(?,?,?,00000000,?,?,?,00000000), ref: 00733317
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Gdip$Image$AllocBitmapBitsFileFormatHeightIconInfoLockObjectPixelSaveVersionWidth_memset
                                                      • String ID:
                                                      • API String ID: 2869424869-3916222277
                                                      • Opcode ID: 2dd64bf91ee1b0513376d42bd324b8f889304f3144e608cf9f56967432051936
                                                      • Instruction ID: c6d768931c79174d6dc185ea5387d664c9eb287ca42077a9e30d8221ec0dcd01
                                                      • Opcode Fuzzy Hash: 2dd64bf91ee1b0513376d42bd324b8f889304f3144e608cf9f56967432051936
                                                      • Instruction Fuzzy Hash: B2616FB1508345AFE720DF64D885A6BB7E4BFC8700F40892DF69987252E738E944CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CharNext__wcstoui64
                                                      • String ID: disablednormalimage$disabledselectedimage$foreimage$group$selected$selectedbkcolor$selectedhotimage$selectedimage$selectedtextcolor$true
                                                      • API String ID: 216335860-3755474186
                                                      • Opcode ID: b09a8c16e7a2eaff59fe6f952259d2c165c4d2026d8f15178343635b221a0f74
                                                      • Instruction ID: be376fd1ccf9061388686ced5fb4c06bcded544ecbf357b041e2982c23b4e891
                                                      • Opcode Fuzzy Hash: b09a8c16e7a2eaff59fe6f952259d2c165c4d2026d8f15178343635b221a0f74
                                                      • Instruction Fuzzy Hash: 31A1C022311012DACF76AF34C851AF57363AB32B24B944629E565CB294F73FCE86D781
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateCompatibleDC.GDI32(?), ref: 0075C982
                                                      • CreateCompatibleBitmap.GDI32(?,?,?), ref: 0075C9B8
                                                      • SelectObject.GDI32(?,?), ref: 0075C9C7
                                                      • CreateCompatibleDC.GDI32(?), ref: 0075CA2D
                                                      • CreateDIBSection.GDI32(?,00000028,00000000,?,00000000,00000000), ref: 0075CA4B
                                                      • SelectObject.GDI32(00000000,00000000), ref: 0075CA5C
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,?,?,00CC0020), ref: 0075CA7A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Create$Compatible$ObjectSelect$BitmapSection
                                                      • String ID: (
                                                      • API String ID: 2425437800-3887548279
                                                      • Opcode ID: c9ab20ae3a85963d79eb8e71bf3eb473b4619ad209770f651a24eb33a8c3f965
                                                      • Instruction ID: 91b53941a3c20da8e403108acb96414b022c16d7032b6ef1e7af8a68374d1f15
                                                      • Opcode Fuzzy Hash: c9ab20ae3a85963d79eb8e71bf3eb473b4619ad209770f651a24eb33a8c3f965
                                                      • Instruction Fuzzy Hash: 3751F27190025AEFDF019FA4DC48BEEBFB6FF48301F108129FA25A6260D7799954DB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IntersectRect.USER32(?,?,?), ref: 0076EE1A
                                                      • IntersectRect.USER32(?,?,?), ref: 0076EF32
                                                      • IntersectRect.USER32(?,?,00000000), ref: 0076EF80
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: IntersectRect
                                                      • String ID: IListItem
                                                      • API String ID: 481094312-3953988410
                                                      • Opcode ID: af4d57b3450de84d020e2872d2a56969ff3c201f82927e04b94680c2442b693a
                                                      • Instruction ID: 9464fa026308a4feb426e56f788f0dd55c30128319bf9ef3f99da6ec359d38e8
                                                      • Opcode Fuzzy Hash: af4d57b3450de84d020e2872d2a56969ff3c201f82927e04b94680c2442b693a
                                                      • Instruction Fuzzy Hash: 4AF14635204205DFCB10DF24C888EAA77E6FF89744F0844A9FD8A9B261DB36E945CF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IntersectRect.USER32(?,?,?), ref: 007655D5
                                                      • IntersectRect.USER32(?,?,?), ref: 007656ED
                                                      • IntersectRect.USER32(?,?,00000000), ref: 0076573B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: IntersectRect
                                                      • String ID: IListItem
                                                      • API String ID: 481094312-3953988410
                                                      • Opcode ID: 9be67c23abf26316b64e8142d6fe04c207eee163e8b74cd676b5aa06188b9af7
                                                      • Instruction ID: b663d9c1f7ef6df6f7179f590c51fdf0c74c5433ea86c135244fa7a47a9f6367
                                                      • Opcode Fuzzy Hash: 9be67c23abf26316b64e8142d6fe04c207eee163e8b74cd676b5aa06188b9af7
                                                      • Instruction Fuzzy Hash: E2F15A31204605DFCB10DF64C888EAA7BF6FF88704F084569FD869B251DB36E915DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(KERNEL32.DLL,007CCCF0,0000000C,0079CED6,00000000,00000000,?,?,00747EC5,00000053,?,?,?,0073137A,?,B04868B4), ref: 0079CDAD
                                                      • __crt_waiting_on_module_handle.LIBCMT ref: 0079CDB8
                                                        • Part of subcall function 0079E70C: Sleep.KERNEL32(000003E8,00000000,?,0079CCFE,KERNEL32.DLL,?,0079CD4A,?,?,00747EC5,00000053,?,?,?,0073137A,?), ref: 0079E718
                                                        • Part of subcall function 0079E70C: GetModuleHandleW.KERNEL32(?,?,0079CCFE,KERNEL32.DLL,?,0079CD4A,?,?,00747EC5,00000053,?,?,?,0073137A,?,B04868B4), ref: 0079E721
                                                      • GetProcAddress.KERNEL32(00000000,EncodePointer), ref: 0079CDE1
                                                      • GetProcAddress.KERNEL32(?,DecodePointer), ref: 0079CDF1
                                                      • __lock.LIBCMT ref: 0079CE13
                                                      • InterlockedIncrement.KERNEL32(007D6430), ref: 0079CE20
                                                      • __lock.LIBCMT ref: 0079CE34
                                                      • ___addlocaleref.LIBCMT ref: 0079CE52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc__lock$IncrementInterlockedSleep___addlocaleref__crt_waiting_on_module_handle
                                                      • String ID: 0d}$DecodePointer$EncodePointer$KERNEL32.DLL$`i}
                                                      • API String ID: 1028249917-3577627642
                                                      • Opcode ID: cb148ded4e51b870f2473bc732ad86a7d045a07edd7ed3f80418aaeaf2df78bf
                                                      • Instruction ID: d47a2ead2f15789b9b0fc1c6de519fd6c050cfd49358e1a19db6968420065d14
                                                      • Opcode Fuzzy Hash: cb148ded4e51b870f2473bc732ad86a7d045a07edd7ed3f80418aaeaf2df78bf
                                                      • Instruction Fuzzy Hash: 7611D271900705DFDF20EF79A80AB9ABBF0AF00310F10851EE6A9A63A1CB7C9940CF14
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCursorPos.USER32(?), ref: 0075F4E6
                                                      • ScreenToClient.USER32(?,?), ref: 0075F508
                                                      • PtInRect.USER32(?,?,?), ref: 0075F51B
                                                      • SetFocus.USER32(?), ref: 0075F583
                                                      • GetCaretPos.USER32(?), ref: 0075F5ED
                                                      • ImmGetContext.IMM32(?), ref: 0075F600
                                                      • ImmSetCompositionWindow.IMM32(00000000,00000020), ref: 0075F62B
                                                      • GetObjectW.GDI32(00000000,0000005C,?), ref: 0075F649
                                                      • ImmSetCompositionFontW.IMM32(00000000,?), ref: 0075F655
                                                      • ImmReleaseContext.IMM32(?,00000000), ref: 0075F668
                                                      • ScreenToClient.USER32(?,?), ref: 0075F69C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ClientCompositionContextScreen$CaretCursorFocusFontObjectRectReleaseWindow
                                                      • String ID:
                                                      • API String ID: 850084529-3916222277
                                                      • Opcode ID: 86ca2ddd13f6a8b8dab704faf3f1c8d520ba1e6abeb51b0e1bc1bc15e6337e90
                                                      • Instruction ID: e17dfb84d9d8f90d1916e24e47a4147f3e6df13d471b8fe23e7131d2bac84bcb
                                                      • Opcode Fuzzy Hash: 86ca2ddd13f6a8b8dab704faf3f1c8d520ba1e6abeb51b0e1bc1bc15e6337e90
                                                      • Instruction Fuzzy Hash: EAA169712042418FDB24CF24C988BBE7BE5FF88301F140569F996872A2DBB9DD59CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SysAllocString.OLEAUT32(errorLine), ref: 007629DA
                                                      • SysAllocString.OLEAUT32(errorCharacter), ref: 007629E4
                                                      • SysAllocString.OLEAUT32(errorCode), ref: 007629EE
                                                      • SysAllocString.OLEAUT32(errorMessage), ref: 007629F8
                                                      • SysAllocString.OLEAUT32(errorUrl), ref: 00762A02
                                                      • SysFreeString.OLEAUT32(?), ref: 00762A99
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$Free
                                                      • String ID: ($errorCharacter$errorCode$errorLine$errorMessage$errorUrl
                                                      • API String ID: 2383597386-2821095632
                                                      • Opcode ID: ba91d4e7186ae60fffc54e873064da09c67405ce79963ae043ac6ab77520a5fd
                                                      • Instruction ID: 929d4685c69bad3191c61c96b08417e6f5e7b34d6a9265059d29daa4a8f0a4a6
                                                      • Opcode Fuzzy Hash: ba91d4e7186ae60fffc54e873064da09c67405ce79963ae043ac6ab77520a5fd
                                                      • Instruction Fuzzy Hash: F3412BB5A00309AFDF10DFA4C889EAE7B74FF48714F108569F915AB291D7B49A41CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0073C71B
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,GetTickCount64), ref: 0073C72F
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0073C736
                                                      • GetTickCount.KERNEL32 ref: 0073C753
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,GetTickCount64), ref: 0073C76C
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0073C773
                                                      • OutputDebugStringW.KERNEL32([OneClient]exit on expired), ref: 0073C7A7
                                                      • ExitProcess.KERNEL32 ref: 0073C7AF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc$CountDebugExitOutputProcessStringTickVisibleWindow
                                                      • String ID: GetTickCount64$[OneClient]exit on expired$kernel32.dll
                                                      • API String ID: 3855475818-2553938042
                                                      • Opcode ID: dfeb6a49a26ec9689521635944f43a3ec701908370a8a6f21ea3bfdcd55bb603
                                                      • Instruction ID: dc88203bbb821fe7f48b08543548d3a267fe32fcff454bf17b64cd93a3292fd7
                                                      • Opcode Fuzzy Hash: dfeb6a49a26ec9689521635944f43a3ec701908370a8a6f21ea3bfdcd55bb603
                                                      • Instruction Fuzzy Hash: 8C016D70A0120ADFDB14AFB9AD4DB593BB4BB8C701F04CA59EB15E1271EB3C9400DB29
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IntersectRect.USER32(?,?,?), ref: 0075E66B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: IntersectRect
                                                      • String ID:
                                                      • API String ID: 481094312-0
                                                      • Opcode ID: ff72138471a37a95f4aa516d8641a83df3817e1b623cf5f27afa0477d5655537
                                                      • Instruction ID: 79f5bdf24ce5a8e67c730c7d2383d895ca0fa3b09a0dc24e6d1f59cafc233996
                                                      • Opcode Fuzzy Hash: ff72138471a37a95f4aa516d8641a83df3817e1b623cf5f27afa0477d5655537
                                                      • Instruction Fuzzy Hash: A6024871204200DFDB14DF64C888EAA7BF6FF88701F0549A9FD858B261DB76EA49CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Object$Delete$Select_memset$CreateFontIndirectMetricsStockText__itow_wcsncpy
                                                      • String ID:
                                                      • API String ID: 1063276355-0
                                                      • Opcode ID: 0964ab0869c7f2c3b3056e475afc9f657eaba6b1fd19c346c819363570ab4f36
                                                      • Instruction ID: bfaa7b0129e2b7de90538286e21e898695cf535ce1d495b415f748b2913e22a3
                                                      • Opcode Fuzzy Hash: 0964ab0869c7f2c3b3056e475afc9f657eaba6b1fd19c346c819363570ab4f36
                                                      • Instruction Fuzzy Hash: B6619071900249EBDF11AFA4DC45FDE7BBCAF09300F148069F955A7252DB78D948CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,00000030,?,00000001), ref: 007693C2
                                                      • SendMessageW.USER32(?,000000C5,?,00000000), ref: 007693D6
                                                      • SendMessageW.USER32(?,000000CC,?,00000000), ref: 007693F5
                                                      • SetWindowTextW.USER32(?,00000000), ref: 0076940B
                                                      • SendMessageW.USER32(?,000000B9,00000000,00000000), ref: 00769426
                                                      • SendMessageW.USER32(?,000000D3,00000003,00000000), ref: 00769433
                                                      • EnableWindow.USER32(?,00000000), ref: 0076944B
                                                      • SendMessageW.USER32(?,000000CF,00000000,00000000), ref: 0076946A
                                                      • ShowWindow.USER32(?,00000004), ref: 00769471
                                                      • SetFocus.USER32(?), ref: 0076947A
                                                      • GetWindowTextLengthW.USER32(?), ref: 0076948F
                                                      • GetWindowTextLengthW.USER32(?), ref: 007694A0
                                                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007694B0
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$Text$Length$EnableFocusShow
                                                      • String ID:
                                                      • API String ID: 772611947-0
                                                      • Opcode ID: 00ee76b28acd8720aae0d7b430833632ce221efb1a6d6097f594b11d61d8a0b0
                                                      • Instruction ID: 88cf90643a83cb1aca161e8bcf95c2a4a786c72e70cf2867f181bc725e873a13
                                                      • Opcode Fuzzy Hash: 00ee76b28acd8720aae0d7b430833632ce221efb1a6d6097f594b11d61d8a0b0
                                                      • Instruction Fuzzy Hash: CD517B71500250EFDB119F24CD89E6A3FAAEF49704F0481A5FE1A9F2A6CB76DC51CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3
                                                      • String ID: allowComments$allowDroppedNullPlaceholders$allowNumericKeys$allowSingleQuotes$allowSpecialFloats$collectComments$failIfExtra$rejectDupKeys$stackLimit$strictRoot
                                                      • API String ID: 431132790-1556308682
                                                      • Opcode ID: 2f9d9935d26e68742d3809923fbfd7c4821089ad9deb5a37cc844bd3b606f7a4
                                                      • Instruction ID: 385523c13af2e4b7ff3ebb6248c27dc820131ba4524c711d3c8fe056fdeed63a
                                                      • Opcode Fuzzy Hash: 2f9d9935d26e68742d3809923fbfd7c4821089ad9deb5a37cc844bd3b606f7a4
                                                      • Instruction Fuzzy Hash: CD416CB0D81215EBD790BBAD890B74DBBB5BB44721F608158F414A7682DB7C4F0197D3
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: swprintf$__finite__vsprintf_s_l
                                                      • String ID: %%.%dg$-1e+9999$-Infinity$1e+9999$Infinity$NaN$null
                                                      • API String ID: 2780222078-1955747591
                                                      • Opcode ID: f0c5632662ca63494203f9214e49ffbc8eb889612c48b726326e28c7ef5a9a2e
                                                      • Instruction ID: 040f259fba22a6bb067ccfed3cc5477748af16c556cc3a8cd033335e8d4ef54a
                                                      • Opcode Fuzzy Hash: f0c5632662ca63494203f9214e49ffbc8eb889612c48b726326e28c7ef5a9a2e
                                                      • Instruction Fuzzy Hash: 1E313971A4420DE6DF54EA64E849FDE77A8EF59324F10007EF641A60C1EF7DD5408761
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(pobus32.dll,00000000,00734B31,?), ref: 00734A85
                                                      • GetModuleHandleA.KERNEL32(pobus64.dll), ref: 00734A90
                                                      • GetModuleHandleA.KERNEL32(poda32.dll), ref: 00734A9B
                                                      • GetModuleHandleA.KERNEL32(poda64.dll), ref: 00734AA6
                                                      • GetProcAddress.KERNEL32(00000000,E1034A78), ref: 00734AAE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: HandleModule$AddressProc
                                                      • String ID: E1034A78$getRuleContent$pobus32.dll$pobus64.dll$poda32.dll$poda64.dll
                                                      • API String ID: 1883125708-481540518
                                                      • Opcode ID: 7a7000aff2a546202affb301e85cfe08b5f02739b25594f6a28b9f5106827614
                                                      • Instruction ID: 575b93d7327dbbdc324428eaf04587d38897d14b8f438607de1a3a32f559c0b1
                                                      • Opcode Fuzzy Hash: 7a7000aff2a546202affb301e85cfe08b5f02739b25594f6a28b9f5106827614
                                                      • Instruction Fuzzy Hash: BFE0E5F1BC1316B9BB1497B58D09F2A3B986D65B82704804EFA40D1084F75CE8008AA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindow.USER32(?,00000004), ref: 007466D2
                                                      • ShowWindow.USER32(?,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 007466E0
                                                      • EnableWindow.USER32(?,00000000), ref: 007466F0
                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 0074670A
                                                      • EnableWindow.USER32(?,00000001), ref: 0074672D
                                                      • SetFocus.USER32(?), ref: 00746732
                                                      • TranslateMessage.USER32(?), ref: 00746747
                                                      • DispatchMessageW.USER32(?), ref: 00746750
                                                      • IsWindow.USER32(?), ref: 0074675F
                                                      • EnableWindow.USER32(?,00000001), ref: 0074676E
                                                      • SetFocus.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00746773
                                                      • PostQuitMessage.USER32(?), ref: 00746782
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$Message$Enable$Focus$DispatchPostQuitShowTranslate
                                                      • String ID:
                                                      • API String ID: 200552106-0
                                                      • Opcode ID: e52ebdd5c8800ee6d361a9be2e7f77493a18c73851fc5955353d7d4951f0f504
                                                      • Instruction ID: f22b4da020fa82a63739df7c85c83b7ed1f07dd4014c563d43012f96b38d7b16
                                                      • Opcode Fuzzy Hash: e52ebdd5c8800ee6d361a9be2e7f77493a18c73851fc5955353d7d4951f0f504
                                                      • Instruction Fuzzy Hash: BE213971900208EFDF229FA4DE89EDEBBB9EF49305F108554E611B2160C73A9D41DB24
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _malloc
                                                      • String ID: ScrollBar$VerticalLayout$|f|
                                                      • API String ID: 1579825452-230747103
                                                      • Opcode ID: a1d59d01200a73ca5dc5f824b001315e7d6662ae06db964f5fa16e9785f74387
                                                      • Instruction ID: 84bdd0e34141f73aab113b2ee8a6d6c8a6d5428298896e0bf10eeaff3dbb4b0b
                                                      • Opcode Fuzzy Hash: a1d59d01200a73ca5dc5f824b001315e7d6662ae06db964f5fa16e9785f74387
                                                      • Instruction Fuzzy Hash: 67F1AA71504201DFCB10DF28D888BAA77E5FF89314F1449B9FD5A9B262DB34E845CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_
                                                      • String ID: %s/auth/_sso?data=%s$%s/auth/_ssoOtp$%s/auth/testLogin?data=%s$&_uri=%s$GET$name$otp$password$type
                                                      • API String ID: 2427045233-1961936128
                                                      • Opcode ID: 6aafb44ea7433b62f2886c65c98953dad14946b3c6fcd81049461e6e4ae2a95b
                                                      • Instruction ID: 17e8d03bd9efcdb8b3807d74c4cada88e7608fef0ae240a00ae1bebe414a9dd6
                                                      • Opcode Fuzzy Hash: 6aafb44ea7433b62f2886c65c98953dad14946b3c6fcd81049461e6e4ae2a95b
                                                      • Instruction Fuzzy Hash: 61F14C31C14198DBEF59EBA4D849BDDB7B8AF14300F5480D9E48973282DB786F89CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(pobus32.dll), ref: 00734BB8
                                                      • GetModuleHandleA.KERNEL32(pobus64.dll), ref: 00734BC3
                                                      • GetModuleHandleA.KERNEL32(poda32.dll), ref: 00734BCE
                                                      • GetModuleHandleA.KERNEL32(poda64.dll), ref: 00734BD9
                                                      • GetProcAddress.KERNEL32(00000000,FB7C34E6), ref: 00734BE1
                                                        • Part of subcall function 00785778: _memset.LIBCMT ref: 007857A7
                                                        • Part of subcall function 00785778: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 007857B8
                                                        • Part of subcall function 00785778: PathAppendW.SHLWAPI(?,Logs\accelerator), ref: 007857C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: HandleModule$AddressAppendDirectoryPathProcWindows_memset
                                                      • String ID: FB7C34E6$pobus32.dll$pobus64.dll$poda32.dll$poda64.dll
                                                      • API String ID: 3762593170-2537450736
                                                      • Opcode ID: e948f6c79e49e338b805d1a9e21470b9a7a4e339f5dbafd3c8ff15b6a083c2fb
                                                      • Instruction ID: 881e26c75a5988d51253617dc996e8a922f037cbf2e17c71be54a3b7fe8c73a0
                                                      • Opcode Fuzzy Hash: e948f6c79e49e338b805d1a9e21470b9a7a4e339f5dbafd3c8ff15b6a083c2fb
                                                      • Instruction Fuzzy Hash: 23519DB1508341DFE714DF28C889B1BBBE8BB85700F04491EF595872A2D779E948CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00782430
                                                      • CoInitialize.OLE32(00000000), ref: 0078246A
                                                      • CoCreateInstance.OLE32(007BBD3C,00000000,00000001,007B971C,?), ref: 00782483
                                                      • _memset.LIBCMT ref: 007824E3
                                                      • PathFileExistsW.SHLWAPI(?,?,?,?,?), ref: 00782532
                                                      • StrStrIW.SHLWAPI(?,\program files (x86)\,?,?,?), ref: 0078254D
                                                      • _memset.LIBCMT ref: 00782569
                                                        • Part of subcall function 00781C7F: StrStrIW.SHLWAPI(?,?), ref: 00781CB3
                                                        • Part of subcall function 00781C7F: lstrcpynW.KERNEL32(?,?,00000104), ref: 00781CC9
                                                      • PathFileExistsW.SHLWAPI(?,?,?,?,?,?,?), ref: 00782595
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExistsFilePath_memset$CreateH_prolog3_InitializeInstancelstrcpyn
                                                      • String ID: \program files (x86)\$\program files\
                                                      • API String ID: 817452057-2186182958
                                                      • Opcode ID: be47a22c2ffd33595823d79062d7df2810bcd6e12227793dbdf2c2090f3c5780
                                                      • Instruction ID: d06d78d31e331afed0bcefb8e90ecc129289381a8e7ffc7c371459dc473f81b2
                                                      • Opcode Fuzzy Hash: be47a22c2ffd33595823d79062d7df2810bcd6e12227793dbdf2c2090f3c5780
                                                      • Instruction Fuzzy Hash: B3415EB0A44218DFDB20EF61CC4DE9A77B9AF84704F0041D9B509D7152DB799E91CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IntersectRect.USER32(?,?,?), ref: 00753168
                                                      • IntersectRect.USER32(?,?,?), ref: 0075325D
                                                      • IntersectRect.USER32(?,?,00000000), ref: 007532AB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: IntersectRect
                                                      • String ID:
                                                      • API String ID: 481094312-0
                                                      • Opcode ID: ad21facde136117d6e44919668051a31c5eb75ca07852ff762c339d245c0aae1
                                                      • Instruction ID: f352ef81ea9c70705ac99a02e4e6913f8020cdeee295659d21244adf92dfd262
                                                      • Opcode Fuzzy Hash: ad21facde136117d6e44919668051a31c5eb75ca07852ff762c339d245c0aae1
                                                      • Instruction Fuzzy Hash: 3ED16831204245DFCB01DF64C888EEA77E6FF88345F0449A8FD859B261DB76EA19CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Object$DeleteSelect_memset$CreateFontIndirectMetricsStockText_wcsncpy
                                                      • String ID:
                                                      • API String ID: 945672544-0
                                                      • Opcode ID: 67da9a178d4d64c3c84d4c2e8a23fa6ce4325971dfa715c181f5a0dbbd3e2c02
                                                      • Instruction ID: b3998998d86d24269d644df5cc114e94e23d33fba5a9880bbb59d4680059bd94
                                                      • Opcode Fuzzy Hash: 67da9a178d4d64c3c84d4c2e8a23fa6ce4325971dfa715c181f5a0dbbd3e2c02
                                                      • Instruction Fuzzy Hash: 40410270904388EFDB11DFB4DC09BDEBFF8AB09300F04801AEA95A7252C7789A15CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00798AFE
                                                      • SendDlgItemMessageW.USER32(?,00000321,0000000E,00000000,00000000), ref: 00798B1A
                                                      • _malloc.LIBCMT ref: 00798B29
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • _memset.LIBCMT ref: 00798B3C
                                                      • SendDlgItemMessageW.USER32(?,00000321,0000000D,-00000064,00000000), ref: 00798B4E
                                                      • MessageBoxW.USER32(?,007C9638,00000000,00000010), ref: 00798B6E
                                                        • Part of subcall function 0079B615: __lock.LIBCMT ref: 0079B633
                                                        • Part of subcall function 0079B615: ___sbh_find_block.LIBCMT ref: 0079B63E
                                                        • Part of subcall function 0079B615: ___sbh_free_block.LIBCMT ref: 0079B64D
                                                        • Part of subcall function 0079B615: HeapFree.KERNEL32(00000000,?,007CCC68,0000000C,00746E35,?,007474B5,?,?,?,?,00747EC5,00000053,?,?,?), ref: 0079B67D
                                                        • Part of subcall function 0079B615: GetLastError.KERNEL32(?,?,00747EC5,00000053,?,?,?,0073137A,?,B04868B4,?,?,?), ref: 0079B68E
                                                      • SendDlgItemMessageW.USER32(?,00000321,000000B1,00000000,000000FF), ref: 00798B89
                                                      • GetDlgItem.USER32(?,00000321), ref: 00798B94
                                                      • SetFocus.USER32(00000000,?,?,?,?,00798C07,?), ref: 00798B9B
                                                      • lstrcpynW.KERNEL32(?,00000000,?), ref: 00798BAD
                                                      • EndDialog.USER32(?,00000001), ref: 00798BB6
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ItemMessage$Send$Heap$AllocDialogErrorFocusFreeLastLongWindow___sbh_find_block___sbh_free_block__lock_malloc_memsetlstrcpyn
                                                      • String ID:
                                                      • API String ID: 1398144274-0
                                                      • Opcode ID: 3142befa1ba7b2404857a3136bb6b2a2d074ed06333ad0351054bf55b46842bf
                                                      • Instruction ID: 8849e39acf8b414cb018a031f8e71c5eab35136d36f357c32f8fbc36e999a0fc
                                                      • Opcode Fuzzy Hash: 3142befa1ba7b2404857a3136bb6b2a2d074ed06333ad0351054bf55b46842bf
                                                      • Instruction Fuzzy Hash: ED21D2B2200344BFDF205F91EC4AF973BACEF86711F044154FB11A51E1CBA9E801CA65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00796C22
                                                        • Part of subcall function 007883FD: CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00788426
                                                        • Part of subcall function 007883FD: GetHGlobalFromStream.OLE32(?,?), ref: 00788459
                                                        • Part of subcall function 007883FD: GlobalLock.KERNEL32(?), ref: 00788463
                                                        • Part of subcall function 007883FD: GlobalSize.KERNEL32(?), ref: 0078846F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Global$Stream$CreateFromH_prolog3_LockSize
                                                      • String ID: GET$GET failed: %s, http code: %d, error: %s$POST$POST failed: %s, http code: %d, error: %s$data$invalid response: %s$response code: %d %s
                                                      • API String ID: 3490692027-3015434781
                                                      • Opcode ID: ff248d83bafe9eeb04553997bb39e4547a1ded326e58111612965a1cb457b335
                                                      • Instruction ID: b1594a083cabba56a742ef89a97b65ccc9e26eb41ab112af41b722552165f3e0
                                                      • Opcode Fuzzy Hash: ff248d83bafe9eeb04553997bb39e4547a1ded326e58111612965a1cb457b335
                                                      • Instruction Fuzzy Hash: 96D14B72C10218DBEF25EBA4DC49ADDB7B8AF14304F104199E50AB7153EB38AF49DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __wcstoi64
                                                      • String ID: imm$step$thumbhotimage$thumbimage$thumbpushedimage$thumbsize$true
                                                      • API String ID: 398114495-535450508
                                                      • Opcode ID: e4928af2cae2e21b05d72b36d9d0b83cd6b1eca603f7880e370b6bf2cd0fd19b
                                                      • Instruction ID: bb7e767eb9bde5ce2a65f5ed88c96e7cc04a50a25e3a73bb48e8507d8191eee0
                                                      • Opcode Fuzzy Hash: e4928af2cae2e21b05d72b36d9d0b83cd6b1eca603f7880e370b6bf2cd0fd19b
                                                      • Instruction Fuzzy Hash: F471E72271011296CB12AF38C9416B636A6AF30BA4B484675EC9BCF299F73BCD45C390
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 00796256
                                                      • wnsprintfA.SHLWAPI ref: 00796297
                                                      • PathFindFileNameW.SHLWAPI(00000000), ref: 007962DE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: FileFindLocalNamePathTimewnsprintf
                                                      • String ID: %04d-%02d-%02d %02d:%02d:%02d$attach_name$attachment$client_unique$data_time$user_name
                                                      • API String ID: 3579529655-3153199785
                                                      • Opcode ID: 76ec62e921107777ee2f0c6c3fa40bca4d3a5d8f63cb9064833e378f296c3702
                                                      • Instruction ID: 03b60126ee4577b05e1ae93a86cb94e05943dc7b4ab178ed055c1316ce449e77
                                                      • Opcode Fuzzy Hash: 76ec62e921107777ee2f0c6c3fa40bca4d3a5d8f63cb9064833e378f296c3702
                                                      • Instruction Fuzzy Hash: 3D618A31C15198EADB61F7A8C90EBDDBBB96F08300F5840D9B548A3282DB3C4F45CB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00786186
                                                      • _memset.LIBCMT ref: 007861B3
                                                      • LoadIconW.USER32(?,?), ref: 007861C1
                                                        • Part of subcall function 00798C9B: __EH_prolog3.LIBCMT ref: 00798CA2
                                                        • Part of subcall function 00798C9B: DialogBoxIndirectParamW.USER32(?,00000000,?,00798BBE,-00000030), ref: 00798D5E
                                                      • MessageBoxW.USER32(?,007C81E8,007BC428,00000010), ref: 0078639B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: DialogH_prolog3H_prolog3_IconIndirectLoadMessageParam_memset
                                                      • String ID: c7b6f156f689ab10d397df6461de7f6bd87f5ff6$e0db72c158a7c82c08d868688263265f9dec1813$manageCfg$pswd${'pswd':''}
                                                      • API String ID: 341358064-3633196096
                                                      • Opcode ID: fdccc1ae34d2f5de018d0b4eb237043ff939525e285cf8c7d5803c58aae6a23b
                                                      • Instruction ID: 55c6bac3fecd3fab697c05419dbc6fce8b809cab35c0d332ddda8e48c0acf033
                                                      • Opcode Fuzzy Hash: fdccc1ae34d2f5de018d0b4eb237043ff939525e285cf8c7d5803c58aae6a23b
                                                      • Instruction Fuzzy Hash: 71517B7284126CEADF21EBA0CC4DBEDB7B8AF14300F1440D9E509A3182EB785F898F51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 007822FF
                                                      • _memset.LIBCMT ref: 00782317
                                                        • Part of subcall function 0078227C: lstrcpynW.KERNEL32(00001000,00000000,00001000,0078232D), ref: 00782290
                                                      • GetOpenFileNameW.COMDLG32 ref: 0078236D
                                                      • PathFindExtensionW.SHLWAPI(?), ref: 0078238E
                                                      • PathFindExtensionW.SHLWAPI(?,.lnk), ref: 007823A1
                                                      • lstrcmpiW.KERNEL32(00000000), ref: 007823A4
                                                        • Part of subcall function 00782426: __EH_prolog3_GS.LIBCMT ref: 00782430
                                                        • Part of subcall function 00782426: CoInitialize.OLE32(00000000), ref: 0078246A
                                                        • Part of subcall function 00782426: CoCreateInstance.OLE32(007BBD3C,00000000,00000001,007B971C,?), ref: 00782483
                                                        • Part of subcall function 00782426: _memset.LIBCMT ref: 007824E3
                                                        • Part of subcall function 00782426: PathFileExistsW.SHLWAPI(?,?,?,?,?), ref: 00782532
                                                        • Part of subcall function 00782426: StrStrIW.SHLWAPI(?,\program files (x86)\,?,?,?), ref: 0078254D
                                                        • Part of subcall function 00782426: _memset.LIBCMT ref: 00782569
                                                      • lstrcpynW.KERNEL32(?,?,00000104), ref: 007823E7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _memset$Path$ExtensionFileFindlstrcpyn$CreateExistsH_prolog3_InitializeInstanceNameOpenlstrcmpi
                                                      • String ID: .lnk$X
                                                      • API String ID: 4132724601-3682976568
                                                      • Opcode ID: fd402cf740b96831771cff7690f73b83827b04f6fffcb374d95b19b50f8ede55
                                                      • Instruction ID: 61c15ec5bb2a5c35e455f4bcfd6a82e4cc642de479b0740a2b3fff3cb767ee11
                                                      • Opcode Fuzzy Hash: fd402cf740b96831771cff7690f73b83827b04f6fffcb374d95b19b50f8ede55
                                                      • Instruction Fuzzy Hash: DB411B71508389DBD720EF65D849A9BB7E8FF88301F40492EF698C3152EB38D9458B96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 007963D1
                                                      • _memset.LIBCMT ref: 0079642A
                                                      • GetLocalTime.KERNEL32(-000000A8), ref: 00796439
                                                      • wnsprintfW.SHLWAPI ref: 00796490
                                                        • Part of subcall function 0078D9A3: __EH_prolog3.LIBCMT ref: 0078D9AA
                                                      Strings
                                                      • Software\projone\podlp\rptcache\pendings\, xrefs: 007964D3, 0079651E
                                                      • CachedReport write register failed: %s.%s %d, xrefs: 0079651F
                                                      • %04d-%02d-%02d %02d:%02d:%02d_%d_%08x, xrefs: 00796482
                                                      • Global\{D36B0A68-AE78-4fa2-BD9C-05FD95224F52}, xrefs: 00796504
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_LocalTime_memsetwnsprintf
                                                      • String ID: %04d-%02d-%02d %02d:%02d:%02d_%d_%08x$CachedReport write register failed: %s.%s %d$Global\{D36B0A68-AE78-4fa2-BD9C-05FD95224F52}$Software\projone\podlp\rptcache\pendings\
                                                      • API String ID: 699482863-3899848512
                                                      • Opcode ID: 2e8922432f0a843ed64229c58f0abeda6ffcd06e633db92cc9e253346bd7c527
                                                      • Instruction ID: f88edac16392db73009d300433e65272a7254e36850b8c45ddc34441a70b544e
                                                      • Opcode Fuzzy Hash: 2e8922432f0a843ed64229c58f0abeda6ffcd06e633db92cc9e253346bd7c527
                                                      • Instruction Fuzzy Hash: 3D310571940158EADF60EBA4DD59FEA73B8AF08301F4041D6F649A3152DA3C9F84DB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect
                                                      • String ID:
                                                      • API String ID: 400858303-0
                                                      • Opcode ID: 61717dd5612bd822df21388984d8fd52ca8a938a8c4f9763d3292833d4db1a97
                                                      • Instruction ID: b337bdda053fc7adbc2cce02ac15c92c13c3e0f926f0e0cc89f399ba755f2e4a
                                                      • Opcode Fuzzy Hash: 61717dd5612bd822df21388984d8fd52ca8a938a8c4f9763d3292833d4db1a97
                                                      • Instruction Fuzzy Hash: DC023671605A06DFDB28CF38C988BAAB7E5BF81385F14896CE1AF87150C779B851CB41
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,007D8120,B04868B4), ref: 00777253
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 00777278
                                                      • CloseHandle.KERNEL32(00000000), ref: 00777285
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 007772A5
                                                      • CloseHandle.KERNEL32(00000000), ref: 007772AC
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 007773A1
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 007773B0
                                                      • CloseHandle.KERNEL32(00000000), ref: 007773BD
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,007D81AC,00000000), ref: 007773DD
                                                      • CloseHandle.KERNEL32(00000000), ref: 007773E4
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateReadSize
                                                      • String ID:
                                                      • API String ID: 3664964396-0
                                                      • Opcode ID: 2460487e729ff2f1f135a5807eebfab1154cd474379bf55f0635d6a5e2fe7f3f
                                                      • Instruction ID: 4592194c7e0345b502fbd4281db44027a2bff19ac15bcf980372f704e01ed7ac
                                                      • Opcode Fuzzy Hash: 2460487e729ff2f1f135a5807eebfab1154cd474379bf55f0635d6a5e2fe7f3f
                                                      • Instruction Fuzzy Hash: 3C61E27150C341EFCB24AF24DC49E6ABBF8FB85354F108B2EF56592291DB388D00DA56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect
                                                      • String ID: menu
                                                      • API String ID: 400858303-2097494675
                                                      • Opcode ID: 5178e454cfb530ec63daf4aae36c9b686f29164846dbdffd1cbe71c03ad56373
                                                      • Instruction ID: 635a8dfbe62bc6bbdc82c566cd4daa32c4977e172c5b64fed67e02d1f18603ad
                                                      • Opcode Fuzzy Hash: 5178e454cfb530ec63daf4aae36c9b686f29164846dbdffd1cbe71c03ad56373
                                                      • Instruction Fuzzy Hash: E3912670700602EFCB208F38C898FF8B7A6BF42312F148579E95997291CBADAC19D741
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PtInRect.USER32(?,?,?), ref: 007666E3
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 007666F0
                                                      • SetCursor.USER32(00000000), ref: 007666F7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Cursor$LoadRect
                                                      • String ID: @$headerclick
                                                      • API String ID: 2669548683-2283687668
                                                      • Opcode ID: 7bf00ce3570d171e7071c515cafef66173e5fa675c53dbcd3a8e70ef6d3885ac
                                                      • Instruction ID: 2b1f4e366c08db7097b1a709f1390a9a44ec6b2ba9982958b7250769df166049
                                                      • Opcode Fuzzy Hash: 7bf00ce3570d171e7071c515cafef66173e5fa675c53dbcd3a8e70ef6d3885ac
                                                      • Instruction Fuzzy Hash: 8F815DB16002028FDF109F38C889A6577A9AF45354F8889B9ED5B9B656DB39EC04CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PtInRect.USER32(?,?,?), ref: 0076D34F
                                                      • PtInRect.USER32(?,?,?), ref: 0076D3A3
                                                      • PtInRect.USER32(?,?,?), ref: 0076D3F0
                                                      • PtInRect.USER32(?,?,?), ref: 0076D462
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 0076D483
                                                      • SetCursor.USER32(00000000), ref: 0076D48A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect$Cursor$Load
                                                      • String ID: link
                                                      • API String ID: 1264107634-917281265
                                                      • Opcode ID: 5617c86fae527169040f892b4e2e5d57af180b01710c6660829a25cd8db5142b
                                                      • Instruction ID: 259e3f41bfc5b91fc1bc2f527f46ac36b66ba4c8b1c2517346dacde28e2013a1
                                                      • Opcode Fuzzy Hash: 5617c86fae527169040f892b4e2e5d57af180b01710c6660829a25cd8db5142b
                                                      • Instruction Fuzzy Hash: 97618F30B10702DFD730CF64D488A69BBA5BF40314F144A2EE96797291EB79EC65CB82
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 0076F406
                                                      • MonitorFromWindow.USER32(?,00000001), ref: 0076F426
                                                      • GetMonitorInfoW.USER32(00000000), ref: 0076F42D
                                                      • MapWindowPoints.USER32(?,00000000,?,00000002), ref: 0076F480
                                                      • GetParent.USER32(?), ref: 0076F4BA
                                                      • GetParent.USER32(?), ref: 0076F4BF
                                                      • ShowWindow.USER32(?,00000005), ref: 0076F4CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$MonitorParentPoints$FromInfoShow
                                                      • String ID: (
                                                      • API String ID: 1723949065-3887548279
                                                      • Opcode ID: d36d770bbb1abf748369e4aeb90a156ab0d428565c4aa573c403cff0b018c6a8
                                                      • Instruction ID: 25d92269831d4ff0886274deac1cb803a95b081ce6e28e7fd00ae683d4f6c4dc
                                                      • Opcode Fuzzy Hash: d36d770bbb1abf748369e4aeb90a156ab0d428565c4aa573c403cff0b018c6a8
                                                      • Instruction Fuzzy Hash: EB71F775A002199FCF04CFA8C984AAEBBB2BF49310F158169E91ABB351DB75A901CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 00796832
                                                      • wnsprintfA.SHLWAPI ref: 0079684F
                                                        • Part of subcall function 007965D2: lstrcmpA.KERNEL32(?,PoLogInfoA,-000000FC,00796860), ref: 007965E7
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0079686A
                                                      • lstrcpyW.KERNEL32(007DBC38,?), ref: 007968FB
                                                      • wvnsprintfW.SHLWAPI(?,00000800,-00000094,?), ref: 00796923
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressProc_memsetlstrcmplstrcpywnsprintfwvnsprintf
                                                      • String ID: LogErr$Po%s%s$Software\projone\podlp\rptcache\pendings\
                                                      • API String ID: 3667124596-3740059535
                                                      • Opcode ID: dd24be5e6db391c927e48e9645a6919e910362339fe8ab0272a1f505e65bb4f9
                                                      • Instruction ID: bfda28fd8c14e16945188db66d7ca6ef791fea2e273c229f6f14ddbb321a6733
                                                      • Opcode Fuzzy Hash: dd24be5e6db391c927e48e9645a6919e910362339fe8ab0272a1f505e65bb4f9
                                                      • Instruction Fuzzy Hash: 4C31627190429CEFDF10DFA4ED85EDE77B8EB04710F5041AAE655A3181DB786A88CF24
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00748181
                                                      • GetModuleHandleW.KERNEL32(User32.dll,?,?,00000000,?,00000000), ref: 0074819C
                                                      • GetProcAddress.KERNEL32(00000000,UpdateLayeredWindow), ref: 007481AC
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 007481C3
                                                      • SetTimer.USER32(?,00002000,0000000A,00000000), ref: 007481DE
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 007481F1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$AddressHandleModuleProcTimer
                                                      • String ID: UpdateLayeredWindow$User32.dll
                                                      • API String ID: 1931165603-1943222131
                                                      • Opcode ID: be31937d797033c1f01dc1088510a17558e88d14622fd66a8fa439c697481170
                                                      • Instruction ID: 6b747a0c5c6c9fe26da823efc6145e1f1f25db3b4d365dffc6d0c1a10f9f842e
                                                      • Opcode Fuzzy Hash: be31937d797033c1f01dc1088510a17558e88d14622fd66a8fa439c697481170
                                                      • Instruction Fuzzy Hash: 4A11E530240749ABEB7057759D08F5B36E9EB45710F14862AF761D21E1CF799801CB26
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0076C2D6
                                                      • LoadLibraryW.KERNEL32(?), ref: 0076C2FD
                                                      • GetProcAddress.KERNEL32(00000000,DllGetClassObject), ref: 0076C310
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,007BBC8C,?), ref: 0076C366
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressCreateH_prolog3InstanceLibraryLoadProc
                                                      • String ID: DllGetClassObject$UIActiveX$showactivex
                                                      • API String ID: 3305116791-1617538497
                                                      • Opcode ID: 743a0e24a657f59e9b4470f29aa80a9762b1c670f0b29eea048d3ce8efe0bbb9
                                                      • Instruction ID: 2a759f1e581527317b3c2f44e62dba3fe883a521d700931acd29da52aa27efae
                                                      • Opcode Fuzzy Hash: 743a0e24a657f59e9b4470f29aa80a9762b1c670f0b29eea048d3ce8efe0bbb9
                                                      • Instruction Fuzzy Hash: B59152B0A00216EFCB04DFA4C888EBEBBB9FF49714B104559F516EB354C779A941CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 0073F48D
                                                      • PathAppendW.SHLWAPI(?,-00000004,00000208,?,0000000F,00000000), ref: 0073F4D6
                                                      • PathFileExistsW.SHLWAPI(?), ref: 0073F4F0
                                                      • lstrcpynW.KERNEL32(?,?,00000208), ref: 0073F53C
                                                      • PathAppendW.SHLWAPI(?,cache\kvstore), ref: 0073F54C
                                                      • PathAppendW.SHLWAPI(?,-00000004), ref: 0073F56E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Path$Append$ExistsFile_memsetlstrcpyn
                                                      • String ID: cache\kvstore
                                                      • API String ID: 1177685679-2105417475
                                                      • Opcode ID: 2ee988ec78bd3fb1ee07fa6a6e52657b98db04ab59278a513b3b275285fdd8bf
                                                      • Instruction ID: 2ff866170e91926106ee43aefd8a350bc78c898e8c949236a9c5986b511be8f3
                                                      • Opcode Fuzzy Hash: 2ee988ec78bd3fb1ee07fa6a6e52657b98db04ab59278a513b3b275285fdd8bf
                                                      • Instruction Fuzzy Hash: DD51AFB1904340DBEB10DF64D986B9BB7E4AF84744F00892DF64687252E779E904CB92
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0078C68D
                                                      • _localeconv.LIBCMT ref: 0078C6FB
                                                      • _swscanf.LIBCMT ref: 0078C733
                                                        • Part of subcall function 0078B5DE: __EH_prolog3_GS.LIBCMT ref: 0078B5E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_$_localeconv_swscanf
                                                      • String ID: %lf$' is not a number.$Unable to parse token length
                                                      • API String ID: 2780040302-2790277816
                                                      • Opcode ID: 0495296373eab929d36221a7f192c8a092978d1458226c6e777c99f16770aed7
                                                      • Instruction ID: ec8af9153dfa2e564a731aef841f309366f0f6f53a4393437f0309567556af8e
                                                      • Opcode Fuzzy Hash: 0495296373eab929d36221a7f192c8a092978d1458226c6e777c99f16770aed7
                                                      • Instruction Fuzzy Hash: 1D41E671950208EFDF12FBE4DC89EEE7779AF55300F144019F546AB242EB785A09CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(00000004,?,?,?,?,?,?,?,?,?,00736267,00000000,B04868B4), ref: 007381E9
                                                      • SHSetValueW.SHLWAPI(80000002,Software\projone\podlp\smpcache\,_onecli_lastSel,00000001,00000004,00000002,?,?,?,?,?,?,?,?,?,00736267), ref: 0073820A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Valuelstrlen
                                                      • String ID: Software\projone\podlp\smpcache\$_onecli_lastSel$btnCustomTools$btnInternalToolsInfo$btnRuleTools
                                                      • API String ID: 799288031-3413603313
                                                      • Opcode ID: 1d6bd8615cc361f96a2cd570edf33c92db56913c36090b2e16d68c3dd0a50069
                                                      • Instruction ID: 0aca9fdc90dd9c786f128f66b947f30240db68a35ff143cb9996631dc5f3fe98
                                                      • Opcode Fuzzy Hash: 1d6bd8615cc361f96a2cd570edf33c92db56913c36090b2e16d68c3dd0a50069
                                                      • Instruction Fuzzy Hash: 1B31D771704304AFE75597648C86FABB695EB49700F008529F20AAB293CF7CED4283E3
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowRect.USER32(?,00000000), ref: 00782681
                                                      • GetSystemMetrics.USER32(00000000), ref: 007826A8
                                                      • GetSystemMetrics.USER32(00000001), ref: 007826AF
                                                      • SHAppBarMessage.SHELL32(00000005,00000024), ref: 007826D3
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000005), ref: 00782776
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystemWindow$MessageRect
                                                      • String ID: $$
                                                      • API String ID: 1304239863-182950533
                                                      • Opcode ID: 24ac019af6f2acc89914896931f9e449d13c4554ef6b1339b0eac7b1c994d350
                                                      • Instruction ID: 959a5cb050e89b76fa6f52c6efeabfcb26e4869621bc818ea64ecc9e1c9ba650
                                                      • Opcode Fuzzy Hash: 24ac019af6f2acc89914896931f9e449d13c4554ef6b1339b0eac7b1c994d350
                                                      • Instruction Fuzzy Hash: 2B41AF72A00209AFDF14DFF9C948BEEBFF1AF44711F148119EA05A7181D7789A06CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 007966D3
                                                      • wnsprintfA.SHLWAPI ref: 007966F1
                                                        • Part of subcall function 007965D2: lstrcmpA.KERNEL32(?,PoLogInfoA,-000000FC,00796860), ref: 007965E7
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 0079670D
                                                      • lstrcpyA.KERNEL32(007DBB30,?), ref: 00796786
                                                      • wvnsprintfA.SHLWAPI(?,00000800,?,?), ref: 007967B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressProc_memsetlstrcmplstrcpywnsprintfwvnsprintf
                                                      • String ID: LogInfo$Po%s%s
                                                      • API String ID: 3667124596-1201488103
                                                      • Opcode ID: 371a24aeac5aabb0513ee59ea84796da37d072fb2f42a9605eff523a2e464489
                                                      • Instruction ID: 4d52403e617dc39319010648e5a1b2f1d3ff9c99fdf750523e27c493de879e9a
                                                      • Opcode Fuzzy Hash: 371a24aeac5aabb0513ee59ea84796da37d072fb2f42a9605eff523a2e464489
                                                      • Instruction Fuzzy Hash: C131A5B1108344EFDB20DB64EC85FAB77E8FB45714F408A2EF695821D1DB789908CB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 00740084
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000104,?,?,00000008), ref: 00740099
                                                        • Part of subcall function 00780DB1: GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,?), ref: 00780DE9
                                                        • Part of subcall function 00780DB1: lstrlenW.KERNEL32(?), ref: 00780DFA
                                                        • Part of subcall function 00780DB1: lstrlenW.KERNEL32(?), ref: 00780E09
                                                        • Part of subcall function 00780DB1: PathAppendW.SHLWAPI(?,007C7D9C), ref: 00780E29
                                                        • Part of subcall function 00780DB1: PathAppendW.SHLWAPI(?,?), ref: 00780E33
                                                        • Part of subcall function 00780DB1: lstrcpynW.KERNEL32(?,?,00000104), ref: 00780E4B
                                                      • PathFileExistsW.SHLWAPI(?,?,00000008), ref: 007400AB
                                                      • GetForegroundWindow.USER32(00000010,*g~b0R%,?,?,00000008), ref: 007400BD
                                                        • Part of subcall function 00780F0F: wvnsprintfW.SHLWAPI(?,00000800,?,?), ref: 00780F39
                                                        • Part of subcall function 00780F0F: MessageBoxW.USER32(?,?,007BC428,?), ref: 00780F4B
                                                      • GetForegroundWindow.USER32(00000010,007BF7FC,?,?), ref: 0074012B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Path$AppendFileForegroundModuleWindowlstrlen$ExistsHandleMessageName_memsetlstrcpynwvnsprintf
                                                      • String ID: "%s" %s$*g~b0R%
                                                      • API String ID: 2355160300-2559192472
                                                      • Opcode ID: 8434eafda505f1823e21e5b528c0dce1ecdf56081fe42cb6234a65f837b06123
                                                      • Instruction ID: 2600253798e3d950ccf431bb575cacad05b410a1167e846c2b53325ba2a080b3
                                                      • Opcode Fuzzy Hash: 8434eafda505f1823e21e5b528c0dce1ecdf56081fe42cb6234a65f837b06123
                                                      • Instruction Fuzzy Hash: 0E21E976644304ABCB10FBA5AC5EBAF73D4AB88710F44493DF74997251E73CD90883A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00795228
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00795232
                                                        • Part of subcall function 0078A01C: std::_Lockit::_Lockit.LIBCPMT ref: 0078A02A
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 00795281
                                                      • __CxxThrowException@8.LIBCMT ref: 0079528F
                                                      • std::locale::facet::_Incref.LIBCPMT ref: 0079529F
                                                      • std::locale::facet::facet_Register.LIBCPMT ref: 007952A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LockitLockit::_std::_$Exception@8H_prolog3IncrefRegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_std::locale::facet::facet_
                                                      • String ID: bad cast
                                                      • API String ID: 3456076226-3145022300
                                                      • Opcode ID: a069c69efc58452f1a8e81285c50d037787360113ec1b46c72d04babf4820a2c
                                                      • Instruction ID: a14217c600dad417cd9f93cf7db5f5d0818576d5cccb0bb68b21073fa37f900a
                                                      • Opcode Fuzzy Hash: a069c69efc58452f1a8e81285c50d037787360113ec1b46c72d04babf4820a2c
                                                      • Instruction Fuzzy Hash: F8016172D41628EBCF15EBA4E81AAAD73747B40724F140229E5247B2D1EB3C9E00C796
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 007956DD
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 007956E7
                                                        • Part of subcall function 0078A01C: std::_Lockit::_Lockit.LIBCPMT ref: 0078A02A
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 00795736
                                                      • __CxxThrowException@8.LIBCMT ref: 00795744
                                                      • std::locale::facet::_Incref.LIBCPMT ref: 00795754
                                                      • std::locale::facet::facet_Register.LIBCPMT ref: 0079575A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LockitLockit::_std::_$Exception@8H_prolog3IncrefRegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_std::locale::facet::facet_
                                                      • String ID: bad cast
                                                      • API String ID: 3456076226-3145022300
                                                      • Opcode ID: 9900c10f7599ae5188575e687915d3ab43faa49f5f859727412a0bbb8ee8f579
                                                      • Instruction ID: fcdf652f983d49fc610b41b5bef04361f304d7250b24e88ed98cdc888ba106a0
                                                      • Opcode Fuzzy Hash: 9900c10f7599ae5188575e687915d3ab43faa49f5f859727412a0bbb8ee8f579
                                                      • Instruction Fuzzy Hash: 2A016132901928DBCF16EBA4ED4AAED73746B40720F150259E614BB2D1EB7C9E01C796
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0079577B
                                                      • std::_Lockit::_Lockit.LIBCPMT ref: 00795785
                                                        • Part of subcall function 0078A01C: std::_Lockit::_Lockit.LIBCPMT ref: 0078A02A
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 007957D4
                                                      • __CxxThrowException@8.LIBCMT ref: 007957E2
                                                      • std::locale::facet::_Incref.LIBCPMT ref: 007957F2
                                                      • std::locale::facet::facet_Register.LIBCPMT ref: 007957F8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LockitLockit::_std::_$Exception@8H_prolog3IncrefRegisterThrowstd::bad_exception::bad_exceptionstd::locale::facet::_std::locale::facet::facet_
                                                      • String ID: bad cast
                                                      • API String ID: 3456076226-3145022300
                                                      • Opcode ID: 658232866110eed7445a1f750fa179906ab84e5eada26753553fd57845c6b57b
                                                      • Instruction ID: 8daa723c30e15eaa67fa573536c5463fe9e07d70ce54c0450f1ae9d9bfeb0528
                                                      • Opcode Fuzzy Hash: 658232866110eed7445a1f750fa179906ab84e5eada26753553fd57845c6b57b
                                                      • Instruction Fuzzy Hash: 5C016132941629EBCF15EBA4EC4AAED73746B44764F150219E9107B2D1EB3C9E00C795
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00780A8F
                                                      • InitializeCriticalSection.KERNEL32(007DBE74,000000B8,00733F89,B04868B4,B04868B4,00000000,?,?,?,?,B04868B4,?,0000000F,00000000), ref: 00780AE4
                                                      • GetFileAttributesExW.KERNEL32(?,00000000,-000000B4,000000B8,00733F89,B04868B4,B04868B4,00000000,?,?,?,?,B04868B4,?,0000000F,00000000), ref: 00780B07
                                                      • EnterCriticalSection.KERNEL32(007DBE74,-000000B4,000000B8,00733F89,B04868B4,B04868B4,00000000,?,?,?,?,B04868B4,?,0000000F,00000000), ref: 00780BA5
                                                      • LeaveCriticalSection.KERNEL32(007DBE74,-00000070,-00000024,-00000090,-00000030,?,?,?,?,B04868B4,?,0000000F,00000000), ref: 00780C3C
                                                        • Part of subcall function 007829A5: __EH_prolog3.LIBCMT ref: 007829AC
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$AttributesEnterFileH_prolog3H_prolog3_InitializeLeave
                                                      • String ID:
                                                      • API String ID: 1351641723-0
                                                      • Opcode ID: 139a11f8ef8b5e8c3ccd142cc976146ab58696b106753dcd7103a679ddc8620f
                                                      • Instruction ID: 9a5756f7574b499c57fee9f68b901186b146b82b8e9fe8298961cf16d91356d0
                                                      • Opcode Fuzzy Hash: 139a11f8ef8b5e8c3ccd142cc976146ab58696b106753dcd7103a679ddc8620f
                                                      • Instruction Fuzzy Hash: 3C815A71900218DFDF25EFA4DC49BDDBBB5BF04300F108299E519A7292DB386A49DF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • EndDialog.USER32(?,00000002), ref: 00798BED
                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 00798C34
                                                      • SendMessageW.USER32(?,00000080,00000000,?), ref: 00798C3F
                                                      • SendDlgItemMessageW.USER32(?,00000321,000000C5,?,00000000), ref: 00798C59
                                                      • SetDlgItemTextW.USER32(?,00000321,?), ref: 00798C66
                                                      • GetDlgItem.USER32(?,00000321), ref: 00798C70
                                                      • SetFocus.USER32(00000000), ref: 00798C77
                                                      • SetWindowLongW.USER32(?,000000EB,?), ref: 00798C83
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ItemMessageSend$DialogFocusLongTextWindow
                                                      • String ID:
                                                      • API String ID: 4166416915-0
                                                      • Opcode ID: 6e655feb44f8900e8c1fd5522710886bbda8998ba0f007ae476749f4345f8455
                                                      • Instruction ID: adca1f94309498524ff85f5159c01c3ed8c5a4f0b3a12a8f72c81828d133e335
                                                      • Opcode Fuzzy Hash: 6e655feb44f8900e8c1fd5522710886bbda8998ba0f007ae476749f4345f8455
                                                      • Instruction Fuzzy Hash: 0621CD31101248BBDF615F50EC09FAB3B69EB02750F008155FB198A1A0DB7ADC92EBB5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClipBox.GDI32(?,00000000), ref: 007571C5
                                                      • CreateRectRgnIndirect.GDI32(00000000), ref: 007571D5
                                                      • CreateRectRgnIndirect.GDI32(00000000), ref: 007571DE
                                                      • CreateRoundRectRgn.GDI32(?,?,?,?,?,?), ref: 007571F9
                                                      • CombineRgn.GDI32(00014490,00014490,00750EA9,00000001), ref: 00757212
                                                      • CombineRgn.GDI32(00014490,00014490,56038B00,00000001), ref: 0075721E
                                                      • SelectClipRgn.GDI32(?,00014490), ref: 00757224
                                                      • DeleteObject.GDI32(00750EA9), ref: 00757239
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CreateRect$ClipCombineIndirect$DeleteObjectRoundSelect
                                                      • String ID:
                                                      • API String ID: 3239266809-0
                                                      • Opcode ID: b783341b9fcdc4211e614e5bfeaa819437ef1c5553bf842dcc4f8804352a16d8
                                                      • Instruction ID: d1aefa5b1c34a813890e75a10faf11a1c9c8c3bd1ebade07a6f68caf342a1588
                                                      • Opcode Fuzzy Hash: b783341b9fcdc4211e614e5bfeaa819437ef1c5553bf842dcc4f8804352a16d8
                                                      • Instruction Fuzzy Hash: F911D372500209AFDF02EFA8DD84EEB7BB9FF48310B014551FE15E7220C675EA258BA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSystemMetrics.USER32(0000000C), ref: 007468F3
                                                      • GetSystemMetrics.USER32(0000000B), ref: 007468FE
                                                      • LoadImageW.USER32(00000000,00000065,00000001,-0000000F,?,00000000), ref: 00746912
                                                      • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 00746925
                                                      • GetSystemMetrics.USER32(00000032), ref: 00746934
                                                      • GetSystemMetrics.USER32(00000031), ref: 0074693F
                                                      • LoadImageW.USER32(?,00000065,00000001,-0000000F,?,00000000), ref: 00746950
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0074695D
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$ImageLoadMessageSend
                                                      • String ID:
                                                      • API String ID: 530543073-0
                                                      • Opcode ID: f2f48834b8872fa21feee123a6c11538fe734edadcfc520848cbb50d0dc49c5e
                                                      • Instruction ID: a6311efc1ef478744c7d9fde58fcce725ebe1abd0b6a02381e558daa54edb5ed
                                                      • Opcode Fuzzy Hash: f2f48834b8872fa21feee123a6c11538fe734edadcfc520848cbb50d0dc49c5e
                                                      • Instruction Fuzzy Hash: D8016DB37907047AF5109778DC83F66B76DFB04B21F144302B374AE2E1DA96A9104A68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(00000001,?,007312CD,00000000), ref: 00731480
                                                      • SetLastError.KERNEL32(00000002,?,007312CD,00000000), ref: 0073148D
                                                      • SetFileAttributesW.KERNEL32(00000001,00000000,?,007312CD,00000000), ref: 0073149E
                                                      • DeleteFileW.KERNEL32(00000001,?,007312CD,00000000), ref: 007314A5
                                                      • GetParent.USER32(00000001), ref: 007314B2
                                                      • EnableWindow.USER32(00000000), ref: 007314B9
                                                      • IsWindow.USER32(00000001), ref: 007314C3
                                                      • PostMessageW.USER32(00000001,00000010,00000002,00000000), ref: 007314D7
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesWindow$DeleteEnableErrorLastMessageParentPost
                                                      • String ID:
                                                      • API String ID: 226735038-0
                                                      • Opcode ID: b7492787fb347f65cd97d21ab8e4003ea7ea6c7d686b737612a05775cf0dc103
                                                      • Instruction ID: 9e246e83bf91742c1e3da6819bd92bc0d062c1008c2a1de0b4a9cfdca6fb503b
                                                      • Opcode Fuzzy Hash: b7492787fb347f65cd97d21ab8e4003ea7ea6c7d686b737612a05775cf0dc103
                                                      • Instruction Fuzzy Hash: F501BC76540245AFEA108B68AC0CFAAB728BF06321F44C200F735971E2C73CE800DB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: valuechanged
                                                      • API String ID: 0-4135814588
                                                      • Opcode ID: 32b8b106496457c00f0f4f02ec0006eb840ad5e3853d56a412f01ec1e725afd3
                                                      • Instruction ID: d140167ffbfe65808c507b18feb98cb350e48f57de05164c282e5d18ea8e4c19
                                                      • Opcode Fuzzy Hash: 32b8b106496457c00f0f4f02ec0006eb840ad5e3853d56a412f01ec1e725afd3
                                                      • Instruction Fuzzy Hash: 6CD1A6717006039FC719DE7CC998AB9F7A6BB85304F188229D99AD7245CB39BC54C7D0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0078C055
                                                        • Part of subcall function 0078D696: __EH_prolog3.LIBCMT ref: 0078D69D
                                                        • Part of subcall function 0078D9A3: __EH_prolog3.LIBCMT ref: 0078D9AA
                                                        • Part of subcall function 0078D396: __CxxThrowException@8.LIBCMT ref: 0078D3B8
                                                        • Part of subcall function 0078D396: std::runtime_error::runtime_error.LIBCPMT ref: 0078D3C5
                                                        • Part of subcall function 00787154: __EH_prolog3.LIBCMT ref: 0078715B
                                                        • Part of subcall function 00789C83: __EH_prolog3.LIBCMT ref: 00789C8A
                                                      Strings
                                                      • Missing '}' or object member name, xrefs: 0078C290
                                                      • Duplicate key: ', xrefs: 0078C327
                                                      • keylength >= 2^30, xrefs: 0078C2FD
                                                      • Missing ',' or '}' in object declaration, xrefs: 0078C378
                                                      • Missing ':' after object member name, xrefs: 0078C3A9
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3$Exception@8H_prolog3_Throwstd::runtime_error::runtime_error
                                                      • String ID: Duplicate key: '$Missing ',' or '}' in object declaration$Missing ':' after object member name$Missing '}' or object member name$keylength >= 2^30
                                                      • API String ID: 3684689185-466942808
                                                      • Opcode ID: 949db4ced0fbb194ea096ae5a78508c471dbde1594e009a6334ca196edeb765d
                                                      • Instruction ID: e68a8e439a514ffd7ae45585f2a2f9ac6478605556fea6cf6f5a37cabd69b759
                                                      • Opcode Fuzzy Hash: 949db4ced0fbb194ea096ae5a78508c471dbde1594e009a6334ca196edeb765d
                                                      • Instruction Fuzzy Hash: CDA17371D40258DADF12FBE4C88ABEDB778BF15300F148099E549B7182DB785A49CBB2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharNextW.USER32(?,00000002,00000002,?,00000002,?,?), ref: 00746230
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CharNext
                                                      • String ID: Error parsing element name$Expected end-tag start$Expected start tag$Expected start-tag closing$Unmatched closing tag
                                                      • API String ID: 3213498283-2540963027
                                                      • Opcode ID: c6aaee34a5f08bb4e2bc02704bde2e85faad3b8c455d832fb07893ad6d21d6e9
                                                      • Instruction ID: 51bd2d15f8f204bc8faa74973d1337098d1ac3df8aef2d7b722cbcf91a3556f5
                                                      • Opcode Fuzzy Hash: c6aaee34a5f08bb4e2bc02704bde2e85faad3b8c455d832fb07893ad6d21d6e9
                                                      • Instruction Fuzzy Hash: B671C171A00224EFCF21EF68C985A6A77F0FF07310B4181AAE5019F265D7B99D41CB93
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SHGetValueW.SHLWAPI(80000002,Software\projone\podlp\volatile\,ruleCleaned,?,?,?,B04868B4,?,00000000,00000008), ref: 007362FE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Value
                                                      • String ID: Software\projone\podlp\$Software\projone\podlp\volatile\$ruleCleaned$rulechktime$ruleimporttime
                                                      • API String ID: 3702945584-3977685612
                                                      • Opcode ID: dea8b68148a719baad805ccc034500fe0428435c62337fbc052f59de478bab10
                                                      • Instruction ID: 46fd062ce11f0cc63b9fe5a181049266d8a794b33f55176a09801af97c2b2852
                                                      • Opcode Fuzzy Hash: dea8b68148a719baad805ccc034500fe0428435c62337fbc052f59de478bab10
                                                      • Instruction Fuzzy Hash: 9E518CB1908380EBE710DF55C881B5BF7E4BF84700F508A2EF69583252E778E904CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0079695A
                                                        • Part of subcall function 0078DC8C: __EH_prolog3.LIBCMT ref: 0078DC96
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3
                                                      • String ID: code$desc$info$options${'code':1}
                                                      • API String ID: 431132790-337168166
                                                      • Opcode ID: 37e1cd30042e96b3f0175de05909cf360b99895c7ede04046f1ec2da94858757
                                                      • Instruction ID: b28b8f42cc32e87a08533f9ee0fa9d2b8da911dcad0a5c51a835bc3664f26c6f
                                                      • Opcode Fuzzy Hash: 37e1cd30042e96b3f0175de05909cf360b99895c7ede04046f1ec2da94858757
                                                      • Instruction Fuzzy Hash: 5241C3B1804249EEDF01FBA0C84AADE7BB8AF05324F14815AF404B7282DB3C9F49D761
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CountFocusTick
                                                      • String ID: killfocus$setfocus
                                                      • API String ID: 3897604831-1991930995
                                                      • Opcode ID: d9e98b63bcec64efaff469ad96b2ecd05a7808689dc0dc57be7f2fb8de411dba
                                                      • Instruction ID: 3dd3518452e6667d25f07b298e70216683a77b7cab04d5687ac6f76b186868e6
                                                      • Opcode Fuzzy Hash: d9e98b63bcec64efaff469ad96b2ecd05a7808689dc0dc57be7f2fb8de411dba
                                                      • Instruction Fuzzy Hash: 41318671644741AFD714CF24C898FAB7BE6EF84700F008D6DF69A97251CB79A848CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindMITargetTypeInstance.LIBCMT ref: 007B277F
                                                        • Part of subcall function 007B24CB: PMDtoOffset.LIBCMT ref: 007B255B
                                                      • FindVITargetTypeInstance.LIBCMT ref: 007B2786
                                                      • PMDtoOffset.LIBCMT ref: 007B2796
                                                      • std::bad_exception::bad_exception.LIBCMT ref: 007B27BC
                                                      • __CxxThrowException@8.LIBCMT ref: 007B27CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: FindInstanceOffsetTargetType$Exception@8Throwstd::bad_exception::bad_exception
                                                      • String ID: Bad dynamic_cast!
                                                      • API String ID: 3308565544-2956939130
                                                      • Opcode ID: 3793fbf278f27467a719cd7ef4d8dd4c06e3c32bf0ca6eaee351385cda4fe787
                                                      • Instruction ID: 5d63ba63e35ae0ecc036b277ed7e31c662d7090a5c8590aca4f7d3e6244e26d0
                                                      • Opcode Fuzzy Hash: 3793fbf278f27467a719cd7ef4d8dd4c06e3c32bf0ca6eaee351385cda4fe787
                                                      • Instruction Fuzzy Hash: 1B119D32A012099FCF14EE64D84ABEE77A0AF04761F244059F914A7292EE3CD902DB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetPropW.USER32(?,WndX), ref: 00746B40
                                                      • GetPropW.USER32(?,WndX), ref: 00746B66
                                                      • CallWindowProcW.USER32(?,?,00000082,?,?), ref: 00746B87
                                                      • SetPropW.USER32(?,WndX,00000000), ref: 00746B9F
                                                      • DefWindowProcW.USER32(?,00000081,?,?), ref: 00746BC0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Prop$ProcWindow$Call
                                                      • String ID: WndX
                                                      • API String ID: 1029653574-1375107400
                                                      • Opcode ID: 71e3b29ac660959cabcc76780b5a7ee2e9e7fc518e09d096793dc028937ad3d7
                                                      • Instruction ID: a97100c7ac531ee23fbf20270c7eec139ae780055bc6808f764918cc85fafc40
                                                      • Opcode Fuzzy Hash: 71e3b29ac660959cabcc76780b5a7ee2e9e7fc518e09d096793dc028937ad3d7
                                                      • Instruction Fuzzy Hash: 8E2159B1600209EFCB219F61DD48EAB7BA9FF05721F108518FA5A97221C738DC20DF61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 007469F2
                                                      • GetClassInfoExW.USER32(00000000,00000000), ref: 00746A15
                                                      • GetClassInfoExW.USER32(00000000,00000000), ref: 00746A2E
                                                      • RegisterClassExW.USER32(00000030), ref: 00746A5A
                                                      • GetLastError.KERNEL32(?,?), ref: 00746A65
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Class$Info$ErrorLastRegister_memset
                                                      • String ID: 0
                                                      • API String ID: 3690237952-4108050209
                                                      • Opcode ID: b77767ee046dc997439561e965974ad5f0d9f4dcacf8b38591cd6658c80f5531
                                                      • Instruction ID: ec07d7498837c5a6550ec2b042c8b4bd421d3c3d3c0a273bcdf372c56b4a4f0e
                                                      • Opcode Fuzzy Hash: b77767ee046dc997439561e965974ad5f0d9f4dcacf8b38591cd6658c80f5531
                                                      • Instruction Fuzzy Hash: 30112E75B10608AFDB00EBA8D849FAE77FCAB49345F14C419E652E3250D778D9058B62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(User32.dll,00000004,00000000,00000000,00000000,0074C317,00000000,00000000,00000000,00000000,?,?,00000000,?,00000000), ref: 007480E0
                                                      • GetProcAddress.KERNEL32(00000000,SetLayeredWindowAttributes), ref: 007480F0
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00748104
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00748132
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$AddressHandleModuleProc
                                                      • String ID: SetLayeredWindowAttributes$User32.dll
                                                      • API String ID: 1792074081-2510956139
                                                      • Opcode ID: cbb410194801602dcfe4667e9260fc7cfc175d33a9d797f075737bbb4483bd2a
                                                      • Instruction ID: 411eb29243d3fdd313492700b8b09ac78be6b014b035a0334f27784ce38c1552
                                                      • Opcode Fuzzy Hash: cbb410194801602dcfe4667e9260fc7cfc175d33a9d797f075737bbb4483bd2a
                                                      • Instruction Fuzzy Hash: 4E01D432204609ABDB651739CC4AFABFBD8AF90711F10862EF3A7D11E0CF7858018621
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __getptd.LIBCMT ref: 0079EE52
                                                        • Part of subcall function 0079CEFB: __getptd_noexit.LIBCMT ref: 0079CEFE
                                                        • Part of subcall function 0079CEFB: __amsg_exit.LIBCMT ref: 0079CF0B
                                                      • __amsg_exit.LIBCMT ref: 0079EE72
                                                      • __lock.LIBCMT ref: 0079EE82
                                                      • InterlockedDecrement.KERNEL32(?), ref: 0079EE9F
                                                      • InterlockedIncrement.KERNEL32(02A015C0), ref: 0079EECA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Interlocked__amsg_exit$DecrementIncrement__getptd__getptd_noexit__lock
                                                      • String ID: 0d}
                                                      • API String ID: 4271482742-4094664608
                                                      • Opcode ID: aead788d84b92fa36f90089ccf45d37bdd68130d35abe655f2564608cc2fae62
                                                      • Instruction ID: 50e6e5b77ffd7aa644ed72b8f0fd0b6735195bc1126e06669d3c86eddf8bf84d
                                                      • Opcode Fuzzy Hash: aead788d84b92fa36f90089ccf45d37bdd68130d35abe655f2564608cc2fae62
                                                      • Instruction Fuzzy Hash: A0014072A41A25EBEF21EB69B80975AB7A0AF00B20F05411AF814672D0C73C6D81DBD9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 007771C2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,?,?,007D8120,B04868B4), ref: 00777253
                                                        • Part of subcall function 007771C2: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 007773A1
                                                        • Part of subcall function 007771C2: GetFileSize.KERNEL32(00000000,00000000), ref: 007773B0
                                                        • Part of subcall function 007771C2: CloseHandle.KERNEL32(00000000), ref: 007773BD
                                                      • GdipImageGetFrameDimensionsCount.GDIPLUS(?,00000000), ref: 00776F69
                                                      • GdipImageGetFrameDimensionsList.GDIPLUS(00000000,00000000,00000000,?,?,00000000), ref: 00776F9E
                                                      • GdipImageGetFrameCount.GDIPLUS(00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00776FBE
                                                      • GdipGetPropertyItemSize.GDIPLUS(00000000,00005100,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00776FEA
                                                      • _malloc.LIBCMT ref: 00776FF9
                                                      • GdipGetPropertyItem.GDIPLUS(00000000,00005100,00000000,00000000,00000000,00005100,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00777013
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Gdip$FileFrameImage$CountCreateDimensionsItemPropertySize$CloseHandleList_malloc
                                                      • String ID:
                                                      • API String ID: 2622832799-0
                                                      • Opcode ID: 0206381364ebb68cb97d63597be7206003c00b0d9d658ba64402eb8077a7cfa7
                                                      • Instruction ID: fd47345d4555b3a5edd545348ad3977e1a023c73a74ac2b4a7ac5a0f6417aaac
                                                      • Opcode Fuzzy Hash: 0206381364ebb68cb97d63597be7206003c00b0d9d658ba64402eb8077a7cfa7
                                                      • Instruction Fuzzy Hash: E241CA71A00A05FFDF14DB60C986BAEB7BAFF84340F148268E908A7151DF35AD60DB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PathFileExistsW.SHLWAPI(?,00000008,?,?), ref: 007333A2
                                                      • DeleteFileW.KERNEL32(?), ref: 007333D9
                                                      • _memset.LIBCMT ref: 007333EE
                                                      • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004000), ref: 00733408
                                                      • SHGetImageList.SHELL32(00000002,007B972C,?), ref: 00733420
                                                      • DestroyIcon.USER32(?), ref: 0073345F
                                                        • Part of subcall function 00780A3D: GetFileAttributesExW.KERNEL32(007333B4,00000000,?,?,?,?,?,?,?,?,?,?,007333B4,?), ref: 00780A5C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesDeleteDestroyExistsIconImageInfoListPath_memset
                                                      • String ID:
                                                      • API String ID: 2762979931-0
                                                      • Opcode ID: aba6478dccbb1c1c14b8fc338c0dfdf7c036525442d80c80d80bd688f64a85b4
                                                      • Instruction ID: b8e8f52bcf454628fc2ea7423b0e74bcb850cea49d3b6d6e5e13dedd5e4d4432
                                                      • Opcode Fuzzy Hash: aba6478dccbb1c1c14b8fc338c0dfdf7c036525442d80c80d80bd688f64a85b4
                                                      • Instruction Fuzzy Hash: 7121B4716043059FD620EF68AC8AE6FB3E8FBC8B14F00461DF65987191DB78990487A6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(?,74E15EC0,?), ref: 0078093B
                                                      • _memset.LIBCMT ref: 00780962
                                                      • GetFileAttributesW.KERNEL32(?), ref: 0078097A
                                                      • lstrcpyW.KERNEL32(?,?), ref: 007809A0
                                                      • PathRemoveFileSpecW.SHLWAPI(?), ref: 007809AD
                                                      • CreateFileW.KERNEL32(?,10000000,00000000,00000000,00000002,00000080,00000000), ref: 007809D8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreatePathRemoveSpec_memsetlstrcpylstrlen
                                                      • String ID:
                                                      • API String ID: 522591791-0
                                                      • Opcode ID: 42a360613545c3ad1d1777d978dc773f8034faded12b0fde6b8c663119400460
                                                      • Instruction ID: 30b3bc72d86de946b02293ac0823be21b39cc371c1a3ea5f5d87561dafc695cb
                                                      • Opcode Fuzzy Hash: 42a360613545c3ad1d1777d978dc773f8034faded12b0fde6b8c663119400460
                                                      • Instruction Fuzzy Hash: CE2153B1A4021CEBDF50EB749C8DBED76BCAB04304F4085A5E316E3181DA789EC98B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00785294
                                                      • GdipAlloc.GDIPLUS(00000010,00000008,007854B0,?,00000008,?,?,00733678,?,?,?,?,?,?,00000000), ref: 0078529B
                                                      • GdipLoadImageFromFile.GDIPLUS(?,00000004,00000010,00000008,007854B0,?,00000008,?,?,00733678,?,?,?,?,?,?), ref: 007852B6
                                                      • GdipAlloc.GDIPLUS(00000010,00000010,00000008,007854B0,?,00000008,?,?,00733678,?,?,?,?,?,?,00000000), ref: 007852E2
                                                      • GdipSetPageUnit.GDIPLUS(?,00000002,00000010,00000010,00000008,007854B0,?,00000008,?,?,00733678,?,?,?,?,?), ref: 00785319
                                                      • GdipDeleteGraphics.GDIPLUS(?,?,?,?,?,00000000), ref: 0078534C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Gdip$Alloc$DeleteFileFromGraphicsH_prolog3ImageLoadPageUnit
                                                      • String ID:
                                                      • API String ID: 4174166734-0
                                                      • Opcode ID: 21690630283fe5a8bcbf2ad74e0f972d8f3326a94e41501594e92ce91910e01f
                                                      • Instruction ID: e9d3933cb58f86f2597a58d67777e4169c58427a4591a955623b1027f2fd0acc
                                                      • Opcode Fuzzy Hash: 21690630283fe5a8bcbf2ad74e0f972d8f3326a94e41501594e92ce91910e01f
                                                      • Instruction Fuzzy Hash: A721C371680705EBEF11BBB4CC4B76E72A56F44341F140424F941EB283EFACAD019761
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindResourceW.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,007313BF,?,00000000,00000000,?,00000000), ref: 0074D38D
                                                      • LoadResource.KERNEL32(00000000,00000000,?,?,00000000,?,?,007313BF,?,00000000,00000000,?,00000000), ref: 0074D3A0
                                                      • FreeResource.KERNEL32(00000000,?,?,00000000,?,?,007313BF,?,00000000,00000000,?,00000000), ref: 0074D3AD
                                                      • SizeofResource.KERNEL32(00000000,00000000,?,?,00000000,?,?,007313BF,?,00000000,00000000,?,00000000), ref: 0074D3C4
                                                      • LockResource.KERNEL32(00000000,00000000,?,?,00000000,?,?,007313BF,?,00000000,00000000,?,00000000), ref: 0074D3CC
                                                      • FreeResource.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,007313BF,?,00000000,00000000,?,00000000), ref: 0074D3DE
                                                        • Part of subcall function 00745A3C: _malloc.LIBCMT ref: 00745A60
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Resource$Free$FindLoadLockSizeof_malloc
                                                      • String ID:
                                                      • API String ID: 572625495-0
                                                      • Opcode ID: b550e3222be17812ae0e900cb79c7fb0208faa2840816e4fb8871b8830871bfc
                                                      • Instruction ID: ff552263c7a657ed5a1de9baf8140fa75069c86402363e15944b6fec2b889794
                                                      • Opcode Fuzzy Hash: b550e3222be17812ae0e900cb79c7fb0208faa2840816e4fb8871b8830871bfc
                                                      • Instruction Fuzzy Hash: A71190B1604606EB8F316F749C48DAE3B6CEF463507008629FEA6D3252DF3D8C118666
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 007825D9
                                                      • IsWindow.USER32(?), ref: 007825EA
                                                      • IsWindow.USER32(00000000), ref: 007825F1
                                                      • GetWindowRect.USER32(?,00000000), ref: 0078261C
                                                      • GetWindowRect.USER32(00000000,00000000), ref: 00782623
                                                      • MoveWindow.USER32(?,00000000,?,00000000,?,00000001), ref: 0078265A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$Rect$DesktopMove
                                                      • String ID:
                                                      • API String ID: 2894293738-0
                                                      • Opcode ID: 8ee6562efdced88a384f94983b3897874956219b4ed710d9740c56667c8e6409
                                                      • Instruction ID: 2675301822289e07f8691c21f03d2bb666fef334d14e7103f023d368c43dfa3b
                                                      • Opcode Fuzzy Hash: 8ee6562efdced88a384f94983b3897874956219b4ed710d9740c56667c8e6409
                                                      • Instruction Fuzzy Hash: 3E11F972A1011AAFDB00DFB8CD89EEEBBB9EB48251F044525EA01F2154DA74AD058BA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,?,?,?), ref: 00780DE9
                                                      • lstrlenW.KERNEL32(?), ref: 00780DFA
                                                      • lstrlenW.KERNEL32(?), ref: 00780E09
                                                      • PathAppendW.SHLWAPI(?,007C7D9C), ref: 00780E29
                                                      • PathAppendW.SHLWAPI(?,?), ref: 00780E33
                                                      • lstrcpynW.KERNEL32(?,?,00000104), ref: 00780E4B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AppendPathlstrlen$FileModuleNamelstrcpyn
                                                      • String ID:
                                                      • API String ID: 2356946560-0
                                                      • Opcode ID: 620024e70365fea59f020714a4e6052a7930dea3f0c65f19de9ba86299dd2242
                                                      • Instruction ID: 3dbbf208b7bb7310bfa2cb730c99f017ab513891b6f689c037b51052d6da2ddc
                                                      • Opcode Fuzzy Hash: 620024e70365fea59f020714a4e6052a7930dea3f0c65f19de9ba86299dd2242
                                                      • Instruction Fuzzy Hash: C11130B294121CABCB10EF65DD48EDF73BCAF54700F1049A5A619D3150D674DA44CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000002,007D81AC,00000000,00000000,00000000,00777416,?,007D8120,00000000), ref: 00777453
                                                      • GlobalLock.KERNEL32(00000000), ref: 0077745C
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00777474
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00777488
                                                      • GdipAlloc.GDIPLUS(00000010), ref: 00777492
                                                      • GdipLoadImageFromStream.GDIPLUS(00000000,00000004,00000010), ref: 007774AB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocGdipStream$CreateFromImageLoadLockUnlock
                                                      • String ID:
                                                      • API String ID: 1747925419-0
                                                      • Opcode ID: f3004767f0d44af3de158b7186f5efeee9a55ae53444ac7f3702155f8ebac5bc
                                                      • Instruction ID: 53a5edc8c49a1af438afe94bbe9d15c9d3984a70b0aef9ada27e47134f67a963
                                                      • Opcode Fuzzy Hash: f3004767f0d44af3de158b7186f5efeee9a55ae53444ac7f3702155f8ebac5bc
                                                      • Instruction Fuzzy Hash: 3F11A172504202ABDB129FA4DC49F6ABBB9FF85381F108918F65887251EB3D9821CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetACP.KERNEL32(00000000,00000007,000000FF,00000000,00000000,00000000,00000000,00000000,B04868B4,?,00000000,?,00733AD8,?,00000000,?), ref: 007805F8
                                                      • WideCharToMultiByte.KERNEL32(00000000,?,00000000,?,00733AD8,?,00000000,?,?,?,00733C3E,?), ref: 00780601
                                                      • _malloc.LIBCMT ref: 00780609
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • _memset.LIBCMT ref: 0078061D
                                                      • GetACP.KERNEL32(00000000,?,000000FF,00000000,?,00000000,00000000), ref: 00780633
                                                      • WideCharToMultiByte.KERNEL32(00000000), ref: 00780636
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocHeap_malloc_memset
                                                      • String ID:
                                                      • API String ID: 2311837860-0
                                                      • Opcode ID: 93a4ed7fecf798081ae2536dbd05014fc8d66b7fcb123b95fe61372a57c042cf
                                                      • Instruction ID: 7952bcdf4ad7d8805ec89187d323639ece8e5f5e6b91bb21c3a9d24e768e1702
                                                      • Opcode Fuzzy Hash: 93a4ed7fecf798081ae2536dbd05014fc8d66b7fcb123b95fe61372a57c042cf
                                                      • Instruction Fuzzy Hash: 91F0C872548250BE9621AA66AC49C7BBFBCFAC7B74B10071DF27082190DA25D815C7B5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __CreateFrameInfo.LIBCMT ref: 007A15E4
                                                        • Part of subcall function 0079C19C: __getptd.LIBCMT ref: 0079C1AA
                                                        • Part of subcall function 0079C19C: __getptd.LIBCMT ref: 0079C1B8
                                                      • __getptd.LIBCMT ref: 007A15EE
                                                        • Part of subcall function 0079CEFB: __getptd_noexit.LIBCMT ref: 0079CEFE
                                                        • Part of subcall function 0079CEFB: __amsg_exit.LIBCMT ref: 0079CF0B
                                                      • __getptd.LIBCMT ref: 007A15FC
                                                      • __getptd.LIBCMT ref: 007A160A
                                                      • __getptd.LIBCMT ref: 007A1615
                                                      • _CallCatchBlock2.LIBCMT ref: 007A163B
                                                        • Part of subcall function 0079C241: __CallSettingFrame@12.LIBCMT ref: 0079C28D
                                                        • Part of subcall function 007A16E2: __getptd.LIBCMT ref: 007A16F1
                                                        • Part of subcall function 007A16E2: __getptd.LIBCMT ref: 007A16FF
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __getptd$Call$Block2CatchCreateFrameFrame@12InfoSetting__amsg_exit__getptd_noexit
                                                      • String ID:
                                                      • API String ID: 1602911419-0
                                                      • Opcode ID: 6abb5edf29e61c5433dbfa94702e78ac7e3e4153a0c61f06fe8c4bae13f9fa75
                                                      • Instruction ID: edb4525f18d8e8ae249c9f9aeddf04ef37422cd17de7269cee5d30afd19dbfaf
                                                      • Opcode Fuzzy Hash: 6abb5edf29e61c5433dbfa94702e78ac7e3e4153a0c61f06fe8c4bae13f9fa75
                                                      • Instruction Fuzzy Hash: 211116B1C00209DFDF01EFA4E88AAAD7BB4FF08314F508169F855AB291DB389A119F50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SelectObject.GDI32(?), ref: 0074B4CF
                                                      • GetTextMetricsW.GDI32(?,007DB814), ref: 0074B4DA
                                                      • SelectObject.GDI32(?,00000000), ref: 0074B4E3
                                                      • SelectObject.GDI32(?,?), ref: 0074B50C
                                                      • GetTextMetricsW.GDI32(?,?), ref: 0074B515
                                                      • SelectObject.GDI32(?,?), ref: 0074B521
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelect$MetricsText
                                                      • String ID:
                                                      • API String ID: 3697559710-0
                                                      • Opcode ID: a99d344086ca5d0416c140debd6c3135bda7b3e0c31421bd3d8622d32d362749
                                                      • Instruction ID: 06d289c46e56bb9d66eb770160ae75a24b329167f347a5584bb1d2f285d9b513
                                                      • Opcode Fuzzy Hash: a99d344086ca5d0416c140debd6c3135bda7b3e0c31421bd3d8622d32d362749
                                                      • Instruction Fuzzy Hash: C3018036201206EFCF159F64DC44A95FBB9FF58345B11852AF25593220EB3A6D24DFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetACP.KERNEL32(00000000,00000003,000000FF,00000000,00000000,00000000,?,?,?,007339D6,?,00000000,00000003,?,?,00785549), ref: 00780531
                                                      • MultiByteToWideChar.KERNEL32(00000000,?,?,007339D6,?,00000000,00000003,?,?,00785549,?), ref: 0078053A
                                                      • _malloc.LIBCMT ref: 00780543
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • _memset.LIBCMT ref: 00780557
                                                      • GetACP.KERNEL32(00000000,?,000000FF,00000000,00000000), ref: 00780569
                                                      • MultiByteToWideChar.KERNEL32(00000000), ref: 0078056C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocHeap_malloc_memset
                                                      • String ID:
                                                      • API String ID: 2311837860-0
                                                      • Opcode ID: b0052f4c74d374adf06cb89f4bee67d747f8dbba733a002ee70e5e6388e6202d
                                                      • Instruction ID: 1dbd6c4bc10211789022a7601877f73d8fa1578c13d6b09482c32753322cfcb5
                                                      • Opcode Fuzzy Hash: b0052f4c74d374adf06cb89f4bee67d747f8dbba733a002ee70e5e6388e6202d
                                                      • Instruction Fuzzy Hash: DBF0C272949218BBDB10A6E5AC09EABB78CFB49360F100725BA14D2190DA29DE109BB4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PtInRect.USER32(00000000,?,?), ref: 0076E9C1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect
                                                      • String ID: @
                                                      • API String ID: 400858303-2766056989
                                                      • Opcode ID: 320a3cea08c897c200383ea30e71f52a8b089fb36398a8009fd9a5ff080267e3
                                                      • Instruction ID: 649060d39ba0161d0829449d26390dcd509944a337fb2fa7b5e544d54b7c96bb
                                                      • Opcode Fuzzy Hash: 320a3cea08c897c200383ea30e71f52a8b089fb36398a8009fd9a5ff080267e3
                                                      • Instruction Fuzzy Hash: AAB13E753006018FDB15DF28C498AAA77E2BF85300F1985BDED4B9F256DB39E809CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PtInRect.USER32(00000000,?,?), ref: 007767A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect
                                                      • String ID: @
                                                      • API String ID: 400858303-2766056989
                                                      • Opcode ID: e3946359636750e803d50c1e72dd0d039743204b1852a43915a4116e7dc5c541
                                                      • Instruction ID: 33b7b6cf44beb026670a28e60383e9b599e4580392defe792839c4903878f6e5
                                                      • Opcode Fuzzy Hash: e3946359636750e803d50c1e72dd0d039743204b1852a43915a4116e7dc5c541
                                                      • Instruction Fuzzy Hash: C1B13C70200A018FCF04DF28C598AA977E6AF85344F09C5B9ED4EAF25ADB75EC05CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00785864: __EH_prolog3_GS.LIBCMT ref: 0078586E
                                                      • _memset.LIBCMT ref: 0073C3C6
                                                        • Part of subcall function 0073D140: std::_String_base::_Xlen.LIBCPMT ref: 0073D19C
                                                        • Part of subcall function 0073D140: _memcpy_s.LIBCMT ref: 0073D1F6
                                                        • Part of subcall function 0078E3B6: __EH_prolog3.LIBCMT ref: 0078E3C0
                                                      • lstrcpyW.KERNEL32(?,-00000004), ref: 0073C476
                                                      • SendMessageW.USER32(?,00000505,?,00000000), ref: 0073C509
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_MessageSendString_base::_Xlen_memcpy_s_memsetlstrcpystd::_
                                                      • String ID: depid$depname
                                                      • API String ID: 3271931949-2144967637
                                                      • Opcode ID: 1b564669cfe8bf09d1dcf9cba9b6eabbc69f23650846630761e71207df4cb031
                                                      • Instruction ID: d430f1256b6940ea223c291ec129d1d1abf8fb500c2eeb9e152e51ecedea7900
                                                      • Opcode Fuzzy Hash: 1b564669cfe8bf09d1dcf9cba9b6eabbc69f23650846630761e71207df4cb031
                                                      • Instruction Fuzzy Hash: 9C919FB1408380DFE731DF24C885B9BBBE8AF84300F44491DF59987252EB79A508CB53
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 007717B6
                                                        • Part of subcall function 0079B5B0: _malloc.LIBCMT ref: 0079B5CA
                                                        • Part of subcall function 00771C2B: __wcsicoll.LIBCMT ref: 00771C40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3__wcsicoll_malloc
                                                      • String ID: <l|$align$hl|$left
                                                      • API String ID: 1350217532-2434893885
                                                      • Opcode ID: 78ea6caf51aa6ce779494dcc644fdde6ddfef3038bf688c096ccdadbd1b50624
                                                      • Instruction ID: 13687b0f71a71e65d54147739f6f4020fdec6b54240fa5b768b4172a50d3c9da
                                                      • Opcode Fuzzy Hash: 78ea6caf51aa6ce779494dcc644fdde6ddfef3038bf688c096ccdadbd1b50624
                                                      • Instruction Fuzzy Hash: 8A615F70701642EFDB08DF78D488BA8FBA2BF45300F5442ADE559A7351CB766960CB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Exception@8FindInstanceOffsetTargetThrowTypestd::bad_exception::bad_exception
                                                      • String ID: Software\projone\podlp\smpcache\$_onecli_lastSel$tlayToolContainer$vlayAccountPanel
                                                      • API String ID: 960618624-3169965450
                                                      • Opcode ID: f6fab94f6bea4131e4002c68ba9631ca2e46ca622d441693440bbd1a6ce46e9a
                                                      • Instruction ID: 5e1f1e2c3498f8d2ffdc4dfdff6d951ab4953435ffe24172b6d609efc93cdf69
                                                      • Opcode Fuzzy Hash: f6fab94f6bea4131e4002c68ba9631ca2e46ca622d441693440bbd1a6ce46e9a
                                                      • Instruction Fuzzy Hash: DF5183B1548384EEE774AB648D4AF9FB6E8EF84304F00492EF58D57282DB796504C763
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PostMessageW.USER32(?,00000502,?,00000000), ref: 00735418
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00735424
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MessagePost
                                                      • String ID: itemclick$lstModify$lstRemove
                                                      • API String ID: 410705778-4189857778
                                                      • Opcode ID: 4859392c16d8573029c0d452ebc9180969241eb010c151a5034b6199d0cc262c
                                                      • Instruction ID: 728ff3f97b206aa96640993fe55de5cdd98996d49e1b29dca7f1e97f2c407ed2
                                                      • Opcode Fuzzy Hash: 4859392c16d8573029c0d452ebc9180969241eb010c151a5034b6199d0cc262c
                                                      • Instruction Fuzzy Hash: B24192B1604741DFE724DB24CD45FA7B3E5FF99708F104A2CE6498B292E779A804CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __wcstoi64
                                                      • String ID: childvpadding$columns$itemsize
                                                      • API String ID: 398114495-1858099967
                                                      • Opcode ID: 84b8e7789ea5cef5195f723f5c1dc328314d17d82068d128ae1034eae5876acb
                                                      • Instruction ID: cae5babf4f11e870ae668c3fffca775dbfa26da540b2121b3dcbff4b662a1369
                                                      • Opcode Fuzzy Hash: 84b8e7789ea5cef5195f723f5c1dc328314d17d82068d128ae1034eae5876acb
                                                      • Instruction Fuzzy Hash: B041B621B20203DADB20AF38C845AB673A69F71B64B584679EC06CB195F73BDD45C392
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0075CBA1: _memset.LIBCMT ref: 0075CBBE
                                                        • Part of subcall function 0075CBA1: GetObjectW.GDI32(00000000,0000005C,?), ref: 0075CBE1
                                                        • Part of subcall function 0075CBA1: GetDeviceCaps.GDI32(?,0000005A), ref: 0075CC21
                                                      • _memset.LIBCMT ref: 0075CD82
                                                      • LoadLibraryW.KERNEL32(msftedit.dll), ref: 0075CE06
                                                      • GetProcAddress.KERNEL32(00000000,CreateTextServices), ref: 0075CE16
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _memset$AddressCapsDeviceLibraryLoadObjectProc
                                                      • String ID: CreateTextServices$msftedit.dll
                                                      • API String ID: 4046179195-260715840
                                                      • Opcode ID: e3e64719ba4237928d83305913362a71c9ae0f743a3c860e42b86a3db3fd1957
                                                      • Instruction ID: e81b3f59cd61eae35cf7ad4463b223a499c8372f06275368be234914b726e764
                                                      • Opcode Fuzzy Hash: e3e64719ba4237928d83305913362a71c9ae0f743a3c860e42b86a3db3fd1957
                                                      • Instruction Fuzzy Hash: BE317C71200701AFD721CF65D88AB92BBF8FF48B41F10452DE94ADB240DBB8E549CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShowWindow.USER32(?,00000000), ref: 0076A835
                                                      • CreateWindowExW.USER32(00000000,SysDateTimePick32,00000000,50000000,00000000,00000000,00000000,00000000,?,00001911,00000000,00000000), ref: 0076A8A9
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 0076A8C8
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000040), ref: 0076A8EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateMessageSendShow
                                                      • String ID: SysDateTimePick32
                                                      • API String ID: 3165722030-1405039312
                                                      • Opcode ID: e32671aa07b32dee056f773e3cf76c17dfbdbebd46bbfd084063d0f86dbc36e7
                                                      • Instruction ID: e86227910bc4ca5ef0f65cb10051c70504897032da144bf12b340abf3bd8d69b
                                                      • Opcode Fuzzy Hash: e32671aa07b32dee056f773e3cf76c17dfbdbebd46bbfd084063d0f86dbc36e7
                                                      • Instruction Fuzzy Hash: 08312C35600211AFDF119F68CC88F9B7FB9EF46351F0445B5FE0AAB252CA389845CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PathFindExtensionW.SHLWAPI(?), ref: 00785389
                                                      • lstrcmpiW.KERNEL32(00000002,00000000), ref: 007853AF
                                                      • SetLastError.KERNEL32(0000065E), ref: 007853CA
                                                      • GdipSaveImageToFile.GDIPLUS(?,?,?,?), ref: 00785423
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ErrorExtensionFileFindGdipImageLastPathSavelstrcmpi
                                                      • String ID: d
                                                      • API String ID: 1325332945-2564639436
                                                      • Opcode ID: 11761b0d32f43469ed8fded65ee64bedbe2f34e54a7e4d951d8cabce5dc9019a
                                                      • Instruction ID: 53f180a56300fadfa0f85c0bf67e3d7098009039e43c7073abdd6a93f562961f
                                                      • Opcode Fuzzy Hash: 11761b0d32f43469ed8fded65ee64bedbe2f34e54a7e4d951d8cabce5dc9019a
                                                      • Instruction Fuzzy Hash: 4A21E732941609AFCB11EF64DD44AEE77FAEF45394F504026E906E7110DBB99D41CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GdipGetImageEncodersSize.GDIPLUS(?,?,00000000,?,00000000,?,?,?,?,?,00000000), ref: 00733094
                                                      • _malloc.LIBCMT ref: 007330A6
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • GdipGetImageEncoders.GDIPLUS(?,?,00000000,00000000,?,?,?,?,?,00000000), ref: 007330BB
                                                      • lstrcmpiW.KERNEL32(00000000,image/png,00000000,?,?,00000000,00000000,?,?,?,?,?,00000000), ref: 007330DC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: EncodersGdipImage$AllocHeapSize_malloclstrcmpi
                                                      • String ID: image/png
                                                      • API String ID: 3194904807-2966254431
                                                      • Opcode ID: c99a7622de08615e6ff5663de52d260563f8321608379872b53c31a9b923df17
                                                      • Instruction ID: 23dd64f8e4616f1556a1b8bf90bbddc8deb4ad7898103f74347a3744b9f5baea
                                                      • Opcode Fuzzy Hash: c99a7622de08615e6ff5663de52d260563f8321608379872b53c31a9b923df17
                                                      • Instruction Fuzzy Hash: 7D21B5726443159BDB20DF18B94099BB7D8EF84750F44492EFC8597302D739EA09CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __wcstoi64
                                                      • String ID: textpadding
                                                      • API String ID: 398114495-3914030718
                                                      • Opcode ID: e0786c2f95d6eed453eedff9e9d1119091c441b7b16064593c14a1901b9355fc
                                                      • Instruction ID: dead796327e51509f85258a92c15ded9552e8641b1bc84eab16fc7569a2e95c2
                                                      • Opcode Fuzzy Hash: e0786c2f95d6eed453eedff9e9d1119091c441b7b16064593c14a1901b9355fc
                                                      • Instruction Fuzzy Hash: 63217F72900108BADB10AF68DC41EEA7BB9EF65354F808525FD0AEB155E739EA44C7A0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00788426
                                                      • GetHGlobalFromStream.OLE32(?,?), ref: 00788459
                                                      • GlobalLock.KERNEL32(?), ref: 00788463
                                                      • GlobalSize.KERNEL32(?), ref: 0078846F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Global$Stream$CreateFromLockSize
                                                      • String ID: memory expection
                                                      • API String ID: 3378530493-1431834357
                                                      • Opcode ID: e78b1a5131e3f115e5e7f4879fe8c94efe276752a3141735a509c2de779fdcd2
                                                      • Instruction ID: 0a4966ea44cc8d45f592ca69a27c95dfbeaf91b9ae82cb92cc2e04cd29f58840
                                                      • Opcode Fuzzy Hash: e78b1a5131e3f115e5e7f4879fe8c94efe276752a3141735a509c2de779fdcd2
                                                      • Instruction Fuzzy Hash: 9C116272544386EBC720EF94DC8486E7BE8EF44310F44492DFAA587251DB399C048B53
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Exception@8H_prolog3Throw
                                                      • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                                                      • API String ID: 3670251406-1866435925
                                                      • Opcode ID: afc498f993a12de3f162cc731f5cefb74273d04d06dfd3d63ba6660244fb4267
                                                      • Instruction ID: 3f4954a768a936bec9f25349ad68df2e6fca76714484c2b22f897cde94c0db26
                                                      • Opcode Fuzzy Hash: afc498f993a12de3f162cc731f5cefb74273d04d06dfd3d63ba6660244fb4267
                                                      • Instruction Fuzzy Hash: C0012DB2980208FEEB01EBD0CC86FDD7378AB04B10F14946EA545BA442DB7D9A45DB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __getptd.LIBCMT ref: 0079F5E4
                                                        • Part of subcall function 0079CEFB: __getptd_noexit.LIBCMT ref: 0079CEFE
                                                        • Part of subcall function 0079CEFB: __amsg_exit.LIBCMT ref: 0079CF0B
                                                      • __getptd.LIBCMT ref: 0079F5FB
                                                      • __amsg_exit.LIBCMT ref: 0079F609
                                                      • __lock.LIBCMT ref: 0079F619
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __amsg_exit__getptd$__getptd_noexit__lock
                                                      • String ID: `i}
                                                      • API String ID: 3521780317-756928349
                                                      • Opcode ID: 6ef47757e352884af0eba4092caa8082a231f1c038fda10f2afa3ab3a2bc13e4
                                                      • Instruction ID: f719bd917661f31d1393acdffbf79f1b6a1f928d4408d768acae3b75e3bdd783
                                                      • Opcode Fuzzy Hash: 6ef47757e352884af0eba4092caa8082a231f1c038fda10f2afa3ab3a2bc13e4
                                                      • Instruction Fuzzy Hash: DFF03031A01B00CBDF21FBA4B40B75973A0AF00724F558129E451EB2E1DB3C9D418B52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __getptd.LIBCMT ref: 007A1312
                                                        • Part of subcall function 0079CEFB: __getptd_noexit.LIBCMT ref: 0079CEFE
                                                        • Part of subcall function 0079CEFB: __amsg_exit.LIBCMT ref: 0079CF0B
                                                      • __getptd.LIBCMT ref: 007A1323
                                                      • __getptd.LIBCMT ref: 007A1331
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __getptd$__amsg_exit__getptd_noexit
                                                      • String ID: MOC$csm
                                                      • API String ID: 803148776-1389381023
                                                      • Opcode ID: abdfce7b939a86218f3d62704afb94b7a42bdaeb6956fe92d5af059ee0dc39e4
                                                      • Instruction ID: 489ea1b924139a04161361515139a16782ee1b45811d56b2d0a979d1881705d0
                                                      • Opcode Fuzzy Hash: abdfce7b939a86218f3d62704afb94b7a42bdaeb6956fe92d5af059ee0dc39e4
                                                      • Instruction Fuzzy Hash: B2E04F75510204CFEF20AB68D04AB683799EB8A314FD501E1E58DC7662C73CD8409546
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(kernel32.dll,GetTickCount64,00787927,0000004C,0073447D,00000000,00734700), ref: 00781577
                                                      • GetProcAddress.KERNEL32(00000000), ref: 0078157E
                                                      • GetTickCount.KERNEL32 ref: 0078158A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressCountHandleModuleProcTick
                                                      • String ID: GetTickCount64$kernel32.dll
                                                      • API String ID: 1545651562-915290683
                                                      • Opcode ID: 8c602e377b3176c262fd75f475a834d86505f78dd7c682024e23451aaf4de828
                                                      • Instruction ID: 6d68d379f571e778a03ca85c2dae88bb8f4394091be65347c52d08e3cbb2f67b
                                                      • Opcode Fuzzy Hash: 8c602e377b3176c262fd75f475a834d86505f78dd7c682024e23451aaf4de828
                                                      • Instruction Fuzzy Hash: 2BC080B0744209D78B0417B55C0DF0637196D44702344C99CB312C0094CE7C8011DE19
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000030,00000000,00000001), ref: 007731FB
                                                      • GetLocalTime.KERNEL32(?,?), ref: 00773236
                                                      • SendMessageW.USER32(00000000,00001002,00000000,?), ref: 0077324C
                                                      • ShowWindow.USER32(00000000,00000004), ref: 00773257
                                                      • SetFocus.USER32(00000000), ref: 00773260
                                                        • Part of subcall function 0074BA7B: __itow.LIBCMT ref: 0074BAA3
                                                        • Part of subcall function 0074BA7B: SelectObject.GDI32(?,00000000), ref: 0074BAFB
                                                        • Part of subcall function 0074BA7B: GetTextMetricsW.GDI32(?,00000000), ref: 0074BB09
                                                        • Part of subcall function 0074BA7B: SelectObject.GDI32(?,?), ref: 0074BB14
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MessageObjectSelectSend$FocusLocalMetricsShowTextTimeWindow__itow
                                                      • String ID:
                                                      • API String ID: 1885546232-0
                                                      • Opcode ID: f5f3b65949090032f93308208310638e570e0c31c700a27b33a49c86e7e397d0
                                                      • Instruction ID: 6d67dc1f229b88598ce926bc0cbfeb4a8756b62bf1e24a0c8fb59dddb783639d
                                                      • Opcode Fuzzy Hash: f5f3b65949090032f93308208310638e570e0c31c700a27b33a49c86e7e397d0
                                                      • Instruction Fuzzy Hash: 51215A71600200EFDF11DF68CD89F9A3BA5BF49305F0484A4FA199F2A6CB79D954CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetBkMode.GDI32(?,00000001), ref: 0075A085
                                                      • SetTextColor.GDI32(?,?), ref: 0075A0A8
                                                        • Part of subcall function 0074B8B5: __itow.LIBCMT ref: 0074B8DF
                                                      • SelectObject.GDI32(?,00000000), ref: 0075A0C3
                                                      • DrawTextW.USER32(?,?,000000FF,?,?), ref: 0075A0D9
                                                      • SelectObject.GDI32(?,00000000), ref: 0075A0E3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ObjectSelectText$ColorDrawMode__itow
                                                      • String ID:
                                                      • API String ID: 2874764285-0
                                                      • Opcode ID: 7d305fb14efb1378da99cb893e0f4dc50b3adb7d4e71fadc6b31f243a03d9360
                                                      • Instruction ID: 015bdc094bd621141b6aa036e4e55392376d30bbf03a6a8d3b8d867631040e0a
                                                      • Opcode Fuzzy Hash: 7d305fb14efb1378da99cb893e0f4dc50b3adb7d4e71fadc6b31f243a03d9360
                                                      • Instruction Fuzzy Hash: C9213C72A00118ABDF049FA9DD859EDBBB9FF49311F144229FA21B32A1DB359D05CB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateWindowExW.USER32(00000080,00000000), ref: 007355AE
                                                      • GetParent.USER32(?), ref: 007355C1
                                                      • GetParent.USER32(?), ref: 007355C8
                                                      • ShowWindow.USER32(?,00000005), ref: 007355D2
                                                      • SendMessageW.USER32(?,00000086,00000001,00000000), ref: 007355E2
                                                        • Part of subcall function 007469E2: _memset.LIBCMT ref: 007469F2
                                                        • Part of subcall function 007469E2: GetClassInfoExW.USER32(00000000,00000000), ref: 00746A15
                                                        • Part of subcall function 007469E2: GetClassInfoExW.USER32(00000000,00000000), ref: 00746A2E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ClassInfoParentWindow$CreateMessageSendShow_memset
                                                      • String ID:
                                                      • API String ID: 743802084-0
                                                      • Opcode ID: b65d0863dad4e68a510f1e8e7d2c58cd2f30cf79b4a464b9c82cb4e2f5306665
                                                      • Instruction ID: 7dc9ef48e1cc3e95c5ff873172129ce97dc8c889040fa7443d240572abed7f8a
                                                      • Opcode Fuzzy Hash: b65d0863dad4e68a510f1e8e7d2c58cd2f30cf79b4a464b9c82cb4e2f5306665
                                                      • Instruction Fuzzy Hash: 9D117231340601ABE220DB58CD85F2B77EAEF89710F258158FA5597381DB25FC01CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PathFileExistsW.SHLWAPI(?,00000010,00000008,00000000,0073A8F4,?,?,?,?,?,?), ref: 00780E76
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000000,00000000,?,?,?), ref: 00780EA1
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 00780EBB
                                                        • Part of subcall function 0078091B: lstrlenW.KERNEL32(?,74E15EC0,?), ref: 0078093B
                                                        • Part of subcall function 0078091B: _memset.LIBCMT ref: 00780962
                                                        • Part of subcall function 0078091B: GetFileAttributesW.KERNEL32(?), ref: 0078097A
                                                      • WriteFile.KERNEL32(00000000,?,?,00000000,00000000,?,?,?), ref: 00780EDD
                                                      • CloseHandle.KERNEL32(00000000), ref: 00780F04
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCloseCreateDeleteExistsHandlePathWrite_memsetlstrlen
                                                      • String ID:
                                                      • API String ID: 2329439398-0
                                                      • Opcode ID: adc6b116e8b1c363c250352e8360b8ed96d86118c034f8a199810a3fe227502e
                                                      • Instruction ID: 43b3383b70196ad45025657cb2cf3f2dda37c6a5f4d6318c1d752f7d710b32a3
                                                      • Opcode Fuzzy Hash: adc6b116e8b1c363c250352e8360b8ed96d86118c034f8a199810a3fe227502e
                                                      • Instruction Fuzzy Hash: 70117F7294010DAFDF60BF989CC8AAFBB7CEB45364B108669F721A2090D3784D499BD5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 00746A9A
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00746AB9
                                                      • CallWindowProcW.USER32(?,?,00000082,?,?), ref: 00746ADA
                                                      • SetWindowLongW.USER32(?,000000EB,00000000), ref: 00746AEA
                                                      • DefWindowProcW.USER32(?,00000081,?,?), ref: 00746B16
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$Proc$Call
                                                      • String ID:
                                                      • API String ID: 1819824282-0
                                                      • Opcode ID: b28d36c13cd5615967084f581c1eabe5a2929aba1938c32d1d6a7c9f315d5e29
                                                      • Instruction ID: 653d31eae2d642086cd828667cee6bab7aff90eae02bcab780b8ee9007034717
                                                      • Opcode Fuzzy Hash: b28d36c13cd5615967084f581c1eabe5a2929aba1938c32d1d6a7c9f315d5e29
                                                      • Instruction Fuzzy Hash: E4219D71100614EFCF229F44DD08EAB7FB9EF45721F10C609FA25A2261C3399820DF62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000023,?,?), ref: 0078220E
                                                      • _memset.LIBCMT ref: 00782228
                                                      • SHGetPathFromIDListW.SHELL32(?,?), ref: 00782237
                                                      • lstrcpynW.KERNEL32(?,?,?), ref: 0078224C
                                                      • CoTaskMemFree.OLE32(?), ref: 0078225C
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeFromListLocationPathSpecialTask_memsetlstrcpyn
                                                      • String ID:
                                                      • API String ID: 3998010224-0
                                                      • Opcode ID: 0903571f29209a5e2962561923169898f2058c37cd84113b587daf31d4bbf9f3
                                                      • Instruction ID: 73711735197b97849c74206eb17d29678c3a4560089c1b4ca2217b29c58df7b2
                                                      • Opcode Fuzzy Hash: 0903571f29209a5e2962561923169898f2058c37cd84113b587daf31d4bbf9f3
                                                      • Instruction Fuzzy Hash: B101217194020CEFDB219FB4EC89FEE77B8BB04309F008129E615D2161EB799518CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClipBox.GDI32(?,00000000), ref: 00757160
                                                      • CreateRectRgnIndirect.GDI32(00000000), ref: 00757170
                                                      • CreateRectRgnIndirect.GDI32(?), ref: 00757179
                                                      • CombineRgn.GDI32(00000000,00000000,?,00000001), ref: 00757185
                                                      • SelectClipRgn.GDI32(?,?), ref: 0075718F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ClipCreateIndirectRect$CombineSelect
                                                      • String ID:
                                                      • API String ID: 4086972238-0
                                                      • Opcode ID: 4f27843f01eb83cd4056b5c9a8475b7faaa883ac1d1844af19085b9e801bb77e
                                                      • Instruction ID: 1e0d0df0780515db4423f4d33e1b515a7521ed987e874b7e2d7e52e665bfc54c
                                                      • Opcode Fuzzy Hash: 4f27843f01eb83cd4056b5c9a8475b7faaa883ac1d1844af19085b9e801bb77e
                                                      • Instruction Fuzzy Hash: 21012876800619ABDB01EFA8DC84ADBBBBDEF48210B014562FF01EB111D675DA058BE1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 007895EB
                                                      • curl_easy_init.LIBCURL32(00000024,00788C2F,?,00000000,000000FF,00788FD5,?,00000054), ref: 007895F9
                                                      • curl_easy_escape.LIBCURL32(00000000,?,00000000,?,00000054), ref: 00789621
                                                      • curl_free.LIBCURL32(00000000,00000000,?,?,?,?,?,00000054), ref: 0078963A
                                                      • curl_easy_cleanup.LIBCURL32(00000000,?,?,?,?,?,00000054), ref: 00789641
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_curl_easy_cleanupcurl_easy_escapecurl_easy_initcurl_free
                                                      • String ID:
                                                      • API String ID: 1188370838-0
                                                      • Opcode ID: 7172353cabf3a948b142088300956d0699787834abf144248aa9b62d01a661c9
                                                      • Instruction ID: a27a6a719738b8a72eace262ea3f59b76d89cbc84ec20117edf1385e4ff318c3
                                                      • Opcode Fuzzy Hash: 7172353cabf3a948b142088300956d0699787834abf144248aa9b62d01a661c9
                                                      • Instruction Fuzzy Hash: 90018632900210DBEF15AB74EC99BED7374EF44321F148528FA12B7182EF3DAA048B95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __lock.LIBCMT ref: 0079B633
                                                        • Part of subcall function 0079DA2B: __mtinitlocknum.LIBCMT ref: 0079DA41
                                                        • Part of subcall function 0079DA2B: __amsg_exit.LIBCMT ref: 0079DA4D
                                                        • Part of subcall function 0079DA2B: EnterCriticalSection.KERNEL32(?,?,?,007A2FEE,00000004,007CD0A0,0000000C,0079EAA7,?,?,00000000,00000000,00000000,?,0079CEAD,00000001), ref: 0079DA55
                                                      • ___sbh_find_block.LIBCMT ref: 0079B63E
                                                      • ___sbh_free_block.LIBCMT ref: 0079B64D
                                                      • HeapFree.KERNEL32(00000000,?,007CCC68,0000000C,00746E35,?,007474B5,?,?,?,?,00747EC5,00000053,?,?,?), ref: 0079B67D
                                                      • GetLastError.KERNEL32(?,?,00747EC5,00000053,?,?,?,0073137A,?,B04868B4,?,?,?), ref: 0079B68E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterErrorFreeHeapLastSection___sbh_find_block___sbh_free_block__amsg_exit__lock__mtinitlocknum
                                                      • String ID:
                                                      • API String ID: 2714421763-0
                                                      • Opcode ID: 133a1967ed778b0c68a27082f0950f14ff49136c4946209277016d2143690012
                                                      • Instruction ID: 63f5460be6d43aecada9f000a38e9152511814eb5e0343bad08456ba74a53964
                                                      • Opcode Fuzzy Hash: 133a1967ed778b0c68a27082f0950f14ff49136c4946209277016d2143690012
                                                      • Instruction Fuzzy Hash: 7C01AD31805305EADF30AB71BE0EB4E3BB4AF00B24F108159F504AA181DB3CAD40DA9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0078AE2F
                                                        • Part of subcall function 0078D696: __EH_prolog3.LIBCMT ref: 0078D69D
                                                      Strings
                                                      • Missing '}' or object member name, xrefs: 0078B031
                                                      • Missing ',' or '}' in object declaration, xrefs: 0078B09E
                                                      • Missing ':' after object member name, xrefs: 0078B0C3
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_
                                                      • String ID: Missing ',' or '}' in object declaration$Missing ':' after object member name$Missing '}' or object member name
                                                      • API String ID: 3355343447-3980781130
                                                      • Opcode ID: ba5d585b91f1459b269e298abe03c562cf8a6f2ec7d9aede4644d3d42ebf8c5a
                                                      • Instruction ID: 80aad87a3b749403ffd6f0253861cf71d6856549336b38a2e4c32a70bb01bba9
                                                      • Opcode Fuzzy Hash: ba5d585b91f1459b269e298abe03c562cf8a6f2ec7d9aede4644d3d42ebf8c5a
                                                      • Instruction Fuzzy Hash: 35818571980208EEDF21FBA4C989BEEB778AF15300F14405AF555B7182DB3C5E89DB62
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memmove_s.LIBCMT ref: 00744A71
                                                      • _memmove_s.LIBCMT ref: 00744A95
                                                        • Part of subcall function 0073E030: std::exception::exception.LIBCMT ref: 0073E04F
                                                        • Part of subcall function 0073E030: __CxxThrowException@8.LIBCMT ref: 0073E066
                                                      • _memmove_s.LIBCMT ref: 00744B63
                                                        • Part of subcall function 00745440: _memmove_s.LIBCMT ref: 00745458
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _memmove_s$Exception@8Throwstd::exception::exception
                                                      • String ID: Ht
                                                      • API String ID: 2363822257-2348410036
                                                      • Opcode ID: 4bf845d8ccca0dc2159a2517f0b2309283f59cb20f16e20b42844324ffc29d58
                                                      • Instruction ID: 1c75d26ffa1000b64600ef5941419193b5952c023922417b5dcbed3752d5a835
                                                      • Opcode Fuzzy Hash: 4bf845d8ccca0dc2159a2517f0b2309283f59cb20f16e20b42844324ffc29d58
                                                      • Instruction Fuzzy Hash: 4B51E572B002028FDB18DE28C985A2B77A1FB84315F148A6DEC15CB34AE774ED15DB91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect
                                                      • String ID: itemclick$itemdbclick
                                                      • API String ID: 400858303-530425747
                                                      • Opcode ID: 3e455c6dd576f023f9d522a5da066621401848b2b10730e6dd99920f052f1568
                                                      • Instruction ID: 83c50d2eee76b07bf013831ac79fd41353a709810bc03363690348aaf071c384
                                                      • Opcode Fuzzy Hash: 3e455c6dd576f023f9d522a5da066621401848b2b10730e6dd99920f052f1568
                                                      • Instruction Fuzzy Hash: 4651CD34710202DFDAA49F64C888EB9B3AAFF91340B584658E957DB351CF2DEC119B93
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00781DAC: lstrlenW.KERNEL32(B04868B4,?,?,?,00786067,?,.exe,B04868B4), ref: 00781DCE
                                                        • Part of subcall function 00781DAC: lstrlenW.KERNEL32(?,?,00786067,?,.exe,B04868B4), ref: 00781DD3
                                                        • Part of subcall function 00781DAC: lstrcmpiW.KERNEL32(?,?,00786067,?,.exe,B04868B4), ref: 00781DE5
                                                      • _memset.LIBCMT ref: 00786090
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$_memsetlstrcmpi
                                                      • String ID: .dll$.exe$5.1.
                                                      • API String ID: 1665792991-2789504256
                                                      • Opcode ID: 4f2177e9e43dc595606794c30fb3c1e34bcf2d8bdfa91c404deb4026f070df30
                                                      • Instruction ID: cfae37af066c7d64b672779bfbad085042db1d0dd42a5b0b3688755eb47e5849
                                                      • Opcode Fuzzy Hash: 4f2177e9e43dc595606794c30fb3c1e34bcf2d8bdfa91c404deb4026f070df30
                                                      • Instruction Fuzzy Hash: 9F31AFB2A84305EED710EB64D94EF5AB3E8EB44724F404929F505D3283EB38E905C7A6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0078E0FC
                                                        • Part of subcall function 0079163D: __EH_prolog3.LIBCMT ref: 00791644
                                                        • Part of subcall function 007952BF: __EH_prolog3_catch.LIBCMT ref: 007952C6
                                                      Strings
                                                      • double out of UInt64 range, xrefs: 0078E1A6
                                                      • Value is not convertible to UInt64., xrefs: 0078E135
                                                      • LargestInt out of UInt64 range, xrefs: 0078E1FB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3$H_prolog3_catch
                                                      • String ID: LargestInt out of UInt64 range$Value is not convertible to UInt64.$double out of UInt64 range
                                                      • API String ID: 1670334802-900115960
                                                      • Opcode ID: fc746c5337e38f0f647251df196dbca72fdb7afc23ae77f2139561193cfa3d71
                                                      • Instruction ID: ae2485210e8a36afd338f204041bffa9883cd9958ded9791b7769f2f4734c077
                                                      • Opcode Fuzzy Hash: fc746c5337e38f0f647251df196dbca72fdb7afc23ae77f2139561193cfa3d71
                                                      • Instruction Fuzzy Hash: 4E31D3B1D4461EDDDF10FB60E80EBEDB7A8BB04300F64449AA049A3082DF3CAA85CB11
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0078568F
                                                        • Part of subcall function 007854F7: __EH_prolog3.LIBCMT ref: 00785502
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_
                                                      • String ID: activeServer$servAddr$servHost
                                                      • API String ID: 3355343447-2893113291
                                                      • Opcode ID: 9e1822001eea2cce43f3446e2cb2e39aff133aa8c9e662333f20462a25fc5870
                                                      • Instruction ID: c2f17f67d7df03ff9fc25b8634efc98364d4aaaba994f888e9c6c1a6f4010e1d
                                                      • Opcode Fuzzy Hash: 9e1822001eea2cce43f3446e2cb2e39aff133aa8c9e662333f20462a25fc5870
                                                      • Instruction Fuzzy Hash: D4213071D49608DADF06FBE4D84A9EDB7B8AF04720F64801EF415B2082EF3C6645DBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __calloc_crt
                                                      • String ID: @n}$Pn}
                                                      • API String ID: 3494438863-2097003810
                                                      • Opcode ID: a82c660575e3c1a30f60e6c9b1e66575ac4908e45ac7ecfa33a71db8a0580e09
                                                      • Instruction ID: 6002f0dc8682eef410bbee9f8c77d3529b366e6f20803835d3a65f7384dfa79e
                                                      • Opcode Fuzzy Hash: a82c660575e3c1a30f60e6c9b1e66575ac4908e45ac7ecfa33a71db8a0580e09
                                                      • Instruction Fuzzy Hash: C211A37120925197E7188A2DBC406A737A6FBCA764B64832BF311CB3A4E77CD8538644
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 00796B03
                                                        • Part of subcall function 00781DF9: wvnsprintfW.SHLWAPI(?,00002800,?,?), ref: 00781E33
                                                      • lstrlenW.KERNEL32(?), ref: 00796B1E
                                                      • SHDeleteValueW.SHLWAPI(80000002,Software\projone\podlp\volatile\lastError\,?), ref: 00796B76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CurrentDeleteThreadValuelstrlenwvnsprintf
                                                      • String ID: Software\projone\podlp\volatile\lastError\
                                                      • API String ID: 3369742540-193266801
                                                      • Opcode ID: 774cb97bf9f707cf0e5a154d64d8f0312ba21fce09735844d2e4dd934f8aa662
                                                      • Instruction ID: 6ee89156c84a68abd60f85fb7ebacb448f355a7898db47b2d5da81c228ea82fc
                                                      • Opcode Fuzzy Hash: 774cb97bf9f707cf0e5a154d64d8f0312ba21fce09735844d2e4dd934f8aa662
                                                      • Instruction Fuzzy Hash: 47113D71A0010DEBCF04EB98EC89DEFB7BCEB04315B608169F611A3142DB386A06CB74
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      • %04d-%02d-%02d %02d:%02d:%02d, xrefs: 0078165A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: LocalTime_memsetwnsprintf
                                                      • String ID: %04d-%02d-%02d %02d:%02d:%02d
                                                      • API String ID: 2823570691-4146437471
                                                      • Opcode ID: 29bf1016fd93629153cc9dd3bf0aa1070e511ea998588968a29773b714d5126b
                                                      • Instruction ID: 926a5a501733d58a432fa6892719f27c3c5f755ea20e63f74bac8698c18da98e
                                                      • Opcode Fuzzy Hash: 29bf1016fd93629153cc9dd3bf0aa1070e511ea998588968a29773b714d5126b
                                                      • Instruction Fuzzy Hash: F60121A1D0061C9FDB61DBE99C05EBE73FCAB0C704F404019BA59E7181E67D9644CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0078D261
                                                      • _malloc.LIBCMT ref: 0078D2AD
                                                        • Part of subcall function 0079163D: __EH_prolog3.LIBCMT ref: 00791644
                                                        • Part of subcall function 007952BF: __EH_prolog3_catch.LIBCMT ref: 007952C6
                                                        • Part of subcall function 0078D410: __CxxThrowException@8.LIBCMT ref: 0078D432
                                                        • Part of subcall function 0078D410: std::runtime_error::runtime_error.LIBCPMT ref: 0078D43F
                                                      Strings
                                                      • in Json::Value::duplicateAndPrefixStringValue(): Failed to allocate string value buffer, xrefs: 0078D2B9
                                                      • in Json::Value::duplicateAndPrefixStringValue(): length too big for prefixing, xrefs: 0078D284
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3$Exception@8H_prolog3_catchThrow_mallocstd::runtime_error::runtime_error
                                                      • String ID: in Json::Value::duplicateAndPrefixStringValue(): Failed to allocate string value buffer$in Json::Value::duplicateAndPrefixStringValue(): length too big for prefixing
                                                      • API String ID: 4153978278-1516562270
                                                      • Opcode ID: b76b98c6f7983a50aad5b094d1284a15cfc90fe64f84254b14661f7e5ee57264
                                                      • Instruction ID: 9926fc3425bf77ce23e238c774487edb51e3f8ab0aa46b1992afa5134a807ce5
                                                      • Opcode Fuzzy Hash: b76b98c6f7983a50aad5b094d1284a15cfc90fe64f84254b14661f7e5ee57264
                                                      • Instruction Fuzzy Hash: 29015272D40319EADF21FBA4D84AFCD77ACAF05354F918059F054A61C2DB3CAA488B72
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: I^t$`i}
                                                      • API String ID: 0-2334518906
                                                      • Opcode ID: 204e96bfedcca0cb997c409f55eb527756c5adc91b1b3513edf63e15fa82d990
                                                      • Instruction ID: 773e0c09d43f854924e8fecee96a2602ad6907c1955cdcafe131f7d9f3f4f015
                                                      • Opcode Fuzzy Hash: 204e96bfedcca0cb997c409f55eb527756c5adc91b1b3513edf63e15fa82d990
                                                      • Instruction Fuzzy Hash: 73F0C276600208BACF119F90DC02BB93BB4EB90B48F04C126FD4AD91D1F2BADAD0D794
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 007857A7
                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 007857B8
                                                      • PathAppendW.SHLWAPI(?,Logs\accelerator), ref: 007857C7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AppendDirectoryPathWindows_memset
                                                      • String ID: Logs\accelerator
                                                      • API String ID: 651767395-3914339143
                                                      • Opcode ID: e9c8e6b69cf9d3f3d191cfbbeca4446cec8cd158ceb0c76a7321336a723f1dba
                                                      • Instruction ID: a8fa291690abc90729a23ff42690aa54747e9c50be00197e144291d8907908ef
                                                      • Opcode Fuzzy Hash: e9c8e6b69cf9d3f3d191cfbbeca4446cec8cd158ceb0c76a7321336a723f1dba
                                                      • Instruction Fuzzy Hash: E7F0FF71A4060C9BDB21EBB5EC4AEDEB3B8AB08704F408519A625D7152EB78A6088F55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 0078581D
                                                      • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 0078582E
                                                      • PathAppendW.SHLWAPI(?,Logs\ignored), ref: 0078583D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AppendDirectoryPathWindows_memset
                                                      • String ID: Logs\ignored
                                                      • API String ID: 651767395-1052034624
                                                      • Opcode ID: 4954a54e78d513ea318054ede4f3f09e028f00e03a8d1ca163f5e514fc9cd7dc
                                                      • Instruction ID: 6c3367d100a141194cd64cf7c54a1a2e6501b355c8f13840d43d92469a41f2c0
                                                      • Opcode Fuzzy Hash: 4954a54e78d513ea318054ede4f3f09e028f00e03a8d1ca163f5e514fc9cd7dc
                                                      • Instruction Fuzzy Hash: DEF0F471A4060C9BDB21EBF5DC4AEDEB3B8AB08704F408519A625D7152EB7896088F55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetLastError.KERNEL32(00000000,?,?,?,007445F6), ref: 0078111E
                                                      • OpenEventW.KERNEL32(00100000,00000000,{51908485-3D48-408a-AC9A-8DA4361CCC61},?,?,007445F6), ref: 00781130
                                                      • GetLastError.KERNEL32(?,?,007445F6), ref: 00781152
                                                      Strings
                                                      • {51908485-3D48-408a-AC9A-8DA4361CCC61}, xrefs: 00781124
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EventOpen
                                                      • String ID: {51908485-3D48-408a-AC9A-8DA4361CCC61}
                                                      • API String ID: 325147236-3488813379
                                                      • Opcode ID: 536c2eefb79923f471aa5b6ab3b62570eca7ac60876e2b4f7e6cb1dc22bfc819
                                                      • Instruction ID: 19052cb2f8458e34896efa3ab8eff40a11bfcc1ae1d4276db542b6d4edf7749a
                                                      • Opcode Fuzzy Hash: 536c2eefb79923f471aa5b6ab3b62570eca7ac60876e2b4f7e6cb1dc22bfc819
                                                      • Instruction Fuzzy Hash: 1FE09B3294412DA7CA5067BC9C0EF997568CB05B61F104360FF16D22D0E6649D0596D5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ___addlocaleref.LIBCMT ref: 0079F5AC
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F45E
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F46B
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F478
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F485
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F492
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F4AE
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(00000000), ref: 0079F4BE
                                                        • Part of subcall function 0079F44C: InterlockedIncrement.KERNEL32(?), ref: 0079F4D4
                                                      • ___removelocaleref.LIBCMT ref: 0079F5B7
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(fz), ref: 0079F4F5
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(?), ref: 0079F502
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(?), ref: 0079F50F
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(?), ref: 0079F51C
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(?), ref: 0079F529
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(?), ref: 0079F545
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(00000000), ref: 0079F555
                                                        • Part of subcall function 0079F4DB: InterlockedDecrement.KERNEL32(?), ref: 0079F56B
                                                      • ___freetlocinfo.LIBCMT ref: 0079F5CB
                                                        • Part of subcall function 0079F303: ___free_lconv_mon.LIBCMT ref: 0079F349
                                                        • Part of subcall function 0079F303: ___free_lconv_num.LIBCMT ref: 0079F36A
                                                        • Part of subcall function 0079F303: ___free_lc_time.LIBCMT ref: 0079F3EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Interlocked$DecrementIncrement$___addlocaleref___free_lc_time___free_lconv_mon___free_lconv_num___freetlocinfo___removelocaleref
                                                      • String ID: `i}
                                                      • API String ID: 467427115-756928349
                                                      • Opcode ID: e4d4b074adfca55ccf98f7467b85db57986707dbadc0286de92a3e243b2e3d3e
                                                      • Instruction ID: 9989f6eea52ebedbfca4190c7e1445ab56ccc533fdc119ed5289a397c3897fd6
                                                      • Opcode Fuzzy Hash: e4d4b074adfca55ccf98f7467b85db57986707dbadc0286de92a3e243b2e3d3e
                                                      • Instruction Fuzzy Hash: DEE08672503521459E312D1C744466B92D40F82721B1B007BF878F7554EF2C5D9083D1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCommandLineW.KERNEL32(00000000,?,?,?,?,0074467D), ref: 00798AC9
                                                      • CommandLineToArgvW.SHELL32(00000000,?,?,?,0074467D), ref: 00798AD0
                                                        • Part of subcall function 0079894C: __EH_prolog3_GS.LIBCMT ref: 00798953
                                                      • LocalFree.KERNEL32(00000000,?,?,?,0074467D), ref: 00798AE8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CommandLine$ArgvFreeH_prolog3_Local
                                                      • String ID: }Ft
                                                      • API String ID: 1550188475-1378058167
                                                      • Opcode ID: 0a0ad148bbc716230af5e798f72ea676f2690246c90fbaf4b47484bd7fcfc153
                                                      • Instruction ID: 74a079869b63b37ca5ec4f2ca65793a5f9aed3aff05947e3bfac44867235a54a
                                                      • Opcode Fuzzy Hash: 0a0ad148bbc716230af5e798f72ea676f2690246c90fbaf4b47484bd7fcfc153
                                                      • Instruction Fuzzy Hash: 4AE0ED76401118FFDF049B94ED0DFDD77BCEB04266F104144FA01A2190DB78AB009A99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PathFindFileNameW.SHLWAPI(00000000,?,?,?,?,00780F89,kernel32.dll,GetNativeSystemInfo,00000000,00000001,00000000), ref: 00781438
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,?,00780F89,kernel32.dll,GetNativeSystemInfo,00000000,00000001,00000000), ref: 0078143F
                                                      • LoadLibraryW.KERNEL32(00000000,?,?,?,00780F89,kernel32.dll,GetNativeSystemInfo,00000000,00000001,00000000), ref: 0078144C
                                                      • GetProcAddress.KERNEL32(00000000,00000001), ref: 0078145E
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: AddressFileFindHandleLibraryLoadModuleNamePathProc
                                                      • String ID:
                                                      • API String ID: 574069307-0
                                                      • Opcode ID: 82c4f6d9753cfdc3323902a12685c9a8025f3443d7b10df369161f678164f2fd
                                                      • Instruction ID: 346a31f0b2d33c8688d4ad47e18bb64dd945d2bd154cc6ee8b56741ae35bf374
                                                      • Opcode Fuzzy Hash: 82c4f6d9753cfdc3323902a12685c9a8025f3443d7b10df369161f678164f2fd
                                                      • Instruction Fuzzy Hash: F0419672D5411AEFCF12AFD4DC448EEBB7ABF99340F618464E61272030D73A5A62AB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 007AE8C4
                                                      • __isleadbyte_l.LIBCMT ref: 007AE8F8
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,007AA7CA,?,00000000,00000000,?,?,?,?,007AA7CA,00000000,?), ref: 007AE929
                                                      • MultiByteToWideChar.KERNEL32(00000080,00000009,007AA7CA,00000001,00000000,00000000,?,?,?,?,007AA7CA,00000000,?), ref: 007AE997
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                      • String ID:
                                                      • API String ID: 3058430110-0
                                                      • Opcode ID: 2bb569b77f2fd760376ed248012a43af7a35bb63e88434e8481521cb192b5205
                                                      • Instruction ID: 848ec29c176b61a0b930961ce46dcbf93db92fbc039de5eec741777c902c0908
                                                      • Opcode Fuzzy Hash: 2bb569b77f2fd760376ed248012a43af7a35bb63e88434e8481521cb192b5205
                                                      • Instruction Fuzzy Hash: 5531BE31A00356EFEF20DF64C884AAE3BA5FF82311F1486A9E4A59B191D338ED40DB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 0078521A
                                                      • _malloc.LIBCMT ref: 00785228
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • GdipGetImageEncoders.GDIPLUS(?,?,00000000,?,?,?), ref: 00785237
                                                      • lstrcmpiW.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?), ref: 00785259
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: EncodersGdipImage$AllocHeapSize_malloclstrcmpi
                                                      • String ID:
                                                      • API String ID: 3194904807-0
                                                      • Opcode ID: daa414bb49329f793836ad282de6f144c85665bc91117ea46cb1e15e186f4cf9
                                                      • Instruction ID: df106043cbca89be939810787b539808deba1c9dfa6c08cbf64ff792db19aacd
                                                      • Opcode Fuzzy Hash: daa414bb49329f793836ad282de6f144c85665bc91117ea46cb1e15e186f4cf9
                                                      • Instruction Fuzzy Hash: 98119EB2C4461CBACF21AFA9A8846DEBBB9BF44340F048156FC00A6141DB799A45CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDeviceCaps.GDI32(?,00000058), ref: 0075D638
                                                      • GetDeviceCaps.GDI32(?,0000005A), ref: 0075D64D
                                                      • MulDiv.KERNEL32(?,000009EC,00000000), ref: 0075D666
                                                      • MulDiv.KERNEL32(?,000009EC,?), ref: 0075D676
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CapsDevice
                                                      • String ID:
                                                      • API String ID: 328075279-0
                                                      • Opcode ID: 0f4b7c14131e60a9d7d1cc4ff926e8d866c423bc4f408bdbee9099fcc8ec31d8
                                                      • Instruction ID: 1ac56fa41143f4a41bf4ed6272ddd272fb2f58254cdf342956e98bd91142a36d
                                                      • Opcode Fuzzy Hash: 0f4b7c14131e60a9d7d1cc4ff926e8d866c423bc4f408bdbee9099fcc8ec31d8
                                                      • Instruction Fuzzy Hash: 0F11D676600214AFCB44DF69C9C8E4A7BE9FF49311B0581A6FE08DB356DA71E804CFA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 0076C168
                                                      • _wcsncpy.LIBCMT ref: 0076C177
                                                      • CLSIDFromString.OLE32(?,00000000,?,?,?,00000004,?,?), ref: 0076C193
                                                      • CLSIDFromProgID.OLE32(?,00000000,?,?,?,00000004,?,?), ref: 0076C19B
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: From$ProgString_memset_wcsncpy
                                                      • String ID:
                                                      • API String ID: 2240319475-0
                                                      • Opcode ID: 707c2fc0449faf412239405a3895cb859557161e0480dd306b28324784cb1a0d
                                                      • Instruction ID: 4b0ea0ced1e5453b5f9610e21fd374ba53763bb83c64378903fa086e38176b95
                                                      • Opcode Fuzzy Hash: 707c2fc0449faf412239405a3895cb859557161e0480dd306b28324784cb1a0d
                                                      • Instruction Fuzzy Hash: 6D11657290011CABDB21EFA8DD45FDFB7BCAB05314F404596A706F7141DA789A448BA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _memset.LIBCMT ref: 007816F9
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000008), ref: 0078170E
                                                      • Module32FirstW.KERNEL32(00000000,?), ref: 00781728
                                                      • Module32NextW.KERNEL32(00000000,?), ref: 00781744
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Module32$CreateFirstNextSnapshotToolhelp32_memset
                                                      • String ID:
                                                      • API String ID: 2056545588-0
                                                      • Opcode ID: 8be034ec96b8496f10ed9a3beeaa219ad0fa06841abd93a13c03a0e28ea4957f
                                                      • Instruction ID: b438119e9b2d02803969d7e81f0e4c9918d45bc1ddda2f6569a2dd5b5736b7c2
                                                      • Opcode Fuzzy Hash: 8be034ec96b8496f10ed9a3beeaa219ad0fa06841abd93a13c03a0e28ea4957f
                                                      • Instruction Fuzzy Hash: 1F01C471545304EAC620FA64DD06BAB73ECAF84750F84463DBE98821C1EB38D906C796
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00793449
                                                      • std::_Mutex::_Mutex.LIBCPMT ref: 0079345A
                                                        • Part of subcall function 0079B5B0: _malloc.LIBCMT ref: 0079B5CA
                                                      • std::locale::_Init.LIBCPMT ref: 00793472
                                                        • Part of subcall function 007A76AF: __EH_prolog3.LIBCMT ref: 007A76B6
                                                        • Part of subcall function 007A76AF: std::_Lockit::_Lockit.LIBCPMT ref: 007A76CA
                                                        • Part of subcall function 007A76AF: std::locale::_Locimp::_Locimp.LIBCPMT ref: 007A76F3
                                                        • Part of subcall function 007A76AF: std::locale::_Setgloballocale.LIBCPMT ref: 007A7703
                                                        • Part of subcall function 007A76AF: std::locale::facet::_Incref.LIBCPMT ref: 007A7726
                                                      • std::locale::facet::_Incref.LIBCPMT ref: 00793480
                                                        • Part of subcall function 0078A04D: std::_Lockit::_Lockit.LIBCPMT ref: 0078A059
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: std::_std::locale::_$H_prolog3IncrefLockitLockit::_std::locale::facet::_$InitLocimpLocimp::_MutexMutex::_Setgloballocale_malloc
                                                      • String ID:
                                                      • API String ID: 3116483794-0
                                                      • Opcode ID: 66d880537514e16dfca5daffd414daa541504f043b5b4347d6f543c41931ee1b
                                                      • Instruction ID: 51f7f6938620cdabea2b6a845419be5a2d61cf037cd17c80002fcd3f17c94f44
                                                      • Opcode Fuzzy Hash: 66d880537514e16dfca5daffd414daa541504f043b5b4347d6f543c41931ee1b
                                                      • Instruction Fuzzy Hash: F411EFB4601B00CFC726DF69C180956FBF0BF997107000A6EE89687B60EB74B904CB50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000001,?,?,00000000,00733B58,?,00000001,?), ref: 00780668
                                                      • _malloc.LIBCMT ref: 00780670
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • _memset.LIBCMT ref: 00780682
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0078069A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocHeap_malloc_memset
                                                      • String ID:
                                                      • API String ID: 2311837860-0
                                                      • Opcode ID: 7025783f1e6f406bdc36992a75f6176953b168e2f2d80ad995a2f7908f77981e
                                                      • Instruction ID: 127a9ff2eeb9793ee2e604b0d86bf0242cf639e0f2921c6ccfb27f87119dbafc
                                                      • Opcode Fuzzy Hash: 7025783f1e6f406bdc36992a75f6176953b168e2f2d80ad995a2f7908f77981e
                                                      • Instruction Fuzzy Hash: F2F0BB322491557A9731B9A76C49CDB7E6CE7CBF70B140329F65495080E5159914C3B1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,00773373,?,?,?), ref: 00773434
                                                      • SendMessageW.USER32(?,00001001,00000000,?), ref: 0077345F
                                                        • Part of subcall function 00773567: __EH_prolog3_GS.LIBCMT ref: 00773571
                                                      • SendMessageW.USER32(?,00000008,?,?), ref: 0077349D
                                                      • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 007734A8
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$H_prolog3_ProcWindow
                                                      • String ID:
                                                      • API String ID: 1335716683-0
                                                      • Opcode ID: 0d8f78151f4c85f2440e03f4799e70b4d4f198ce13c0ccee656f604ada170022
                                                      • Instruction ID: a4b218fc4adf8983620acc76b3d21f923710110fae86d02eb9bdcaf6b6398ca2
                                                      • Opcode Fuzzy Hash: 0d8f78151f4c85f2440e03f4799e70b4d4f198ce13c0ccee656f604ada170022
                                                      • Instruction Fuzzy Hash: B0111575200205FFDB019F14CC89FA9BBA6FF08355F008160FA189B6A1C772F8A0DB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,-00000074,000000FF,00000000,00000000,-00000074,-00000098,00000000,?,00733A56,-000000D8,-00000074,-00000030,?,-00000098), ref: 0078059B
                                                      • _malloc.LIBCMT ref: 007805A4
                                                        • Part of subcall function 0079B6F2: __FF_MSGBANNER.LIBCMT ref: 0079B715
                                                        • Part of subcall function 0079B6F2: __NMSG_WRITE.LIBCMT ref: 0079B71C
                                                        • Part of subcall function 0079B6F2: HeapAlloc.KERNEL32(00000000,?,00000001,00000000,00000000,?,0079EA5D,?,00000001,?,?,0079D9B5,00000018,007CCD60,0000000C,0079DA46), ref: 0079B769
                                                      • _memset.LIBCMT ref: 007805B4
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 007805CB
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocHeap_malloc_memset
                                                      • String ID:
                                                      • API String ID: 2311837860-0
                                                      • Opcode ID: 1ef02046e657ff9bf66988fc018b7d5ab7daa2a7739f07a47340f5360aef0206
                                                      • Instruction ID: 6ba0dd7f09cca09b46eb774c57b92bc05f0af66fb96aa393a336644083441821
                                                      • Opcode Fuzzy Hash: 1ef02046e657ff9bf66988fc018b7d5ab7daa2a7739f07a47340f5360aef0206
                                                      • Instruction Fuzzy Hash: 9BF05232289229BFEB2036A52C06E7BB28CEB45770F150332BA20A91C0C944AC104BF2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Variant$AllocClearH_prolog3InitString
                                                      • String ID:
                                                      • API String ID: 563561277-0
                                                      • Opcode ID: 9e16db4cb79e4e3ab13b071b80d5f87581c26d64d89ffb941330371f22b706b0
                                                      • Instruction ID: 71646193358847c56c3e46fae57d194764959c366c615dec31f954c8f82a7718
                                                      • Opcode Fuzzy Hash: 9e16db4cb79e4e3ab13b071b80d5f87581c26d64d89ffb941330371f22b706b0
                                                      • Instruction Fuzzy Hash: 24F03771C01619EBCF50DBE0C848EEEBBB8FF09700F008126B6189B291D7386A01CBE0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 007946EF
                                                        • Part of subcall function 00795812: __EH_prolog3.LIBCMT ref: 00795819
                                                        • Part of subcall function 00795812: std::_Lockit::_Lockit.LIBCPMT ref: 00795823
                                                      • _localeconv.LIBCMT ref: 0079498D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_LockitLockit::__localeconvstd::_
                                                      • String ID: $
                                                      • API String ID: 502951431-3993045852
                                                      • Opcode ID: 0cc2552a7d92d97c011ea7d1a0c3bf535e228ce10a218ac32243fc7d6bc479ca
                                                      • Instruction ID: 09f94b672ced134626a874a0e58badf374f15b00e9742e2714be694ec3952272
                                                      • Opcode Fuzzy Hash: 0cc2552a7d92d97c011ea7d1a0c3bf535e228ce10a218ac32243fc7d6bc479ca
                                                      • Instruction Fuzzy Hash: CCD14031904AE8CFDF22ABF8E449BEDBBB1AF12314F184146E0416B256C77C5987C796
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: DecryptNeedToApprove$decfile.png
                                                      • API String ID: 0-3242272932
                                                      • Opcode ID: fed1f48612b542ce40dbc58ae23798ed524cb903acbb9854f0e593d6ba092c23
                                                      • Instruction ID: 9a876f41ad670a74daf8708f38df0ccf732cb6cb9138723c7a94cba00d54bb10
                                                      • Opcode Fuzzy Hash: fed1f48612b542ce40dbc58ae23798ed524cb903acbb9854f0e593d6ba092c23
                                                      • Instruction Fuzzy Hash: 1AA1ADB1214340DFEB90EF68E489B5EB3A1BF84314F00486DF69987253DB39A911CB63
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00790902
                                                      • __CxxThrowException@8.LIBCMT ref: 0079093D
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      • invalid map/set<T> iterator, xrefs: 00790910
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid map/set<T> iterator
                                                      • API String ID: 1961742612-152884079
                                                      • Opcode ID: 1b287f5013279a57b249432307d853f7570d44ff80637cfb34a61f9c2904dc49
                                                      • Instruction ID: 460674ea67c554be615992433d3f348979fccdedf30ddebc00088fcc3bad4956
                                                      • Opcode Fuzzy Hash: 1b287f5013279a57b249432307d853f7570d44ff80637cfb34a61f9c2904dc49
                                                      • Instruction Fuzzy Hash: 76A13670628281DFDF55CF24D094B68BBA2BF55318FA8918CD8894F693C779EC85CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00786C61
                                                      • __CxxThrowException@8.LIBCMT ref: 00786C9C
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      • invalid map/set<T> iterator, xrefs: 00786C6F
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid map/set<T> iterator
                                                      • API String ID: 1961742612-152884079
                                                      • Opcode ID: 2655fac8cb06c7ba5bcd6231cc0313d0ab6e338758a20fe7e3134733204f6eed
                                                      • Instruction ID: aaa6a7e1b62716c738fbca15362edba01afade9c1ebacd5db0360c0c197c4acf
                                                      • Opcode Fuzzy Hash: 2655fac8cb06c7ba5bcd6231cc0313d0ab6e338758a20fe7e3134733204f6eed
                                                      • Instruction Fuzzy Hash: E8A14FB4644281EFDB15EF24C194B547FA2AF19328F28819CD4894F3A2C779ECC5CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00784E07
                                                      • __CxxThrowException@8.LIBCMT ref: 00784E42
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      • invalid map/set<T> iterator, xrefs: 00784E15
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid map/set<T> iterator
                                                      • API String ID: 1961742612-152884079
                                                      • Opcode ID: 5e2b051bd6e4518c5b9ce5b1ff8ef05cdf0649e884fe9820cba53db03b634bfb
                                                      • Instruction ID: 0eb186b3c8817b13cf044342aedadc6741700bcfc4efa9de55416d0ef0acacf1
                                                      • Opcode Fuzzy Hash: 5e2b051bd6e4518c5b9ce5b1ff8ef05cdf0649e884fe9820cba53db03b634bfb
                                                      • Instruction Fuzzy Hash: 50A14B70545286DFDB19EF24D184B65BFA1BF15308F28808DD4854F392C7BAED85CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0078418C
                                                      • __CxxThrowException@8.LIBCMT ref: 007841C7
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      • invalid map/set<T> iterator, xrefs: 0078419A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid map/set<T> iterator
                                                      • API String ID: 1961742612-152884079
                                                      • Opcode ID: d8eca708e44b425bcb1ecb16d17c5a16aca7a215457f83f8c6518b4eb7fe8dbb
                                                      • Instruction ID: c401bc3e6824d66f245d2069ed8198aaa132bec75a3f4443e2b397004e7ec809
                                                      • Opcode Fuzzy Hash: d8eca708e44b425bcb1ecb16d17c5a16aca7a215457f83f8c6518b4eb7fe8dbb
                                                      • Instruction Fuzzy Hash: DAA17670558292CFDB22EF64C0887A4BBA1BB16308F29C09DD5854F693D3FAEC85CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00784B77
                                                      • __CxxThrowException@8.LIBCMT ref: 00784BB2
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      • invalid map/set<T> iterator, xrefs: 00784B85
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid map/set<T> iterator
                                                      • API String ID: 1961742612-152884079
                                                      • Opcode ID: 3a035d9282abbb87ac2a6034ce1d9659752a36340303e6e97de25bc2e84180f5
                                                      • Instruction ID: 7e9f704b82e17195baa505ea047c5fdac4facda5bb77feebca827f1e8d650900
                                                      • Opcode Fuzzy Hash: 3a035d9282abbb87ac2a6034ce1d9659752a36340303e6e97de25bc2e84180f5
                                                      • Instruction Fuzzy Hash: F5A17B70685282CFDB11EF24C084764BBA6BF15308F6991CDC8854F693C7B9EC85CBA0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: _malloc
                                                      • String ID: H
                                                      • API String ID: 1579825452-2852464175
                                                      • Opcode ID: ab4a8beb2887b0956cc309714ec99f1b9cb520dd128234f75f45e9ef5ac9d94e
                                                      • Instruction ID: bf267cda9a833cca602e84db1234c8c700dd0ab8e0747ab0f0b5387b9b6bb6fa
                                                      • Opcode Fuzzy Hash: ab4a8beb2887b0956cc309714ec99f1b9cb520dd128234f75f45e9ef5ac9d94e
                                                      • Instruction Fuzzy Hash: 92915370A00206DFDF24CF68C480AA9FBF4FF49380B20899AE559D7351D734AA41CF91
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IntersectRect.USER32(?,?,?), ref: 00768591
                                                      • IntersectRect.USER32(?,?,?), ref: 007685D7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: IntersectRect
                                                      • String ID: Container
                                                      • API String ID: 481094312-1163095736
                                                      • Opcode ID: a6606e87776f1fe908310491126215f4c7d8746db47ec6c77c6e03acbc19bfde
                                                      • Instruction ID: 5c1c4c2789480a976dac09afadb76f963ca437ee12cb1f2d4ae1f3cdad1bf1d1
                                                      • Opcode Fuzzy Hash: a6606e87776f1fe908310491126215f4c7d8746db47ec6c77c6e03acbc19bfde
                                                      • Instruction Fuzzy Hash: D8513A316046118FCB40DF68C488AAA77E5BF89301B054AA9F946DB352DB34D909CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0078C899
                                                        • Part of subcall function 0078B5DE: __EH_prolog3_GS.LIBCMT ref: 0078B5E5
                                                      Strings
                                                      • Empty escape sequence in string, xrefs: 0078C9A7
                                                      • Bad escape sequence in string, xrefs: 0078C9D5
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_
                                                      • String ID: Bad escape sequence in string$Empty escape sequence in string
                                                      • API String ID: 3355343447-928816353
                                                      • Opcode ID: 65fa53d75b3b367280b9829858393d75b5f0db7f48bc64a9db3f39a466334b09
                                                      • Instruction ID: cc514307ad1bd60da2a47df03f7c2fdf793be1194533e8abd703daa77e2372cf
                                                      • Opcode Fuzzy Hash: 65fa53d75b3b367280b9829858393d75b5f0db7f48bc64a9db3f39a466334b09
                                                      • Instruction Fuzzy Hash: DB41E6714C0209EADF12FE64C94ABBDB764EF11320F248195FC567B182CA3DAE459BB1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3
                                                      • String ID: for detail.$See
                                                      • API String ID: 431132790-4250990345
                                                      • Opcode ID: 20cad6e63b21d4dd453fcee632ac850c61572b619c149a0b4150d11d873bee4f
                                                      • Instruction ID: 208541aa222fbffbe57a9302c94bb9f87ea6bedd9f14d80f258871bc5a0c9b11
                                                      • Opcode Fuzzy Hash: 20cad6e63b21d4dd453fcee632ac850c61572b619c149a0b4150d11d873bee4f
                                                      • Instruction Fuzzy Hash: 52417CB1D44148EBDB01FBE8C84ABDEB7B8AF04304F644159A518B3282DB796E05CB71
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CountStateTick
                                                      • String ID: RichEdit
                                                      • API String ID: 2629120050-1265552804
                                                      • Opcode ID: e1622b2f48bcd04746f77f390ce7f52437af5205ed2aceb13428c0ee9690ca56
                                                      • Instruction ID: bcb38e15d77055bb93689d9f409aeb157ccbb0e52062c35ac664edf43b02075a
                                                      • Opcode Fuzzy Hash: e1622b2f48bcd04746f77f390ce7f52437af5205ed2aceb13428c0ee9690ca56
                                                      • Instruction Fuzzy Hash: 78419175600749DFCB60DFA8C488BED77F1FF48700F108869E95AAB250DB39A945CB52
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Rect
                                                      • String ID: itemclick
                                                      • API String ID: 400858303-803468992
                                                      • Opcode ID: 60debeeea01fbacb62542e0cd5f47d5618431f604e3ccf1eb26b5861509ec92b
                                                      • Instruction ID: fe15711b8f21eb8fac8f4a5c86a5dd05ec461b8f2fc99d78645210804af96635
                                                      • Opcode Fuzzy Hash: 60debeeea01fbacb62542e0cd5f47d5618431f604e3ccf1eb26b5861509ec92b
                                                      • Instruction Fuzzy Hash: C241B630208606DBCE2C9F34C888E79B3AAFF823D8F144559ED56DB251DB29EC51C7A1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: Window
                                                      • String ID: GET$POST
                                                      • API String ID: 2353593579-3192705859
                                                      • Opcode ID: 0135effb8a4e5b87c0c11e438a8157152b9eadb5c781c07f910d33f83848be03
                                                      • Instruction ID: 639a5fe02b55f3ce50c5a27c4e072dac3474bb38eef86a5d7cec6f67d64ac1cc
                                                      • Opcode Fuzzy Hash: 0135effb8a4e5b87c0c11e438a8157152b9eadb5c781c07f910d33f83848be03
                                                      • Instruction Fuzzy Hash: B341B0B15083849FE314DF69D849B1BBBE8EF89744F04492EF98597342D779E804CBA2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00786A97
                                                      • __CxxThrowException@8.LIBCMT ref: 00786AD6
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: map/set<T> too long
                                                      • API String ID: 1961742612-1285458680
                                                      • Opcode ID: 96f054c52dbc142cea8ceada384cd60ed39e5e23121ff9caea17a588326d41cf
                                                      • Instruction ID: a0dd332fc6ce5a8072f530efa5e0d21840dd528cca1eb83fef7206f4f22f72e6
                                                      • Opcode Fuzzy Hash: 96f054c52dbc142cea8ceada384cd60ed39e5e23121ff9caea17a588326d41cf
                                                      • Instruction Fuzzy Hash: FA4117B1600240EFD721EF58C588B95BFF1AF15318F298098E9499B752D779FC85CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00787456
                                                      • __CxxThrowException@8.LIBCMT ref: 00787493
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: map/set<T> too long
                                                      • API String ID: 1961742612-1285458680
                                                      • Opcode ID: 152775038d5412ec9599382030ce79f5101a9359d83d620eb9ac277e95ab17c8
                                                      • Instruction ID: 1515cc28b25610acd7ac02dad76be980c3dd2d187452785cdc3cfaf9c4bb3129
                                                      • Opcode Fuzzy Hash: 152775038d5412ec9599382030ce79f5101a9359d83d620eb9ac277e95ab17c8
                                                      • Instruction Fuzzy Hash: EA4136B1244680DFC729EF18C188F59BBF1BF59324F258198E44A8B662C779FD85CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __fileno__getbuf
                                                      • String ID: Xj}
                                                      • API String ID: 2304796792-742926518
                                                      • Opcode ID: 550ed5c888d8282fb88488f978af5a0a4f81cf89d111efae071829762e61aeea
                                                      • Instruction ID: 1f0c82fe6815c75ba39c9bf6436bfcc25f97057397c11536cd2c10ea6f411c62
                                                      • Opcode Fuzzy Hash: 550ed5c888d8282fb88488f978af5a0a4f81cf89d111efae071829762e61aeea
                                                      • Instruction Fuzzy Hash: 5731C872100A804ADB398A2DD8447AB37D1EF833347248729E6BD876D1D73CE842D790
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00752273
                                                        • Part of subcall function 0079B5B0: _malloc.LIBCMT ref: 0079B5CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_malloc
                                                      • String ID: HScrollBar$VScrollBar
                                                      • API String ID: 2346879263-4035620935
                                                      • Opcode ID: 8facbe0c9bef70e2e689d8b84d8904d5b335e801b43f265ca15e44f65ac85fb2
                                                      • Instruction ID: 5dd897ff0a9f8e15706e498d27064ebf6bf7ffc2037926fda5da5dedff42e00a
                                                      • Opcode Fuzzy Hash: 8facbe0c9bef70e2e689d8b84d8904d5b335e801b43f265ca15e44f65ac85fb2
                                                      • Instruction Fuzzy Hash: 53417F74700601EFCB14DFB4C488998B7A2BF89311F258369F919D7252DB7DAC59CB90
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      • Extra non-whitespace after JSON value., xrefs: 0078B7FC
                                                      • A valid JSON document must be either an array or an object value., xrefs: 0078B862
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3
                                                      • String ID: A valid JSON document must be either an array or an object value.$Extra non-whitespace after JSON value.
                                                      • API String ID: 431132790-2184294112
                                                      • Opcode ID: 33e71d49048f01fc3f05597e761c5f99d6d8d09664755f2be444ebf6227c9f2f
                                                      • Instruction ID: d0b7b300b164bca538207615c1958a0b133f538af45dae8fc595c0951d7b3339
                                                      • Opcode Fuzzy Hash: 33e71d49048f01fc3f05597e761c5f99d6d8d09664755f2be444ebf6227c9f2f
                                                      • Instruction Fuzzy Hash: 97415E7598064AEFDF15FFA4C885AEDBBB4BF14300F04812AE454A7242DB38AA55DFD0
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 0078B3E2
                                                        • Part of subcall function 00790FBA: __EH_prolog3.LIBCMT ref: 00790FC1
                                                        • Part of subcall function 0079039B: __EH_prolog3_catch.LIBCMT ref: 007903A2
                                                      • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0078B4BC
                                                        • Part of subcall function 00787154: __EH_prolog3.LIBCMT ref: 0078715B
                                                        • Part of subcall function 00789C83: __EH_prolog3.LIBCMT ref: 00789C8A
                                                        • Part of subcall function 0078B5DE: __EH_prolog3_GS.LIBCMT ref: 0078B5E5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3$H_prolog3_$H_prolog3_catchIos_base_dtorstd::ios_base::_
                                                      • String ID: ' is not a number.
                                                      • API String ID: 2426963827-698141950
                                                      • Opcode ID: 09bfbf633e7064fb99c324020dea213c0e700dec21b583d27bbbd67e6fecaa53
                                                      • Instruction ID: 39ecc73c50d60c906cfbce856be12b220d4733fc1e271f4c503d369150652d1e
                                                      • Opcode Fuzzy Hash: 09bfbf633e7064fb99c324020dea213c0e700dec21b583d27bbbd67e6fecaa53
                                                      • Instruction Fuzzy Hash: 4231AE71910148EEDF15FBA8D84AFDEBBB8AF05304F148099F049A7243DB796B49CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0078CA08
                                                        • Part of subcall function 0078B511: __EH_prolog3.LIBCMT ref: 0078B518
                                                        • Part of subcall function 0078B5DE: __EH_prolog3_GS.LIBCMT ref: 0078B5E5
                                                      Strings
                                                      • expecting another \u token to begin the second half of a unicode surrogate pair, xrefs: 0078CAC3
                                                      • additional six characters expected to parse unicode surrogate pair., xrefs: 0078CA4A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3$H_prolog3_
                                                      • String ID: additional six characters expected to parse unicode surrogate pair.$expecting another \u token to begin the second half of a unicode surrogate pair
                                                      • API String ID: 4240126716-1961466578
                                                      • Opcode ID: c85daf27cb222a5ec962ff5aa5e5ff493d592952cde89fe8cd0234a8d9e6221f
                                                      • Instruction ID: 0e36ff8d521838ee5d62003cf5dc562456e62d38c130dee12f8fd3a216b20a51
                                                      • Opcode Fuzzy Hash: c85daf27cb222a5ec962ff5aa5e5ff493d592952cde89fe8cd0234a8d9e6221f
                                                      • Instruction Fuzzy Hash: 6D21AB34540209EFDF0AEFA0C895AFD7BA5EF18310F148428F882A7242CB389A559B60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00792B06
                                                        • Part of subcall function 0078A424: std::locale::facet::_Incref.LIBCPMT ref: 0078A42B
                                                        • Part of subcall function 00794408: __EH_prolog3_GS.LIBCMT ref: 0079440F
                                                        • Part of subcall function 0078A0B7: std::locale::facet::_Decref.LIBCPMT ref: 0078A0BD
                                                      • __Stoulx.LIBCPMT ref: 00792B70
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_std::locale::facet::_$DecrefIncrefStoulx
                                                      • String ID: -
                                                      • API String ID: 1993928798-2547889144
                                                      • Opcode ID: 8fc0f4c6511ad166f25ef79827152690075883ebda66bafec30cf1ddcafa6048
                                                      • Instruction ID: bdfee3889d0423e2b46a191d23af5482b5d644549714fbc8111503c0552438c3
                                                      • Opcode Fuzzy Hash: 8fc0f4c6511ad166f25ef79827152690075883ebda66bafec30cf1ddcafa6048
                                                      • Instruction Fuzzy Hash: 2E2119B6900218EBDF11EF94E985AEDBBF4FF05310F044266F811A7251E738AE46CB51
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 00792BD3
                                                        • Part of subcall function 0078A424: std::locale::facet::_Incref.LIBCPMT ref: 0078A42B
                                                        • Part of subcall function 00794408: __EH_prolog3_GS.LIBCMT ref: 0079440F
                                                        • Part of subcall function 0078A0B7: std::locale::facet::_Decref.LIBCPMT ref: 0078A0BD
                                                      • __Stoulx.LIBCPMT ref: 00792C3D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_std::locale::facet::_$DecrefIncrefStoulx
                                                      • String ID: -
                                                      • API String ID: 1993928798-2547889144
                                                      • Opcode ID: 34ba00bbf4ca3c91d95d55d3814960da791547cdae16c69349d77985356791b0
                                                      • Instruction ID: cbdc6c0d4bb9bdadbe56f0b866f5a17681138985f9cad8feff07ab12f23d0cfa
                                                      • Opcode Fuzzy Hash: 34ba00bbf4ca3c91d95d55d3814960da791547cdae16c69349d77985356791b0
                                                      • Instruction Fuzzy Hash: F7212C76900218EFDF11EF94E985ADDBBB8FF09310F044256F811A7241D734AE46CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0078B518
                                                        • Part of subcall function 0078B5DE: __EH_prolog3_GS.LIBCMT ref: 0078B5E5
                                                      Strings
                                                      • Bad unicode escape sequence in string: four digits expected., xrefs: 0078B527
                                                      • Bad unicode escape sequence in string: hexadecimal digit expected., xrefs: 0078B5B1
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3H_prolog3_
                                                      • String ID: Bad unicode escape sequence in string: four digits expected.$Bad unicode escape sequence in string: hexadecimal digit expected.
                                                      • API String ID: 3355343447-3825735986
                                                      • Opcode ID: b781b4c21a5818b1694ad72b0839b2a794d83e85b89a29690c565ba1b8063bb0
                                                      • Instruction ID: b97616f6530dec3ff0caa013437dac7cc07c702cc3f65c7a052ffe6705d3c072
                                                      • Opcode Fuzzy Hash: b781b4c21a5818b1694ad72b0839b2a794d83e85b89a29690c565ba1b8063bb0
                                                      • Instruction Fuzzy Hash: 7121AE34540408DFEB15EF64C8E5BEEBBF1EB45750F10441DE542AB292CB3DAA69DB40
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CountFocusTick
                                                      • String ID: killfocus
                                                      • API String ID: 3897604831-1616503811
                                                      • Opcode ID: 87cffcd9c889fbd64cb8b0f7d3fb8cfe499f58c483ab9aa307605d948e1138d0
                                                      • Instruction ID: c52160a51f6f466a349cd7c091ead729d68c26368f4a0850705fa8b71ce6a17a
                                                      • Opcode Fuzzy Hash: 87cffcd9c889fbd64cb8b0f7d3fb8cfe499f58c483ab9aa307605d948e1138d0
                                                      • Instruction Fuzzy Hash: 18214F75900784ABDB21DF79C888FDBBBF5EF99300F00882DE66AA6250DB746444CB61
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CoCreateGuid.OLE32(00000000,00000008), ref: 00780FD4
                                                      • wnsprintfA.SHLWAPI ref: 0078101D
                                                      Strings
                                                      • %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x, xrefs: 00781014
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: CreateGuidwnsprintf
                                                      • String ID: %08x-%04x-%04x-%02x%02x-%02x%02x%02x%02x%02x%02x
                                                      • API String ID: 211977963-4056305060
                                                      • Opcode ID: 42ddde10e6c34cb56fa8bd1f0dab006576521f14f017c7bad4636ff38f1788fe
                                                      • Instruction ID: 027f4d48609b1a38a1d349a035008db717e9aaeb7d82ef361803d4172e0267a1
                                                      • Opcode Fuzzy Hash: 42ddde10e6c34cb56fa8bd1f0dab006576521f14f017c7bad4636ff38f1788fe
                                                      • Instruction Fuzzy Hash: E1113CA69040997ECB52DBE98D11EBFBBFC9B0D201F440095F6A1E1091D63CDB01DB70
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SHCreateStreamOnFileW.SHLWAPI(?,00001001,00000000), ref: 0078881C
                                                        • Part of subcall function 007884B2: __EH_prolog3_GS.LIBCMT ref: 007884BC
                                                      • DeleteFileW.KERNEL32(?), ref: 00788880
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: File$CreateDeleteH_prolog3_Stream
                                                      • String ID: open file failed
                                                      • API String ID: 2591404272-3995927536
                                                      • Opcode ID: b2f01689e0dbb20f676b01399b1571c6243f022e5233b412553de321ace90c02
                                                      • Instruction ID: ead2514a524f1f0bc014e6b0fd635afd3a30e3d7f719c598d6044b11d8c23fa3
                                                      • Opcode Fuzzy Hash: b2f01689e0dbb20f676b01399b1571c6243f022e5233b412553de321ace90c02
                                                      • Instruction Fuzzy Hash: B8117C31568305AFDB51AF54D809B6ABBE4AF84721F94CA1CF9A886291DF38D840CB53
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3_GS.LIBCMT ref: 007976C5
                                                        • Part of subcall function 00797112: __EH_prolog3_GS.LIBCMT ref: 0079711C
                                                      • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000001), ref: 0079772B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_$ExecuteShell
                                                      • String ID: open
                                                      • API String ID: 3230924550-2758837156
                                                      • Opcode ID: 2a61a5437e0bec054c04685623e2f233d1752aadc9e1a355e9e00f10fe1807c2
                                                      • Instruction ID: 08971dbb572ec10768cbe1a6758bd6b1512ec877c7045fb87e691aa852ec17be
                                                      • Opcode Fuzzy Hash: 2a61a5437e0bec054c04685623e2f233d1752aadc9e1a355e9e00f10fe1807c2
                                                      • Instruction Fuzzy Hash: 85113C75A01219ABDF11DFA8E885DEEBBB5EB48310F104015F904A7241C7389A41CBA1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShellExecuteW.SHELL32(?,Runas,00000044,00000098,00000000,00000001), ref: 00738282
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID: Runas$open
                                                      • API String ID: 587946157-809297746
                                                      • Opcode ID: 6418c9c179fcc52af707ea39ebfa56a00b09fd7b26608dddeeed21fe967e0cda
                                                      • Instruction ID: d3770e674cac77d134ec2f56bb5038767166680ef030f5c0a3f4cc81d760aaa7
                                                      • Opcode Fuzzy Hash: 6418c9c179fcc52af707ea39ebfa56a00b09fd7b26608dddeeed21fe967e0cda
                                                      • Instruction Fuzzy Hash: F601F431204E01EFE7588615D848FA7B366BB82711F218134F10547642DB78BCA4C7A2
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0079C1EF: __getptd.LIBCMT ref: 0079C1F5
                                                        • Part of subcall function 0079C1EF: __getptd.LIBCMT ref: 0079C205
                                                      • __getptd.LIBCMT ref: 007A16F1
                                                        • Part of subcall function 0079CEFB: __getptd_noexit.LIBCMT ref: 0079CEFE
                                                        • Part of subcall function 0079CEFB: __amsg_exit.LIBCMT ref: 0079CF0B
                                                      • __getptd.LIBCMT ref: 007A16FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: __getptd$__amsg_exit__getptd_noexit
                                                      • String ID: csm
                                                      • API String ID: 803148776-1018135373
                                                      • Opcode ID: 01e1ae27a83a695f8d87dbed4fe3a96a8f346d479da0a6c132e4617c359eabaa
                                                      • Instruction ID: ed32a1104a47bd2408e453893b2e3d1712e4ad7330755b26ad9437afe6e31403
                                                      • Opcode Fuzzy Hash: 01e1ae27a83a695f8d87dbed4fe3a96a8f346d479da0a6c132e4617c359eabaa
                                                      • Instruction Fuzzy Hash: 03018675801204CFEF359F64D99466CB7B9AF52321FD4691DE4C196591CB388985CB01
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,00001001,00000000,?), ref: 0076AA1E
                                                      • wsprintfW.USER32 ref: 0076AA45
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: MessageSendwsprintf
                                                      • String ID: %04d-%02d-%02d
                                                      • API String ID: 3751067900-516894531
                                                      • Opcode ID: 1cd1cdb4454efe65a7364eb7ed268554e8c53f5ff52d5043000434bf48b25b79
                                                      • Instruction ID: b4e0fc2e17bc2e6bef78e8d94e5cba47faf363c88de765b64d4132e27ca9f5d8
                                                      • Opcode Fuzzy Hash: 1cd1cdb4454efe65a7364eb7ed268554e8c53f5ff52d5043000434bf48b25b79
                                                      • Instruction Fuzzy Hash: C8F04470600204ABDB50DFA9C949FAFB3FCAB08701F404519B657D3180DE78F945C728
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      • in Json::Value::duplicateStringValue(): Failed to allocate string value buffer, xrefs: 0078D225
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3_malloc
                                                      • String ID: in Json::Value::duplicateStringValue(): Failed to allocate string value buffer
                                                      • API String ID: 2346879263-3522564335
                                                      • Opcode ID: 608d92a67e7305fd904240da02b0c040d9764e73acfce4b031632f9d0d43f709
                                                      • Instruction ID: 0bd4cdaaa280e15e79eb517dd963c41ed993271582402984fd5a7a2542c7d327
                                                      • Opcode Fuzzy Hash: 608d92a67e7305fd904240da02b0c040d9764e73acfce4b031632f9d0d43f709
                                                      • Instruction Fuzzy Hash: 51F0E537840205E6CF21BAE4A85AADD77AA6F95371F690218F824671C2EF3CDD0087A1
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 00762055
                                                        • Part of subcall function 0076BAB3: __EH_prolog3.LIBCMT ref: 0076BABA
                                                        • Part of subcall function 0076BAB3: CoUninitialize.OLE32(00000004,007620C3), ref: 0076BAE0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: H_prolog3$Uninitialize
                                                      • String ID: \9|$d9|
                                                      • API String ID: 1272724754-1375202350
                                                      • Opcode ID: 9fc84ca1979683cac0288e9e5860388cfd1a4200e27201f7c7ab771df32f53cd
                                                      • Instruction ID: b5d6d34f166757a2f1cb76dd06ce07c0b6b25e2a07b2f9c8361d4be218632890
                                                      • Opcode Fuzzy Hash: 9fc84ca1979683cac0288e9e5860388cfd1a4200e27201f7c7ab771df32f53cd
                                                      • Instruction Fuzzy Hash: D9F0B7B0905B51CACB20EFA4810A799BBE1AB04318F10CB2D91AE5B281CBFC76448F85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __EH_prolog3.LIBCMT ref: 0079B165
                                                      • __CxxThrowException@8.LIBCMT ref: 0079B190
                                                        • Part of subcall function 0079BDE0: RaiseException.KERNEL32(?,?,0079B614,00000000,?,?,?,?,0079B614,00000000,007CD388,007D9D80,00000000,?,00000000), ref: 0079BE22
                                                      Strings
                                                      • invalid string position, xrefs: 0079B16A
                                                      Memory Dump Source
                                                      • Source File: 00000006.00000002.3223883373.0000000000731000.00000020.00000001.01000000.00000009.sdmp, Offset: 00730000, based on PE: true
                                                      • Associated: 00000006.00000002.3223861027.0000000000730000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223967799.00000000007B9000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3223996171.00000000007D6000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224015275.00000000007D7000.00000008.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224032495.00000000007D8000.00000004.00000001.01000000.00000009.sdmpDownload File
                                                      • Associated: 00000006.00000002.3224054862.00000000007DE000.00000002.00000001.01000000.00000009.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_6_2_730000_gxonecli.jbxd
                                                      Similarity
                                                      • API ID: ExceptionException@8H_prolog3RaiseThrow
                                                      • String ID: invalid string position
                                                      • API String ID: 1961742612-1799206989
                                                      • Opcode ID: 49c774cb878f6ffc34db5127b3798473ec2442793765986970901997f9b245c7
                                                      • Instruction ID: 8401c278d91c30ffa69df8768f81fe357d29e48c0505138bca3af3f694dd63f4
                                                      • Opcode Fuzzy Hash: 49c774cb878f6ffc34db5127b3798473ec2442793765986970901997f9b245c7
                                                      • Instruction Fuzzy Hash: 53D062B1950108DADF05E7D0DC8BFDD7378AF14B21F484425B20576086DFAC5644C765
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%